必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.80.38.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53360
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.80.38.234.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 10:39:45 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 234.38.80.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.38.80.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.9.114.139 attack
Oct 20 22:11:00 rotator sshd\[25856\]: Failed password for root from 193.9.114.139 port 46242 ssh2Oct 20 22:11:03 rotator sshd\[25856\]: Failed password for root from 193.9.114.139 port 46242 ssh2Oct 20 22:11:05 rotator sshd\[25856\]: Failed password for root from 193.9.114.139 port 46242 ssh2Oct 20 22:11:08 rotator sshd\[25856\]: Failed password for root from 193.9.114.139 port 46242 ssh2Oct 20 22:11:11 rotator sshd\[25856\]: Failed password for root from 193.9.114.139 port 46242 ssh2Oct 20 22:11:14 rotator sshd\[25856\]: Failed password for root from 193.9.114.139 port 46242 ssh2
...
2019-10-21 04:22:04
45.55.38.39 attackbotsspam
Automatic report - Banned IP Access
2019-10-21 04:07:06
181.40.73.86 attackbots
Oct 20 13:54:05 ns41 sshd[23306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.73.86
Oct 20 13:54:05 ns41 sshd[23306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.73.86
2019-10-21 04:28:15
41.224.59.78 attackspam
2019-10-20T13:33:09.792530abusebot-2.cloudsearch.cf sshd\[29272\]: Invalid user P4SSW0RD from 41.224.59.78 port 34506
2019-10-21 04:11:02
95.111.59.210 attackbots
22/tcp
[2019-10-20]1pkt
2019-10-21 04:09:11
220.225.126.55 attack
2019-10-20T12:03:01.767861shield sshd\[31057\]: Invalid user cedric from 220.225.126.55 port 34982
2019-10-20T12:03:01.770800shield sshd\[31057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.126.55
2019-10-20T12:03:04.160174shield sshd\[31057\]: Failed password for invalid user cedric from 220.225.126.55 port 34982 ssh2
2019-10-20T12:08:02.751299shield sshd\[32181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.126.55  user=root
2019-10-20T12:08:05.130487shield sshd\[32181\]: Failed password for root from 220.225.126.55 port 46484 ssh2
2019-10-21 03:56:56
122.199.152.114 attackspam
$f2bV_matches
2019-10-21 04:29:31
129.204.108.143 attack
2019-10-20T17:03:57.619937abusebot-6.cloudsearch.cf sshd\[6294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.108.143  user=root
2019-10-21 03:57:37
206.72.201.214 attackspam
Lines containing failures of 206.72.201.214
Oct 18 19:15:55 omfg postfix/smtpd[4888]: connect from unknown[206.72.201.214]
Oct 18 19:15:55 omfg postfix/smtpd[6665]: connect from unknown[206.72.201.214]
Oct 18 19:15:55 omfg postfix/smtpd[6663]: connect from unknown[206.72.201.214]
Oct 18 19:15:55 omfg postfix/smtpd[6664]: connect from unknown[206.72.201.214]
Oct 18 19:15:55 omfg postfix/smtpd[6660]: connect from unknown[206.72.201.214]
Oct 18 19:15:55 omfg postfix/smtpd[6662]: connect from unknown[206.72.201.214]
Oct 18 19:15:55 omfg postfix/smtpd[4888]: lost connection after CONNECT from unknown[206.72.201.214]
Oct 18 19:15:55 omfg postfix/smtpd[4888]: disconnect from unknown[206.72.201.214] commands=0/0
Oct 18 19:15:55 omfg postfix/smtpd[6663]: lost connection after CONNECT from unknown[206.72.201.214]
Oct 18 19:15:55 omfg postfix/smtpd[6663]: disconnect from unknown[206.72.201.214] commands=0/0
Oct 18 19:15:55 omfg postfix/smtpd[6665]: lost connection after CONNECT fro........
------------------------------
2019-10-21 04:20:45
118.25.92.221 attack
Oct 20 14:54:28 Tower sshd[1693]: Connection from 118.25.92.221 port 58678 on 192.168.10.220 port 22
Oct 20 14:54:30 Tower sshd[1693]: Failed password for root from 118.25.92.221 port 58678 ssh2
Oct 20 14:54:30 Tower sshd[1693]: Received disconnect from 118.25.92.221 port 58678:11: Bye Bye [preauth]
Oct 20 14:54:30 Tower sshd[1693]: Disconnected from authenticating user root 118.25.92.221 port 58678 [preauth]
2019-10-21 04:05:42
167.71.58.159 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-21 04:33:38
176.255.84.156 attackbots
Automatic report - Port Scan Attack
2019-10-21 04:33:27
180.166.192.66 attackbots
Automatic report - Banned IP Access
2019-10-21 04:18:01
106.13.33.27 attack
2019-10-20T16:39:01.143590scmdmz1 sshd\[31965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.33.27  user=root
2019-10-20T16:39:03.496783scmdmz1 sshd\[31965\]: Failed password for root from 106.13.33.27 port 58400 ssh2
2019-10-20T16:45:35.012465scmdmz1 sshd\[32583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.33.27  user=root
...
2019-10-21 04:27:24
198.71.235.43 attackspam
xmlrpc attack
2019-10-21 04:01:03

最近上报的IP列表

230.220.3.4 38.19.158.48 213.63.83.116 81.147.16.28
61.179.231.237 60.253.67.112 239.104.129.166 43.10.104.18
139.243.29.77 191.191.47.140 185.78.234.94 241.105.203.42
207.192.218.105 135.59.191.176 220.202.7.73 80.199.205.52
34.241.91.190 122.83.0.22 165.35.193.81 67.111.170.208