必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.51.14.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.51.14.134.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 10:05:00 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 134.14.51.137.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.14.51.137.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.63.253.200 spambotsattackproxynormal
Jepang
2020-06-18 14:44:20
167.114.98.229 attack
2020-06-18T00:41:41.2983691495-001 sshd[25601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=229.ip-167-114-98.net
2020-06-18T00:41:41.2912191495-001 sshd[25601]: Invalid user smb from 167.114.98.229 port 34642
2020-06-18T00:41:43.5654861495-001 sshd[25601]: Failed password for invalid user smb from 167.114.98.229 port 34642 ssh2
2020-06-18T00:44:55.4668941495-001 sshd[25688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=229.ip-167-114-98.net  user=root
2020-06-18T00:44:57.3252491495-001 sshd[25688]: Failed password for root from 167.114.98.229 port 33704 ssh2
2020-06-18T00:48:12.0735621495-001 sshd[25824]: Invalid user service from 167.114.98.229 port 60990
...
2020-06-18 14:48:18
162.243.42.225 attackspambots
Jun 18 07:40:15 localhost sshd\[28951\]: Invalid user dutch from 162.243.42.225
Jun 18 07:40:15 localhost sshd\[28951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.42.225
Jun 18 07:40:16 localhost sshd\[28951\]: Failed password for invalid user dutch from 162.243.42.225 port 46958 ssh2
Jun 18 07:42:26 localhost sshd\[28981\]: Invalid user zhuhao from 162.243.42.225
Jun 18 07:42:26 localhost sshd\[28981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.42.225
...
2020-06-18 14:58:13
49.235.92.208 attackspambots
Jun 17 23:04:19 dignus sshd[32133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208
Jun 17 23:04:20 dignus sshd[32133]: Failed password for invalid user user2 from 49.235.92.208 port 54512 ssh2
Jun 17 23:05:52 dignus sshd[32308]: Invalid user app from 49.235.92.208 port 43142
Jun 17 23:05:52 dignus sshd[32308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208
Jun 17 23:05:54 dignus sshd[32308]: Failed password for invalid user app from 49.235.92.208 port 43142 ssh2
...
2020-06-18 14:55:09
83.174.32.100 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=49245)(06180840)
2020-06-18 15:04:59
222.186.42.137 attackspam
18.06.2020 06:26:06 SSH access blocked by firewall
2020-06-18 14:28:32
223.100.167.105 attack
Jun 18 08:31:09 vmi345603 sshd[1045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.100.167.105
Jun 18 08:31:10 vmi345603 sshd[1045]: Failed password for invalid user nexus from 223.100.167.105 port 44140 ssh2
...
2020-06-18 14:59:25
159.89.194.160 attack
Jun 18 08:03:01 ns381471 sshd[24114]: Failed password for root from 159.89.194.160 port 52174 ssh2
Jun 18 08:06:34 ns381471 sshd[24274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.160
2020-06-18 15:11:02
101.251.192.61 attackspambots
Jun 18 07:45:29 piServer sshd[11612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.251.192.61 
Jun 18 07:45:30 piServer sshd[11612]: Failed password for invalid user amal from 101.251.192.61 port 43929 ssh2
Jun 18 07:48:38 piServer sshd[11821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.251.192.61 
...
2020-06-18 14:54:50
36.111.182.51 attackspambots
Invalid user deployer from 36.111.182.51 port 47868
2020-06-18 14:49:45
68.183.19.26 attackbotsspam
Invalid user student from 68.183.19.26 port 46244
2020-06-18 15:00:51
14.186.185.45 attack
(eximsyntax) Exim syntax errors from 14.186.185.45 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-18 08:23:39 SMTP call from [14.186.185.45] dropped: too many syntax or protocol errors (last command was "?ÿ\001??Q?\v?\004\003?\001\002?")
2020-06-18 14:36:45
113.53.78.111 attackspambots
20/6/17@23:53:10: FAIL: Alarm-Network address from=113.53.78.111
20/6/17@23:53:11: FAIL: Alarm-Network address from=113.53.78.111
...
2020-06-18 15:00:17
222.210.87.62 attack
Port scan detected on ports: 2375[TCP], 2376[TCP], 4243[TCP]
2020-06-18 14:45:03
139.170.118.203 attackspambots
Invalid user qwert from 139.170.118.203 port 26125
2020-06-18 14:30:52

最近上报的IP列表

78.87.47.64 106.216.56.103 90.9.130.217 58.118.20.135
204.153.208.220 82.165.79.10 99.213.200.70 211.197.212.215
45.195.12.86 185.250.240.72 79.68.77.113 36.82.83.252
91.207.172.102 192.168.12.29 7.129.152.57 201.56.208.242
49.146.12.193 103.212.18.137 125.141.43.33 67.158.52.58