必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Portugal

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.230.117.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58410
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.230.117.134.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:22:05 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
134.117.230.161.in-addr.arpa domain name pointer 134.117.230.161.rev.vodafone.pt.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.117.230.161.in-addr.arpa	name = 134.117.230.161.rev.vodafone.pt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.121.211.34 attack
Jul 22 16:58:05 vps687878 sshd\[11045\]: Failed password for invalid user username from 91.121.211.34 port 32824 ssh2
Jul 22 17:02:07 vps687878 sshd\[11221\]: Invalid user villa from 91.121.211.34 port 44400
Jul 22 17:02:07 vps687878 sshd\[11221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.34
Jul 22 17:02:09 vps687878 sshd\[11221\]: Failed password for invalid user villa from 91.121.211.34 port 44400 ssh2
Jul 22 17:06:10 vps687878 sshd\[11568\]: Invalid user aono from 91.121.211.34 port 55986
Jul 22 17:06:10 vps687878 sshd\[11568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.34
...
2020-07-23 00:49:47
121.134.159.21 attack
$f2bV_matches
2020-07-23 00:46:35
24.199.1.62 attack
SSH brute force
2020-07-23 00:12:21
51.254.36.178 attackspam
Jul 22 22:55:34 webhost01 sshd[16894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.36.178
Jul 22 22:55:36 webhost01 sshd[16894]: Failed password for invalid user kishore from 51.254.36.178 port 38950 ssh2
...
2020-07-23 00:06:10
124.114.177.107 attackspam
Brute forcing RDP port 3389
2020-07-23 00:40:50
223.71.167.165 attackbotsspam
223.71.167.165 was recorded 19 times by 5 hosts attempting to connect to the following ports: 2121,7002,27015,9443,7547,11310,2123,40000,1967,5555,15,10001,5050,2222,8086,1194,1400,3310,14147. Incident counter (4h, 24h, all-time): 19, 103, 24402
2020-07-23 00:12:52
54.37.159.45 attackspam
Jul 22 16:40:43 ns392434 sshd[4920]: Invalid user sajan from 54.37.159.45 port 47922
Jul 22 16:40:43 ns392434 sshd[4920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.159.45
Jul 22 16:40:43 ns392434 sshd[4920]: Invalid user sajan from 54.37.159.45 port 47922
Jul 22 16:40:45 ns392434 sshd[4920]: Failed password for invalid user sajan from 54.37.159.45 port 47922 ssh2
Jul 22 16:48:45 ns392434 sshd[5045]: Invalid user tor from 54.37.159.45 port 49722
Jul 22 16:48:45 ns392434 sshd[5045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.159.45
Jul 22 16:48:45 ns392434 sshd[5045]: Invalid user tor from 54.37.159.45 port 49722
Jul 22 16:48:46 ns392434 sshd[5045]: Failed password for invalid user tor from 54.37.159.45 port 49722 ssh2
Jul 22 16:53:29 ns392434 sshd[5210]: Invalid user theresa from 54.37.159.45 port 36424
2020-07-23 00:14:59
106.52.12.21 attackbotsspam
Jul 22 18:04:23 abendstille sshd\[28046\]: Invalid user lyt from 106.52.12.21
Jul 22 18:04:23 abendstille sshd\[28046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.12.21
Jul 22 18:04:26 abendstille sshd\[28046\]: Failed password for invalid user lyt from 106.52.12.21 port 48954 ssh2
Jul 22 18:09:12 abendstille sshd\[300\]: Invalid user saitoh from 106.52.12.21
Jul 22 18:09:12 abendstille sshd\[300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.12.21
...
2020-07-23 00:20:39
106.13.232.193 attackbotsspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-07-23 00:44:43
60.167.182.202 attack
bruteforce detected
2020-07-23 00:15:49
222.186.175.154 attack
2020-07-22T12:05:03.237732vps2034 sshd[14991]: Failed password for root from 222.186.175.154 port 55200 ssh2
2020-07-22T12:05:05.949620vps2034 sshd[14991]: Failed password for root from 222.186.175.154 port 55200 ssh2
2020-07-22T12:05:09.073029vps2034 sshd[14991]: Failed password for root from 222.186.175.154 port 55200 ssh2
2020-07-22T12:05:13.004504vps2034 sshd[14991]: Failed password for root from 222.186.175.154 port 55200 ssh2
2020-07-22T12:05:16.541826vps2034 sshd[14991]: Failed password for root from 222.186.175.154 port 55200 ssh2
...
2020-07-23 00:09:35
62.234.137.128 attackbotsspam
Jul 22 15:51:04 ajax sshd[16108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.137.128 
Jul 22 15:51:05 ajax sshd[16108]: Failed password for invalid user jian from 62.234.137.128 port 53034 ssh2
2020-07-23 00:50:00
222.186.31.83 attack
Jul 22 17:58:02 v22018053744266470 sshd[28187]: Failed password for root from 222.186.31.83 port 64717 ssh2
Jul 22 17:58:13 v22018053744266470 sshd[28198]: Failed password for root from 222.186.31.83 port 26761 ssh2
...
2020-07-23 00:04:38
112.85.42.178 attackspam
2020-07-22T18:07:06.944288vps751288.ovh.net sshd\[23619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
2020-07-22T18:07:08.898423vps751288.ovh.net sshd\[23619\]: Failed password for root from 112.85.42.178 port 23591 ssh2
2020-07-22T18:07:11.909602vps751288.ovh.net sshd\[23619\]: Failed password for root from 112.85.42.178 port 23591 ssh2
2020-07-22T18:07:15.632968vps751288.ovh.net sshd\[23619\]: Failed password for root from 112.85.42.178 port 23591 ssh2
2020-07-22T18:07:20.119491vps751288.ovh.net sshd\[23619\]: Failed password for root from 112.85.42.178 port 23591 ssh2
2020-07-23 00:14:37
198.12.248.181 attack
Brute forcing email accounts
2020-07-23 00:28:25

最近上报的IP列表

186.160.134.59 149.26.99.12 75.231.102.98 252.166.2.74
41.148.181.15 77.214.177.198 19.131.158.171 182.10.20.3
97.246.104.227 171.31.158.161 91.147.158.39 215.245.32.193
237.39.211.109 43.175.95.124 145.208.196.9 141.208.211.131
196.41.23.248 61.111.205.247 239.49.114.79 244.247.250.35