必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.128.134.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1489
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.128.134.142.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 21:36:22 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 142.134.128.137.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 137.128.134.142.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.116.102.246 attackbotsspam
212.116.102.246 - - \[19/Jun/2020:06:09:19 +0200\] "POST /wp-login.php HTTP/1.0" 200 11495 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
212.116.102.246 - - \[19/Jun/2020:06:09:50 +0200\] "POST /wp-login.php HTTP/1.0" 200 6289 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
212.116.102.246 - - \[19/Jun/2020:06:09:55 +0200\] "POST /wp-login.php HTTP/1.0" 200 6216 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-06-19 15:03:41
104.41.3.99 attackbots
Invalid user bot from 104.41.3.99 port 42176
2020-06-19 15:20:44
213.46.255.74 attackspambots
SSH login attempts.
2020-06-19 15:10:07
84.19.37.148 attackspambots
SSH login attempts.
2020-06-19 14:58:02
213.171.216.40 attackspam
SSH login attempts.
2020-06-19 15:19:20
104.47.5.33 attack
SSH login attempts.
2020-06-19 15:23:08
45.175.2.203 attackbotsspam
mail auth brute force
2020-06-19 15:12:48
67.195.228.106 attack
SSH login attempts.
2020-06-19 15:23:24
66.85.125.89 attack
SSH login attempts.
2020-06-19 15:21:13
104.47.4.33 attackspam
SSH login attempts.
2020-06-19 15:23:42
216.167.161.219 attackbotsspam
SSH login attempts.
2020-06-19 15:08:22
132.145.160.32 attackspambots
Invalid user tty from 132.145.160.32 port 57622
2020-06-19 14:44:09
49.88.112.77 attackspambots
Jun 19 10:01:09 pkdns2 sshd\[41251\]: Failed password for root from 49.88.112.77 port 59994 ssh2Jun 19 10:02:40 pkdns2 sshd\[41295\]: Failed password for root from 49.88.112.77 port 26903 ssh2Jun 19 10:02:42 pkdns2 sshd\[41295\]: Failed password for root from 49.88.112.77 port 26903 ssh2Jun 19 10:07:45 pkdns2 sshd\[41531\]: Failed password for root from 49.88.112.77 port 46418 ssh2Jun 19 10:07:48 pkdns2 sshd\[41531\]: Failed password for root from 49.88.112.77 port 46418 ssh2Jun 19 10:07:49 pkdns2 sshd\[41531\]: Failed password for root from 49.88.112.77 port 46418 ssh2
...
2020-06-19 15:11:53
141.98.83.6 attackspam
Repeated RDP login failures. Last user: cindy
2020-06-19 15:07:05
142.136.234.139 attackbotsspam
SSH login attempts.
2020-06-19 15:14:45

最近上报的IP列表

160.48.157.5 151.177.12.48 244.149.171.37 181.223.217.72
106.244.0.90 97.69.228.219 90.187.8.9 18.105.70.107
17.254.39.173 3.78.225.153 232.126.199.95 69.225.144.224
83.8.78.79 211.55.171.156 137.44.52.114 149.143.228.20
59.71.158.5 124.110.140.56 126.33.215.196 191.143.133.148