必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Slovakia (SLOVAK Republic)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.213.1.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16995
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.213.1.34.			IN	A

;; AUTHORITY SECTION:
.			181	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:39:01 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
34.1.213.147.in-addr.arpa domain name pointer red.sav.sk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.1.213.147.in-addr.arpa	name = red.sav.sk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.106.193.72 attack
Dec 10 03:31:38 linuxvps sshd\[583\]: Invalid user QWE123ASD123 from 91.106.193.72
Dec 10 03:31:38 linuxvps sshd\[583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.106.193.72
Dec 10 03:31:39 linuxvps sshd\[583\]: Failed password for invalid user QWE123ASD123 from 91.106.193.72 port 55762 ssh2
Dec 10 03:37:27 linuxvps sshd\[4388\]: Invalid user abcdefghijklmnopqrs from 91.106.193.72
Dec 10 03:37:27 linuxvps sshd\[4388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.106.193.72
2019-12-10 16:44:28
45.58.139.130 attackspam
Dec  9 21:50:55 eddieflores sshd\[22914\]: Invalid user 012345 from 45.58.139.130
Dec  9 21:50:55 eddieflores sshd\[22914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.58.139.130
Dec  9 21:50:57 eddieflores sshd\[22914\]: Failed password for invalid user 012345 from 45.58.139.130 port 34535 ssh2
Dec  9 21:56:06 eddieflores sshd\[23434\]: Invalid user sikorski from 45.58.139.130
Dec  9 21:56:06 eddieflores sshd\[23434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.58.139.130
2019-12-10 16:33:15
197.50.29.54 attackbotsspam
Host Scan
2019-12-10 16:20:50
95.110.235.17 attack
2019-12-10T09:45:32.714956scmdmz1 sshd\[29963\]: Invalid user 2 from 95.110.235.17 port 54696
2019-12-10T09:45:32.717797scmdmz1 sshd\[29963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.235.17
2019-12-10T09:45:34.753765scmdmz1 sshd\[29963\]: Failed password for invalid user 2 from 95.110.235.17 port 54696 ssh2
...
2019-12-10 16:53:46
182.61.23.89 attackspam
Dec 10 00:22:07 dallas01 sshd[27680]: Failed password for nobody from 182.61.23.89 port 43100 ssh2
Dec 10 00:29:13 dallas01 sshd[28922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.23.89
Dec 10 00:29:15 dallas01 sshd[28922]: Failed password for invalid user chocolate from 182.61.23.89 port 41760 ssh2
2019-12-10 16:47:58
106.13.98.132 attack
Dec 10 07:15:21 root sshd[7800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.132 
Dec 10 07:15:23 root sshd[7800]: Failed password for invalid user takana123 from 106.13.98.132 port 41836 ssh2
Dec 10 07:29:49 root sshd[8162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.132 
...
2019-12-10 16:24:25
123.180.2.92 attack
Unauthorised access (Dec 10) SRC=123.180.2.92 LEN=40 TTL=49 ID=60581 TCP DPT=8080 WINDOW=25100 SYN 
Unauthorised access (Dec  9) SRC=123.180.2.92 LEN=40 TTL=49 ID=64161 TCP DPT=8080 WINDOW=34840 SYN 
Unauthorised access (Dec  9) SRC=123.180.2.92 LEN=40 TTL=49 ID=6380 TCP DPT=8080 WINDOW=59912 SYN 
Unauthorised access (Dec  9) SRC=123.180.2.92 LEN=40 TTL=49 ID=62361 TCP DPT=8080 WINDOW=13744 SYN
2019-12-10 16:56:03
49.88.112.64 attackbotsspam
Dec 10 05:25:01 firewall sshd[24668]: Failed password for root from 49.88.112.64 port 25203 ssh2
Dec 10 05:25:04 firewall sshd[24668]: Failed password for root from 49.88.112.64 port 25203 ssh2
Dec 10 05:25:08 firewall sshd[24668]: Failed password for root from 49.88.112.64 port 25203 ssh2
...
2019-12-10 16:30:06
45.58.54.34 attackbotsspam
Scanning
2019-12-10 16:30:43
51.79.87.90 attack
Dec 10 08:58:41 vps691689 sshd[22499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.87.90
Dec 10 08:58:43 vps691689 sshd[22499]: Failed password for invalid user schmuhl from 51.79.87.90 port 49604 ssh2
...
2019-12-10 16:38:39
51.75.23.242 attackspam
Dec 10 09:29:05 herz-der-gamer sshd[30365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.23.242  user=backup
Dec 10 09:29:07 herz-der-gamer sshd[30365]: Failed password for backup from 51.75.23.242 port 40230 ssh2
Dec 10 09:38:57 herz-der-gamer sshd[30537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.23.242  user=root
Dec 10 09:38:58 herz-der-gamer sshd[30537]: Failed password for root from 51.75.23.242 port 55712 ssh2
...
2019-12-10 16:43:09
54.37.159.50 attackbotsspam
Dec  9 22:45:10 hanapaa sshd\[28916\]: Invalid user hello from 54.37.159.50
Dec  9 22:45:10 hanapaa sshd\[28916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.ip-54-37-159.eu
Dec  9 22:45:12 hanapaa sshd\[28916\]: Failed password for invalid user hello from 54.37.159.50 port 35630 ssh2
Dec  9 22:51:20 hanapaa sshd\[29614\]: Invalid user akhil from 54.37.159.50
Dec  9 22:51:20 hanapaa sshd\[29614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.ip-54-37-159.eu
2019-12-10 16:52:43
129.211.63.79 attackbots
Dec 10 03:18:27 TORMINT sshd\[2681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.63.79  user=lp
Dec 10 03:18:29 TORMINT sshd\[2681\]: Failed password for lp from 129.211.63.79 port 33114 ssh2
Dec 10 03:24:57 TORMINT sshd\[3617\]: Invalid user Rfid from 129.211.63.79
Dec 10 03:24:57 TORMINT sshd\[3617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.63.79
...
2019-12-10 16:49:17
59.145.221.103 attackspam
2019-12-10T07:55:43.406164abusebot-4.cloudsearch.cf sshd\[30643\]: Invalid user trapper from 59.145.221.103 port 42630
2019-12-10 16:24:47
80.211.112.81 attackspambots
Dec  8 23:53:50 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 80.211.112.81 port 36082 ssh2 (target: 158.69.100.152:22, password: r.r)
Dec  8 23:53:51 wildwolf ssh-honeypotd[26164]: Failed password for admin from 80.211.112.81 port 37452 ssh2 (target: 158.69.100.152:22, password: admin)
Dec  8 23:53:52 wildwolf ssh-honeypotd[26164]: Failed password for admin from 80.211.112.81 port 38774 ssh2 (target: 158.69.100.152:22, password: 1234)
Dec  8 23:53:53 wildwolf ssh-honeypotd[26164]: Failed password for user from 80.211.112.81 port 39984 ssh2 (target: 158.69.100.152:22, password: user)
Dec  8 23:53:54 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 80.211.112.81 port 41168 ssh2 (target: 158.69.100.152:22, password: ubnt)
Dec  8 23:53:55 wildwolf ssh-honeypotd[26164]: Failed password for admin from 80.211.112.81 port 42526 ssh2 (target: 158.69.100.152:22, password: password)
Dec  8 23:53:56 wildwolf ssh-honeypotd[26164]: Failed password for guest ........
------------------------------
2019-12-10 16:42:57

最近上报的IP列表

147.203.62.4 147.210.215.26 147.230.18.195 147.229.2.90
147.234.16.183 147.233.250.223 147.234.5.32 147.232.185.28
147.234.21.5 147.231.163.211 147.234.78.19 147.235.237.17
147.235.237.37 147.235.246.154 147.237.0.206 147.237.0.64
147.235.244.20 147.237.0.61 147.236.241.150 147.237.1.108