必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Youngstown

省份(region): Ohio

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Youngstown State University

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.134.43.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44649
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;150.134.43.16.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat May 04 23:57:22 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 16.43.134.150.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 16.43.134.150.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.134.206.22 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/203.134.206.22/ 
 
 IN - 1H : (137)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IN 
 NAME ASN : ASN17917 
 
 IP : 203.134.206.22 
 
 CIDR : 203.134.206.0/23 
 
 PREFIX COUNT : 242 
 
 UNIQUE IP COUNT : 170752 
 
 
 ATTACKS DETECTED ASN17917 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-11-14 07:29:10 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-14 15:51:26
81.22.45.116 attackbotsspam
Nov 14 09:03:11 mc1 kernel: \[5004864.572138\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.116 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=27776 PROTO=TCP SPT=40333 DPT=64876 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 14 09:03:19 mc1 kernel: \[5004872.464165\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.116 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=15228 PROTO=TCP SPT=40333 DPT=64744 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 14 09:07:06 mc1 kernel: \[5005099.261487\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.116 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=29393 PROTO=TCP SPT=40333 DPT=64852 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-14 16:21:48
218.17.185.45 attack
Nov 14 09:11:21 dedicated sshd[3757]: Invalid user comer from 218.17.185.45 port 47862
2019-11-14 16:28:26
103.74.72.114 attack
UTC: 2019-11-13 port: 26/tcp
2019-11-14 16:01:37
177.52.63.96 attack
UTC: 2019-11-13 port: 23/tcp
2019-11-14 16:08:33
164.132.38.167 attack
Nov 14 08:48:41 SilenceServices sshd[12247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.38.167
Nov 14 08:48:43 SilenceServices sshd[12247]: Failed password for invalid user liew from 164.132.38.167 port 39663 ssh2
Nov 14 08:51:39 SilenceServices sshd[13072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.38.167
2019-11-14 16:00:06
114.64.255.207 attack
Nov 14 09:12:17 [host] sshd[16822]: Invalid user admin from 114.64.255.207
Nov 14 09:12:17 [host] sshd[16822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.64.255.207
Nov 14 09:12:19 [host] sshd[16822]: Failed password for invalid user admin from 114.64.255.207 port 60932 ssh2
2019-11-14 16:13:03
222.186.175.202 attackbots
2019-11-13T23:57:15.791978homeassistant sshd[8156]: Failed password for root from 222.186.175.202 port 37176 ssh2
2019-11-14T07:54:28.983683homeassistant sshd[10277]: Failed none for root from 222.186.175.202 port 57704 ssh2
2019-11-14T07:54:29.181604homeassistant sshd[10277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
...
2019-11-14 16:07:46
178.128.112.98 attackbotsspam
Nov 14 08:54:54 XXX sshd[19402]: Invalid user ofsaa from 178.128.112.98 port 52592
2019-11-14 16:07:02
45.224.105.67 attackspambots
Brute Force SMTP Port 25
2019-11-14 15:56:27
104.238.73.216 attackbotsspam
fail2ban honeypot
2019-11-14 15:53:52
106.13.69.54 attack
Nov 11 21:01:11 sanyalnet-cloud-vps4 sshd[4068]: Connection from 106.13.69.54 port 49066 on 64.137.160.124 port 23
Nov 11 21:01:13 sanyalnet-cloud-vps4 sshd[4068]: Invalid user art1 from 106.13.69.54
Nov 11 21:01:13 sanyalnet-cloud-vps4 sshd[4068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.69.54 
Nov 11 21:01:15 sanyalnet-cloud-vps4 sshd[4068]: Failed password for invalid user art1 from 106.13.69.54 port 49066 ssh2
Nov 11 21:01:16 sanyalnet-cloud-vps4 sshd[4068]: Received disconnect from 106.13.69.54: 11: Bye Bye [preauth]
Nov 11 21:09:02 sanyalnet-cloud-vps4 sshd[4245]: Connection from 106.13.69.54 port 36926 on 64.137.160.124 port 23
Nov 11 21:09:04 sanyalnet-cloud-vps4 sshd[4245]: Invalid user bruzual from 106.13.69.54
Nov 11 21:09:04 sanyalnet-cloud-vps4 sshd[4245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.69.54 
Nov 11 21:09:05 sanyalnet-cloud-vps4 sshd[4245]:........
-------------------------------
2019-11-14 16:20:28
191.186.153.85 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/191.186.153.85/ 
 
 BR - 1H : (341)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN28573 
 
 IP : 191.186.153.85 
 
 CIDR : 191.186.152.0/21 
 
 PREFIX COUNT : 1254 
 
 UNIQUE IP COUNT : 9653760 
 
 
 ATTACKS DETECTED ASN28573 :  
  1H - 3 
  3H - 11 
  6H - 14 
 12H - 29 
 24H - 39 
 
 DateTime : 2019-11-14 07:28:27 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-14 16:20:03
51.68.115.235 attackspambots
Nov 14 07:24:58 minden010 sshd[16537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.115.235
Nov 14 07:25:00 minden010 sshd[16537]: Failed password for invalid user xiaoping from 51.68.115.235 port 36297 ssh2
Nov 14 07:28:42 minden010 sshd[17778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.115.235
...
2019-11-14 16:02:08
51.91.110.249 attackbots
Automatic report - Banned IP Access
2019-11-14 16:11:07

最近上报的IP列表

183.239.235.93 178.128.163.39 44.250.53.170 210.195.166.110
128.157.215.249 116.229.29.217 200.92.151.32 209.239.115.30
156.91.138.130 186.125.192.206 188.152.238.214 102.165.35.55
52.184.97.142 113.235.164.228 122.11.205.164 95.64.54.109
194.67.199.242 93.196.210.253 79.61.109.11 205.185.121.194