必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.255.134.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.255.134.124.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 19:36:40 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 124.134.255.196.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.134.255.196.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
34.250.179.24 attackspam
Nov  5 18:21:32 server sshd\[19649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-250-179-24.eu-west-1.compute.amazonaws.com  user=root
Nov  5 18:21:34 server sshd\[19649\]: Failed password for root from 34.250.179.24 port 38716 ssh2
Nov  5 19:03:39 server sshd\[29765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-250-179-24.eu-west-1.compute.amazonaws.com  user=root
Nov  5 19:03:41 server sshd\[29765\]: Failed password for root from 34.250.179.24 port 47096 ssh2
Nov  5 19:45:26 server sshd\[8633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-250-179-24.eu-west-1.compute.amazonaws.com  user=root
...
2019-11-06 01:05:28
49.73.61.26 attackspam
Nov  5 17:30:07 ns381471 sshd[7961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.61.26
Nov  5 17:30:09 ns381471 sshd[7961]: Failed password for invalid user demo from 49.73.61.26 port 47406 ssh2
2019-11-06 00:43:33
151.80.254.75 attackbotsspam
Nov  5 15:14:59 vtv3 sshd\[15267\]: Invalid user git from 151.80.254.75 port 49964
Nov  5 15:14:59 vtv3 sshd\[15267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.75
Nov  5 15:15:01 vtv3 sshd\[15267\]: Failed password for invalid user git from 151.80.254.75 port 49964 ssh2
Nov  5 15:18:58 vtv3 sshd\[17735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.75  user=root
Nov  5 15:19:00 vtv3 sshd\[17735\]: Failed password for root from 151.80.254.75 port 60094 ssh2
Nov  5 15:30:25 vtv3 sshd\[25151\]: Invalid user user from 151.80.254.75 port 34096
Nov  5 15:30:25 vtv3 sshd\[25151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.75
Nov  5 15:30:27 vtv3 sshd\[25151\]: Failed password for invalid user user from 151.80.254.75 port 34096 ssh2
Nov  5 15:34:20 vtv3 sshd\[27233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=
2019-11-06 01:11:16
213.206.46.170 attack
Automatic report - Port Scan Attack
2019-11-06 01:08:13
5.152.159.31 attack
Nov  5 17:18:03 server sshd\[3961\]: Invalid user ubnt from 5.152.159.31
Nov  5 17:18:03 server sshd\[3961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.152.159.31 
Nov  5 17:18:04 server sshd\[3961\]: Failed password for invalid user ubnt from 5.152.159.31 port 54146 ssh2
Nov  5 17:39:31 server sshd\[8981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.152.159.31  user=root
Nov  5 17:39:32 server sshd\[8981\]: Failed password for root from 5.152.159.31 port 36642 ssh2
...
2019-11-06 00:39:27
217.243.172.58 attackspam
Nov  5 17:15:14 SilenceServices sshd[18511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.243.172.58
Nov  5 17:15:15 SilenceServices sshd[18511]: Failed password for invalid user qqwwee123 from 217.243.172.58 port 49596 ssh2
Nov  5 17:18:56 SilenceServices sshd[20953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.243.172.58
2019-11-06 00:48:11
161.53.18.64 attackspam
Bot ignores robot.txt restrictions
2019-11-06 00:55:55
179.178.161.42 attack
Unauthorised access (Nov  5) SRC=179.178.161.42 LEN=52 TOS=0x10 PREC=0x40 TTL=115 ID=13986 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-06 01:06:25
132.232.228.86 attackbotsspam
Nov  5 05:24:36 eddieflores sshd\[8367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.228.86  user=root
Nov  5 05:24:38 eddieflores sshd\[8367\]: Failed password for root from 132.232.228.86 port 43500 ssh2
Nov  5 05:30:58 eddieflores sshd\[9216\]: Invalid user fi from 132.232.228.86
Nov  5 05:30:58 eddieflores sshd\[9216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.228.86
Nov  5 05:31:00 eddieflores sshd\[9216\]: Failed password for invalid user fi from 132.232.228.86 port 53664 ssh2
2019-11-06 00:47:22
163.172.26.143 attackspambots
Nov  5 15:31:13 vps58358 sshd\[2099\]: Invalid user temp1 from 163.172.26.143Nov  5 15:31:15 vps58358 sshd\[2099\]: Failed password for invalid user temp1 from 163.172.26.143 port 7606 ssh2Nov  5 15:34:47 vps58358 sshd\[2108\]: Invalid user amavis from 163.172.26.143Nov  5 15:34:49 vps58358 sshd\[2108\]: Failed password for invalid user amavis from 163.172.26.143 port 47244 ssh2Nov  5 15:38:23 vps58358 sshd\[2130\]: Invalid user users from 163.172.26.143Nov  5 15:38:25 vps58358 sshd\[2130\]: Failed password for invalid user users from 163.172.26.143 port 22956 ssh2
...
2019-11-06 01:19:24
123.191.133.216 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/123.191.133.216/ 
 
 CN - 1H : (636)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 123.191.133.216 
 
 CIDR : 123.188.0.0/14 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 11 
  3H - 33 
  6H - 57 
 12H - 97 
 24H - 232 
 
 DateTime : 2019-11-05 15:39:32 
 
 INFO : Server 403 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-06 00:38:40
218.92.0.207 attack
Nov  5 17:48:19 eventyay sshd[1977]: Failed password for root from 218.92.0.207 port 12650 ssh2
Nov  5 17:49:00 eventyay sshd[1980]: Failed password for root from 218.92.0.207 port 16589 ssh2
...
2019-11-06 00:53:56
74.82.47.13 attackspambots
11211/tcp 389/tcp 5900/tcp...
[2019-09-05/11-04]45pkt,13pt.(tcp),1pt.(udp)
2019-11-06 01:08:57
36.235.79.24 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/36.235.79.24/ 
 
 TW - 1H : (146)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 36.235.79.24 
 
 CIDR : 36.235.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 6 
  3H - 6 
  6H - 24 
 12H - 74 
 24H - 143 
 
 DateTime : 2019-11-05 15:38:50 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-06 01:01:19
212.31.112.180 attackspambots
Nov  5 16:42:44 vmanager6029 sshd\[7714\]: Invalid user jq from 212.31.112.180 port 40940
Nov  5 16:42:44 vmanager6029 sshd\[7714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.31.112.180
Nov  5 16:42:47 vmanager6029 sshd\[7714\]: Failed password for invalid user jq from 212.31.112.180 port 40940 ssh2
2019-11-06 00:44:12

最近上报的IP列表

220.27.177.50 38.83.251.39 90.33.68.149 246.100.235.34
155.225.165.63 83.99.119.86 215.82.183.216 32.106.198.111
64.224.155.122 12.3.45.171 84.90.226.80 103.186.86.238
233.91.103.84 197.186.149.243 141.206.77.89 254.230.81.13
192.224.14.147 122.102.143.22 22.137.83.126 173.7.222.86