必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.217.134.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24258
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.217.134.254.		IN	A

;; AUTHORITY SECTION:
.			540	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 02:54:13 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 254.134.217.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 254.134.217.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.103.32.30 attackbotsspam
Automatic report - Port Scan Attack
2020-09-24 05:33:18
178.62.37.78 attack
Tried sshing with brute force.
2020-09-24 05:12:40
172.245.214.35 attackbots
Hi,
Hi,

The IP 172.245.214.35 has just been banned by  after
5 attempts against postfix.


Here is more information about 172.245.214.35 :




........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=172.245.214.35
2020-09-24 05:15:18
156.206.95.238 attackspam
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=46583  .  dstport=23  .     (2894)
2020-09-24 05:35:10
188.247.220.182 attackbotsspam
Sep 23 19:00:32 www sshd[13542]: Invalid user nagios from 188.247.220.182
Sep 23 19:00:33 www sshd[13546]: Invalid user netman from 188.247.220.182
Sep 23 19:00:33 www sshd[13542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.247.220.182 
Sep 23 19:00:33 www sshd[13546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.247.220.182 
Sep 23 19:00:35 www sshd[13542]: Failed password for invalid user nagios from 188.247.220.182 port 51636 ssh2
Sep 23 19:00:35 www sshd[13546]: Failed password for invalid user netman from 188.247.220.182 port 51728 ssh2
Sep 23 19:00:35 www sshd[13542]: Connection closed by 188.247.220.182 [preauth]
Sep 23 19:00:36 www sshd[13546]: Connection closed by 188.247.220.182 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.247.220.182
2020-09-24 05:11:54
113.31.107.34 attack
SSHD brute force attack detected from [113.31.107.34]
2020-09-24 05:08:14
13.94.229.227 attack
Sep 23 22:09:06 theomazars sshd[11155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.229.227  user=root
Sep 23 22:09:07 theomazars sshd[11155]: Failed password for root from 13.94.229.227 port 43942 ssh2
2020-09-24 05:07:01
184.75.214.195 attack
(From dave.colvin@msn.com) Hi           ,

We are a team of young entrepreneurs based in Washington D.C. We invented an innovative product, PumPiX, that is a wearable and portable gadget with a liquid sanitizing dispenser to maintain cleanliness all day. After having a successful campaign on Kickstarter, PumPiX is on SALE on Indiegogo. The deals are available for a limited time. Get PumPiX for yourself and your family, and gift it to your friends and beloved ones:  https://bit.ly/3hV5JUx

Should you have any questions/suggestions, please feel free to contact our team at pumppix@gmail.com.

Also, don't forget to check out our website at PumPiX.us. PumPiX is in the bulk production phase and will be in-market very soon. Take advantage of our current deals now.

Best regards,

PumPiX Team
2020-09-24 05:14:12
172.245.214.38 attackbots
Hi,
Hi,

The IP 172.245.214.38 has just been banned by  after
5 attempts against postfix.


Here is more information about 172.245.214.38 :




........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=172.245.214.38
2020-09-24 05:09:18
52.143.71.231 attackbots
Sep 23 23:08:51 db sshd[20220]: User root from 52.143.71.231 not allowed because none of user's groups are listed in AllowGroups
...
2020-09-24 05:30:25
167.86.110.239 attackbots
Port 22 Scan, PTR: None
2020-09-24 05:12:13
5.62.62.55 attack
(From bartel.jayme@hotmail.com) 
Sick of wasting money on PPC advertising that just doesn't deliver? Now you can post your ad on 5000 advertising sites and it'll cost you less than $40. These ads stay up forever, this is a continual supply of organic visitors! 

For all the details, check out: http://bit.ly/endless-traffic-forever
2020-09-24 05:26:25
124.13.28.191 attackbots
Invalid user admin from 124.13.28.191 port 41168
2020-09-24 05:01:01
1.85.17.20 attack
Sep 23 21:22:06 ns382633 sshd\[16802\]: Invalid user adrian from 1.85.17.20 port 40839
Sep 23 21:22:06 ns382633 sshd\[16802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.85.17.20
Sep 23 21:22:08 ns382633 sshd\[16802\]: Failed password for invalid user adrian from 1.85.17.20 port 40839 ssh2
Sep 23 21:28:40 ns382633 sshd\[18085\]: Invalid user admin from 1.85.17.20 port 50349
Sep 23 21:28:40 ns382633 sshd\[18085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.85.17.20
2020-09-24 05:10:02
128.199.148.70 attackbots
2020-09-23T19:28:28.288598shield sshd\[21850\]: Invalid user user from 128.199.148.70 port 57910
2020-09-23T19:28:28.297818shield sshd\[21850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.148.70
2020-09-23T19:28:30.125385shield sshd\[21850\]: Failed password for invalid user user from 128.199.148.70 port 57910 ssh2
2020-09-23T19:36:22.595581shield sshd\[22961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.148.70  user=root
2020-09-23T19:36:24.494247shield sshd\[22961\]: Failed password for root from 128.199.148.70 port 38822 ssh2
2020-09-24 05:25:24

最近上报的IP列表

228.128.2.127 108.204.214.133 104.33.174.74 12.24.25.89
104.22.23.226 16.119.203.201 250.124.136.237 189.222.145.120
193.35.27.86 28.42.128.254 0.210.137.226 245.236.44.67
229.153.168.139 135.163.119.105 218.229.239.212 31.86.45.18
111.248.211.171 1.151.229.183 142.160.90.34 32.16.157.92