必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Poland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.147.34.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.147.34.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 05:21:20 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 219.34.147.194.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.34.147.194.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
169.255.77.212 attackspambots
1578631971 - 01/10/2020 05:52:51 Host: 169.255.77.212/169.255.77.212 Port: 445 TCP Blocked
2020-01-10 16:41:18
186.208.20.2 attackspambots
1578631944 - 01/10/2020 05:52:24 Host: 186.208.20.2/186.208.20.2 Port: 445 TCP Blocked
2020-01-10 16:59:01
139.59.34.17 attack
2020-01-10T07:51:36.113884abusebot-6.cloudsearch.cf sshd[536]: Invalid user cpanel from 139.59.34.17 port 46078
2020-01-10T07:51:36.119960abusebot-6.cloudsearch.cf sshd[536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pyrumas.com
2020-01-10T07:51:36.113884abusebot-6.cloudsearch.cf sshd[536]: Invalid user cpanel from 139.59.34.17 port 46078
2020-01-10T07:51:37.916746abusebot-6.cloudsearch.cf sshd[536]: Failed password for invalid user cpanel from 139.59.34.17 port 46078 ssh2
2020-01-10T07:53:46.034067abusebot-6.cloudsearch.cf sshd[651]: Invalid user ftpuser from 139.59.34.17 port 37954
2020-01-10T07:53:46.041589abusebot-6.cloudsearch.cf sshd[651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pyrumas.com
2020-01-10T07:53:46.034067abusebot-6.cloudsearch.cf sshd[651]: Invalid user ftpuser from 139.59.34.17 port 37954
2020-01-10T07:53:48.687466abusebot-6.cloudsearch.cf sshd[651]: Failed password for inva
...
2020-01-10 17:06:02
188.138.41.207 attack
10.01.2020 05:52:29 - Bad Robot 
Ignore Robots.txt
2020-01-10 16:57:04
71.46.255.70 attackbotsspam
Jan  9 23:52:57 mail sshd\[45143\]: Invalid user zena from 71.46.255.70
Jan  9 23:52:57 mail sshd\[45143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.46.255.70
...
2020-01-10 16:36:35
61.250.146.33 attack
kp-sea2-01 recorded 2 login violations from 61.250.146.33 and was blocked at 2020-01-10 05:14:41. 61.250.146.33 has been blocked on 12 previous occasions. 61.250.146.33's first attempt was recorded at 2020-01-10 01:42:17
2020-01-10 16:31:04
145.239.83.89 attackbotsspam
Jan 10 06:05:35 legacy sshd[24009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.83.89
Jan 10 06:05:37 legacy sshd[24009]: Failed password for invalid user test2 from 145.239.83.89 port 42394 ssh2
Jan 10 06:08:41 legacy sshd[24189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.83.89
...
2020-01-10 17:01:05
118.71.229.53 attack
Telnet Server BruteForce Attack
2020-01-10 16:56:23
1.203.115.141 attackspambots
Jan 10 09:52:48 gw1 sshd[2999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.141
Jan 10 09:52:50 gw1 sshd[2999]: Failed password for invalid user administrator from 1.203.115.141 port 48451 ssh2
...
2020-01-10 16:42:25
125.214.56.98 attack
Unauthorised access (Jan 10) SRC=125.214.56.98 LEN=52 TTL=108 ID=19140 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-10 17:04:18
42.56.70.168 attackbotsspam
Jan 10 07:11:02 ourumov-web sshd\[5519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.56.70.168  user=root
Jan 10 07:11:03 ourumov-web sshd\[5519\]: Failed password for root from 42.56.70.168 port 59513 ssh2
Jan 10 07:14:20 ourumov-web sshd\[5736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.56.70.168  user=root
...
2020-01-10 16:33:36
159.203.201.127 attack
firewall-block, port(s): 587/tcp
2020-01-10 16:38:40
66.181.161.37 attackbotsspam
Unauthorised access (Jan 10) SRC=66.181.161.37 LEN=52 TTL=114 ID=10395 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-10 16:51:22
80.211.231.224 attackspambots
Jan 10 06:56:21 legacy sshd[26361]: Failed password for root from 80.211.231.224 port 34030 ssh2
Jan 10 06:59:35 legacy sshd[26550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.231.224
Jan 10 06:59:36 legacy sshd[26550]: Failed password for invalid user smc from 80.211.231.224 port 37032 ssh2
...
2020-01-10 17:07:20
188.13.167.103 attackspambots
$f2bV_matches
2020-01-10 16:49:56

最近上报的IP列表

2.156.198.163 128.165.114.157 54.228.219.246 42.51.113.64
246.25.105.227 190.29.92.185 211.171.76.100 222.239.127.89
70.226.138.204 21.71.241.25 233.147.40.162 91.77.153.157
148.114.171.254 58.239.133.180 163.159.226.26 20.16.47.176
188.75.143.213 125.25.67.212 27.65.7.159 250.60.41.65