必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.4.203.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.4.203.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:34:02 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 134.203.4.164.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.203.4.164.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.12.152.118 attackbots
WordPress wp-login brute force :: 198.12.152.118 0.132 BYPASS [30/Aug/2019:17:39:06  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-30 17:03:52
181.41.215.177 attack
SSH Bruteforce attack
2019-08-30 17:21:55
170.231.133.85 attackbots
2019-08-30T07:29:43.024200static.108.197.76.144.clients.your-server.de sshd[9667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.231.133.85  user=r.r
2019-08-30T07:29:44.511149static.108.197.76.144.clients.your-server.de sshd[9667]: Failed password for r.r from 170.231.133.85 port 36283 ssh2
2019-08-30T07:29:46.346627static.108.197.76.144.clients.your-server.de sshd[9667]: Failed password for r.r from 170.231.133.85 port 36283 ssh2
2019-08-30T07:29:48.453897static.108.197.76.144.clients.your-server.de sshd[9667]: Failed password for r.r from 170.231.133.85 port 36283 ssh2
2019-08-30T07:29:51.173100static.108.197.76.144.clients.your-server.de sshd[9667]: Failed password for r.r from 170.231.133.85 port 36283 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=170.231.133.85
2019-08-30 16:41:58
171.84.2.4 attack
Automatic report - Banned IP Access
2019-08-30 17:03:30
122.246.245.46 attack
Aug 30 07:27:42 mxgate1 postfix/postscreen[6913]: CONNECT from [122.246.245.46]:60036 to [176.31.12.44]:25
Aug 30 07:27:42 mxgate1 postfix/dnsblog[7319]: addr 122.246.245.46 listed by domain zen.spamhaus.org as 127.0.0.11
Aug 30 07:27:48 mxgate1 postfix/postscreen[6913]: DNSBL rank 2 for [122.246.245.46]:60036
Aug x@x
Aug 30 07:27:50 mxgate1 postfix/postscreen[6913]: DISCONNECT [122.246.245.46]:60036


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.246.245.46
2019-08-30 16:38:08
185.214.10.76 attack
Looking for resource vulnerabilities
2019-08-30 16:45:06
45.58.115.44 attackbots
2019-08-30T05:45:42.566095abusebot.cloudsearch.cf sshd\[21450\]: Invalid user admin1 from 45.58.115.44 port 51738
2019-08-30 17:20:23
201.159.79.202 attack
...
2019-08-30 16:54:30
149.28.67.130 attackspam
[portscan] tcp/23 [TELNET]
[scan/connect: 2 time(s)]
*(RWIN=8192)(08301000)
2019-08-30 16:55:43
62.210.149.30 attackbotsspam
\[2019-08-30 04:20:38\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-30T04:20:38.217-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="88430012342186069",SessionID="0x7f7b30db7498",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/51492",ACLName="no_extension_match"
\[2019-08-30 04:21:30\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-30T04:21:30.305-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="29501112342186069",SessionID="0x7f7b30364938",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/56541",ACLName="no_extension_match"
\[2019-08-30 04:24:10\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-30T04:24:10.002-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="39620012342186069",SessionID="0x7f7b30d66ff8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/50240",ACLName="
2019-08-30 16:43:49
142.93.81.77 attackbotsspam
Aug 30 18:16:25 [hidden] sshd[4974]: refused connect from 142.93.81.77 (142.93.81.77)
Aug 30 18:21:06 [hidden] sshd[5095]: refused connect from 142.93.81.77 (142.93.81.77)
Aug 30 18:26:37 [hidden] sshd[5229]: refused connect from 142.93.81.77 (142.93.81.77)
2019-08-30 17:10:53
103.127.64.214 attack
Aug 30 10:33:44 lnxweb61 sshd[10846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.127.64.214
2019-08-30 17:08:37
177.184.133.41 attack
Aug 30 05:02:28 plusreed sshd[5552]: Invalid user shipping from 177.184.133.41
...
2019-08-30 17:13:13
68.183.230.224 attackbotsspam
Aug 30 04:17:20 TORMINT sshd\[22563\]: Invalid user osvi from 68.183.230.224
Aug 30 04:17:20 TORMINT sshd\[22563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.224
Aug 30 04:17:22 TORMINT sshd\[22563\]: Failed password for invalid user osvi from 68.183.230.224 port 51346 ssh2
...
2019-08-30 16:40:22
45.167.250.18 attack
Invalid user williams from 45.167.250.18 port 52776
2019-08-30 17:18:59

最近上报的IP列表

125.225.222.52 165.179.132.149 253.204.211.46 14.220.124.100
177.131.84.93 194.174.169.171 96.192.124.132 120.130.216.162
66.86.31.252 244.128.143.217 83.219.181.18 121.14.67.38
173.29.170.0 99.114.57.139 193.20.70.40 181.115.231.101
17.196.71.87 248.181.249.82 101.239.84.105 251.157.69.119