必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.126.72.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.126.72.134.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:39:46 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
134.72.126.149.in-addr.arpa domain name pointer 149.126.72.134.ip.incapdns.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.72.126.149.in-addr.arpa	name = 149.126.72.134.ip.incapdns.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.116.188.75 attack
May 10 09:38:03 gw1 sshd[11483]: Failed password for ubuntu from 14.116.188.75 port 54983 ssh2
...
2020-05-10 12:55:04
129.211.146.50 attackspam
May 10 07:03:42 host sshd[37696]: Invalid user gtadmin from 129.211.146.50 port 58582
...
2020-05-10 13:08:38
211.218.245.66 attack
May 10 06:25:28 dev0-dcde-rnet sshd[7363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.218.245.66
May 10 06:25:30 dev0-dcde-rnet sshd[7363]: Failed password for invalid user radware from 211.218.245.66 port 56750 ssh2
May 10 06:40:36 dev0-dcde-rnet sshd[7653]: Failed password for root from 211.218.245.66 port 52196 ssh2
2020-05-10 13:09:14
106.12.179.35 attack
May 10 07:15:57 meumeu sshd[32465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.35 
May 10 07:15:59 meumeu sshd[32465]: Failed password for invalid user test from 106.12.179.35 port 59942 ssh2
May 10 07:20:25 meumeu sshd[632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.35 
...
2020-05-10 13:24:38
201.217.214.194 attackbots
Icarus honeypot on github
2020-05-10 13:03:46
5.237.25.65 attack
1589082958 - 05/10/2020 05:55:58 Host: 5.237.25.65/5.237.25.65 Port: 445 TCP Blocked
2020-05-10 12:58:39
185.53.168.96 attack
2020-05-10T03:45:43.990849abusebot-8.cloudsearch.cf sshd[30598]: Invalid user vncuser from 185.53.168.96 port 43382
2020-05-10T03:45:43.997186abusebot-8.cloudsearch.cf sshd[30598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.53.168.96
2020-05-10T03:45:43.990849abusebot-8.cloudsearch.cf sshd[30598]: Invalid user vncuser from 185.53.168.96 port 43382
2020-05-10T03:45:45.164477abusebot-8.cloudsearch.cf sshd[30598]: Failed password for invalid user vncuser from 185.53.168.96 port 43382 ssh2
2020-05-10T03:55:36.643116abusebot-8.cloudsearch.cf sshd[31334]: Invalid user hansolsoft from 185.53.168.96 port 48828
2020-05-10T03:55:36.652091abusebot-8.cloudsearch.cf sshd[31334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.53.168.96
2020-05-10T03:55:36.643116abusebot-8.cloudsearch.cf sshd[31334]: Invalid user hansolsoft from 185.53.168.96 port 48828
2020-05-10T03:55:38.897859abusebot-8.cloudsearch.cf ssh
...
2020-05-10 13:11:11
156.96.44.166 attackspambots
May 10 06:36:28 mail postfix/smtpd\[22934\]: warning: unknown\[156.96.44.166\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 10 06:36:34 mail postfix/smtpd\[22934\]: warning: unknown\[156.96.44.166\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 10 07:17:39 mail postfix/smtpd\[23191\]: warning: unknown\[156.96.44.166\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 10 07:17:45 mail postfix/smtpd\[23191\]: warning: unknown\[156.96.44.166\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-05-10 13:25:14
45.13.93.82 attackbotsspam
scanner
2020-05-10 12:59:28
122.51.34.215 attackbotsspam
fail2ban/May 10 05:49:25 h1962932 sshd[28376]: Invalid user bash from 122.51.34.215 port 51964
May 10 05:49:25 h1962932 sshd[28376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.34.215
May 10 05:49:25 h1962932 sshd[28376]: Invalid user bash from 122.51.34.215 port 51964
May 10 05:49:27 h1962932 sshd[28376]: Failed password for invalid user bash from 122.51.34.215 port 51964 ssh2
May 10 05:55:12 h1962932 sshd[29481]: Invalid user user from 122.51.34.215 port 54050
2020-05-10 13:28:30
104.154.239.199 attackspambots
2020-05-10T05:49:13.100535vps773228.ovh.net sshd[9358]: Invalid user rr from 104.154.239.199 port 49242
2020-05-10T05:49:15.205751vps773228.ovh.net sshd[9358]: Failed password for invalid user rr from 104.154.239.199 port 49242 ssh2
2020-05-10T05:52:41.190164vps773228.ovh.net sshd[9398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.239.154.104.bc.googleusercontent.com  user=root
2020-05-10T05:52:42.833788vps773228.ovh.net sshd[9398]: Failed password for root from 104.154.239.199 port 57654 ssh2
2020-05-10T05:56:10.164923vps773228.ovh.net sshd[9438]: Invalid user ami from 104.154.239.199 port 37844
...
2020-05-10 12:49:21
58.82.239.54 attackbotsspam
Lines containing failures of 58.82.239.54
May  8 21:42:07 shared03 sshd[1909]: Invalid user 3 from 58.82.239.54 port 25412
May  8 21:42:08 shared03 sshd[1909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.82.239.54
May  8 21:42:10 shared03 sshd[1909]: Failed password for invalid user 3 from 58.82.239.54 port 25412 ssh2
May  8 21:42:10 shared03 sshd[1909]: Connection closed by invalid user 3 58.82.239.54 port 25412 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=58.82.239.54
2020-05-10 12:46:32
189.18.106.156 attack
Automatic report - Port Scan Attack
2020-05-10 12:49:50
180.182.47.132 attack
May 10 07:15:20 vps333114 sshd[9717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132
May 10 07:15:21 vps333114 sshd[9717]: Failed password for invalid user admin from 180.182.47.132 port 40418 ssh2
...
2020-05-10 13:11:40
218.108.119.132 attack
May 10 06:44:22 localhost sshd\[30379\]: Invalid user www1 from 218.108.119.132
May 10 06:44:22 localhost sshd\[30379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.119.132
May 10 06:44:25 localhost sshd\[30379\]: Failed password for invalid user www1 from 218.108.119.132 port 58380 ssh2
May 10 06:50:42 localhost sshd\[30802\]: Invalid user rocha from 218.108.119.132
May 10 06:50:42 localhost sshd\[30802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.108.119.132
...
2020-05-10 13:01:19

最近上报的IP列表

149.129.248.12 149.129.208.172 149.129.233.206 149.13.127.33
149.126.6.21 149.126.79.134 149.154.68.153 149.20.253.241
149.202.136.18 149.20.253.107 149.202.114.184 149.20.253.80
149.202.246.102 149.202.246.110 149.202.251.228 149.202.144.61
149.210.160.211 149.248.10.111 149.210.189.242 149.28.145.253