必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.142.134.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.142.134.37.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:27:32 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 37.134.142.146.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 37.134.142.146.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.21.7.80 attackbots
Dec 27 10:25:41 localhost sshd\[31638\]: Invalid user admin from 123.21.7.80 port 42166
Dec 27 10:25:41 localhost sshd\[31638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.21.7.80
Dec 27 10:25:43 localhost sshd\[31638\]: Failed password for invalid user admin from 123.21.7.80 port 42166 ssh2
...
2019-12-27 18:36:01
213.131.39.108 attackspam
Dec 27 07:25:42 mail kernel: [2447684.604464] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=213.131.39.108 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=119 ID=13230 DF PROTO=TCP SPT=63077 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Dec 27 07:25:45 mail kernel: [2447688.153596] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=213.131.39.108 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=119 ID=7562 DF PROTO=TCP SPT=63060 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Dec 27 07:25:48 mail kernel: [2447691.172701] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=213.131.39.108 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=119 ID=28332 DF PROTO=TCP SPT=63060 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-27 18:25:48
85.93.20.70 attack
alert tcp $EXTERNAL_NET any -> $HOME_NET !3389 (msg:"ET SCAN MS Terminal Server Traffic on Non-standard Port"; flow:to_server,established; content:"|03 00 00|"; depth:3; content:"|e0 00 00 00 00 00|"; offset:5; depth:6; content:"Cookie|3a| mstshash="; fast_pattern; classtype:attempted-recon; sid:2023753; rev:2; metadata:affected_product Microsoft_Terminal_Server_RDP, attack_target Server, deployment Perimeter, signature_severity Major, created_at 2017_01_23, performance_impact Low, updated_at 2017_02_23;)
2019-12-27 18:44:29
182.120.18.94 attack
DATE:2019-12-27 07:25:52, IP:182.120.18.94, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-12-27 18:24:05
35.192.209.41 attackspam
20 attempts against mh-ssh on grass.magehost.pro
2019-12-27 18:43:35
222.186.180.6 attack
Dec 27 11:30:41 minden010 sshd[31115]: Failed password for root from 222.186.180.6 port 32254 ssh2
Dec 27 11:30:44 minden010 sshd[31115]: Failed password for root from 222.186.180.6 port 32254 ssh2
Dec 27 11:30:47 minden010 sshd[31115]: Failed password for root from 222.186.180.6 port 32254 ssh2
Dec 27 11:30:50 minden010 sshd[31115]: Failed password for root from 222.186.180.6 port 32254 ssh2
...
2019-12-27 18:47:22
112.85.42.229 attackbots
--- report ---
Dec 27 07:19:29 sshd: Connection from 112.85.42.229 port 60574
Dec 27 07:19:34 sshd: Failed password for root from 112.85.42.229 port 60574 ssh2
Dec 27 07:19:36 sshd: Failed password for root from 112.85.42.229 port 60574 ssh2
Dec 27 07:19:39 sshd: Failed password for root from 112.85.42.229 port 60574 ssh2
Dec 27 07:19:39 sshd: Received disconnect from 112.85.42.229: 11:  [preauth]
2019-12-27 18:49:53
123.143.203.67 attackspam
Dec 27 10:20:22 ncomp sshd[16874]: User uucp from 123.143.203.67 not allowed because none of user's groups are listed in AllowGroups
Dec 27 10:20:22 ncomp sshd[16874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.143.203.67  user=uucp
Dec 27 10:20:22 ncomp sshd[16874]: User uucp from 123.143.203.67 not allowed because none of user's groups are listed in AllowGroups
Dec 27 10:20:24 ncomp sshd[16874]: Failed password for invalid user uucp from 123.143.203.67 port 39136 ssh2
2019-12-27 18:40:12
206.189.229.112 attackspam
Dec 26 22:47:10 server sshd\[1045\]: Invalid user admin from 206.189.229.112
Dec 26 22:47:10 server sshd\[1045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.229.112 
Dec 26 22:47:12 server sshd\[1045\]: Failed password for invalid user admin from 206.189.229.112 port 37110 ssh2
Dec 27 13:20:51 server sshd\[24578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.229.112  user=root
Dec 27 13:20:53 server sshd\[24578\]: Failed password for root from 206.189.229.112 port 58004 ssh2
...
2019-12-27 18:27:59
142.4.208.165 attack
Dec 27 09:59:40 cavern sshd[17773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.208.165
2019-12-27 18:28:59
179.216.24.38 attack
Dec 27 11:09:04 cavern sshd[25465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.216.24.38
2019-12-27 18:32:12
207.154.197.83 attackbots
52869/tcp
[2019-12-27]1pkt
2019-12-27 18:56:31
103.85.17.131 attack
Unauthorized connection attempt detected from IP address 103.85.17.131 to port 445
2019-12-27 18:18:45
41.82.212.193 attackspambots
$f2bV_matches
2019-12-27 18:18:13
49.206.225.114 attackbots
Host Scan
2019-12-27 18:20:41

最近上报的IP列表

235.234.137.81 165.213.180.53 235.236.245.81 151.100.74.84
38.177.192.194 191.255.17.247 139.179.47.180 116.10.140.177
224.140.146.213 94.199.122.71 224.32.32.24 20.134.41.130
199.221.25.71 120.201.70.182 101.158.178.119 119.63.161.123
190.60.188.146 84.180.54.106 201.29.210.172 212.161.138.216