必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Guatemala

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.234.185.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;168.234.185.80.			IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031600 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 23:23:06 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 80.185.234.168.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.185.234.168.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.55.39.250 attack
Automatic report - Banned IP Access
2019-08-24 06:59:29
171.61.129.94 attackbots
Lines containing failures of 171.61.129.94
Aug 23 17:54:52 myhost sshd[16821]: User r.r from 171.61.129.94 not allowed because not listed in AllowUsers
Aug 23 17:54:52 myhost sshd[16821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.61.129.94  user=r.r
Aug 23 17:54:54 myhost sshd[16821]: Failed password for invalid user r.r from 171.61.129.94 port 41243 ssh2
Aug 23 17:55:05 myhost sshd[16821]: message repeated 5 serveres: [ Failed password for invalid user r.r from 171.61.129.94 port 41243 ssh2]
Aug 23 17:55:05 myhost sshd[16821]: error: maximum authentication attempts exceeded for invalid user r.r from 171.61.129.94 port 41243 ssh2 [preauth]
Aug 23 17:55:05 myhost sshd[16821]: Disconnecting invalid user r.r 171.61.129.94 port 41243: Too many authentication failures [preauth]
Aug 23 17:55:05 myhost sshd[16821]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.61.129.94  user=r.r


........
----------------------------------------
2019-08-24 07:03:20
115.194.188.98 attackspam
Invalid user linuxacademy from 115.194.188.98 port 35380
2019-08-24 07:00:37
58.242.228.153 attackbotsspam
[Aegis] @ 2019-08-23 22:33:08  0100 -> Maximum authentication attempts exceeded.
2019-08-24 07:16:53
142.93.102.38 attackspam
NAME : DO-13 CIDR : 142.93.0.0/16 | EMAIL - SPAM {Looking for resource vulnerabilities} DDoS Attack US - block certain countries :) IP: 142.93.102.38  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-24 06:50:48
134.209.99.53 attackspam
Aug 23 08:18:15 kapalua sshd\[19115\]: Invalid user jag from 134.209.99.53
Aug 23 08:18:15 kapalua sshd\[19115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.99.53
Aug 23 08:18:18 kapalua sshd\[19115\]: Failed password for invalid user jag from 134.209.99.53 port 60784 ssh2
Aug 23 08:22:55 kapalua sshd\[19505\]: Invalid user admin from 134.209.99.53
Aug 23 08:22:55 kapalua sshd\[19505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.99.53
2019-08-24 06:53:01
211.75.194.80 attack
Aug 23 12:53:23 friendsofhawaii sshd\[29960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-75-194-80.hinet-ip.hinet.net  user=root
Aug 23 12:53:25 friendsofhawaii sshd\[29960\]: Failed password for root from 211.75.194.80 port 48940 ssh2
Aug 23 12:57:54 friendsofhawaii sshd\[30311\]: Invalid user aliza from 211.75.194.80
Aug 23 12:57:54 friendsofhawaii sshd\[30311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-75-194-80.hinet-ip.hinet.net
Aug 23 12:57:56 friendsofhawaii sshd\[30311\]: Failed password for invalid user aliza from 211.75.194.80 port 37028 ssh2
2019-08-24 07:11:01
218.241.134.34 attackspam
Aug 23 22:03:33 ip-172-31-1-72 sshd\[26024\]: Invalid user teamspeak2 from 218.241.134.34
Aug 23 22:03:33 ip-172-31-1-72 sshd\[26024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.134.34
Aug 23 22:03:36 ip-172-31-1-72 sshd\[26024\]: Failed password for invalid user teamspeak2 from 218.241.134.34 port 23662 ssh2
Aug 23 22:05:17 ip-172-31-1-72 sshd\[26084\]: Invalid user hadoop from 218.241.134.34
Aug 23 22:05:17 ip-172-31-1-72 sshd\[26084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.134.34
2019-08-24 06:53:23
113.194.90.28 attackspam
Aug 23 20:38:26 docs sshd\[63887\]: Invalid user aaaaa from 113.194.90.28Aug 23 20:38:28 docs sshd\[63887\]: Failed password for invalid user aaaaa from 113.194.90.28 port 59338 ssh2Aug 23 20:42:36 docs sshd\[63954\]: Invalid user hadoop from 113.194.90.28Aug 23 20:42:39 docs sshd\[63954\]: Failed password for invalid user hadoop from 113.194.90.28 port 35146 ssh2Aug 23 20:46:46 docs sshd\[64026\]: Invalid user xerox from 113.194.90.28Aug 23 20:46:48 docs sshd\[64026\]: Failed password for invalid user xerox from 113.194.90.28 port 39190 ssh2
...
2019-08-24 06:51:26
222.134.232.60 attackbots
8081/tcp
[2019-08-21]2pkt
2019-08-24 07:15:34
178.151.211.43 attackbotsspam
Splunk® : port scan detected:
Aug 23 12:15:19 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=178.151.211.43 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=17662 PROTO=TCP SPT=54810 DPT=5555 WINDOW=62329 RES=0x00 SYN URGP=0
2019-08-24 07:28:36
1.173.121.251 attackbots
37215/tcp 37215/tcp
[2019-08-20/23]2pkt
2019-08-24 07:19:56
80.211.113.34 attack
Aug 24 01:02:40 legacy sshd[14234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.34
Aug 24 01:02:42 legacy sshd[14234]: Failed password for invalid user wls from 80.211.113.34 port 49614 ssh2
Aug 24 01:06:46 legacy sshd[14306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.113.34
...
2019-08-24 07:32:55
179.181.4.142 attackspambots
Unauthorised access (Aug 23) SRC=179.181.4.142 LEN=52 TOS=0x10 PREC=0x40 TTL=113 ID=9668 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-24 07:07:20
103.81.69.22 attackbotsspam
2019-08-23T22:03:49.518957abusebot.cloudsearch.cf sshd\[14594\]: Invalid user server from 103.81.69.22 port 49732
2019-08-23T22:03:49.523811abusebot.cloudsearch.cf sshd\[14594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.69.22
2019-08-24 06:57:34

最近上报的IP列表

185.72.123.92 99.79.240.147 79.124.62.10 10.40.158.119
197.3.7.177 14.169.30.197 85.105.177.98 15.250.144.201
63.82.48.182 14.176.64.101 72.173.24.96 78.31.246.104
212.95.144.211 201.212.255.164 13.74.156.41 94.25.171.217
168.187.86.33 88.214.26.13 180.244.134.128 46.38.145.5