必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 170.34.211.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22562
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;170.34.211.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 09:40:38 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 142.211.34.170.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.211.34.170.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.114.107.129 attackbotsspam
May 16 22:34:31 debian-2gb-nbg1-2 kernel: \[11920114.141044\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.114.107.129 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=819 PROTO=TCP SPT=59961 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-17 07:10:37
106.13.160.55 attackbots
Invalid user dan from 106.13.160.55 port 60546
2020-05-17 07:10:18
129.211.92.41 attackbots
Invalid user get from 129.211.92.41 port 42530
2020-05-17 07:09:56
218.92.0.158 attackspambots
May 17 00:58:00 ns381471 sshd[32339]: Failed password for root from 218.92.0.158 port 52532 ssh2
May 17 00:58:13 ns381471 sshd[32339]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 52532 ssh2 [preauth]
2020-05-17 07:05:22
222.127.97.91 attackspambots
Invalid user backuppc from 222.127.97.91 port 16622
2020-05-17 07:23:16
79.232.175.146 attackbots
May 17 02:14:01 hosting sshd[20774]: Invalid user azureadmin from 79.232.175.146 port 36376
...
2020-05-17 07:35:21
129.226.53.203 attack
May 17 01:01:44 srv-ubuntu-dev3 sshd[107192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.53.203  user=root
May 17 01:01:46 srv-ubuntu-dev3 sshd[107192]: Failed password for root from 129.226.53.203 port 37414 ssh2
May 17 01:04:57 srv-ubuntu-dev3 sshd[107638]: Invalid user saul from 129.226.53.203
May 17 01:04:57 srv-ubuntu-dev3 sshd[107638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.53.203
May 17 01:04:57 srv-ubuntu-dev3 sshd[107638]: Invalid user saul from 129.226.53.203
May 17 01:04:58 srv-ubuntu-dev3 sshd[107638]: Failed password for invalid user saul from 129.226.53.203 port 46298 ssh2
May 17 01:08:06 srv-ubuntu-dev3 sshd[108159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.53.203  user=root
May 17 01:08:08 srv-ubuntu-dev3 sshd[108159]: Failed password for root from 129.226.53.203 port 55182 ssh2
May 17 01:11:19 srv-ubuntu-de
...
2020-05-17 07:27:48
181.30.28.247 attack
Invalid user lb from 181.30.28.247 port 60174
2020-05-17 07:42:47
114.232.109.164 attack
Brute Force - Postfix
2020-05-17 07:00:29
125.124.143.182 attackbotsspam
May 17 02:02:55 lukav-desktop sshd\[28377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.143.182  user=root
May 17 02:02:57 lukav-desktop sshd\[28377\]: Failed password for root from 125.124.143.182 port 40888 ssh2
May 17 02:06:49 lukav-desktop sshd\[2842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.143.182  user=root
May 17 02:06:51 lukav-desktop sshd\[2842\]: Failed password for root from 125.124.143.182 port 38636 ssh2
May 17 02:10:38 lukav-desktop sshd\[28025\]: Invalid user azure from 125.124.143.182
2020-05-17 07:14:59
106.12.87.149 attack
SSH Brute Force
2020-05-17 07:32:11
193.228.109.189 attackbotsspam
Invalid user telcel3 from 193.228.109.189 port 46550
2020-05-17 07:24:58
87.251.74.196 attackspambots
Multiport scan : 110 ports scanned 10000 10025 10036 10039 10045 10064 10071 10073 10078 10098 10105 10130 10145 10154 10159 10186 10191 10198 10211 10218 10236 10243 10250 10252 10259 10261 10268 10273 10284 10291 10295 10296 10300 10302 10326 10367 10386 10404 10407 10426 10429 10436 10458 10462 10471 10479 10481 10487 10490 10494 10502 10529 10534 10557 10558 10564 10585 10590 10596 10609 10617 10623 10624 10655 10661 10663 10664 .....
2020-05-17 07:01:18
218.78.81.207 attackspambots
Invalid user rustserver from 218.78.81.207 port 41008
2020-05-17 07:00:09
23.241.217.51 attackspambots
Invalid user mongo
2020-05-17 07:12:13

最近上报的IP列表

98.1.37.33 23.63.214.16 84.205.66.187 125.155.165.124
193.242.229.44 127.85.14.40 211.58.9.229 216.10.90.94
211.77.147.155 58.190.197.116 100.221.43.2 206.151.125.150
41.249.182.209 54.213.59.219 146.38.132.80 198.30.45.41
189.41.44.128 69.47.44.93 224.46.144.85 55.1.111.249