必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.133.59.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.133.59.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 01:52:33 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 34.59.133.199.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 34.59.133.199.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
175.207.219.185 attack
*Port Scan* detected from 175.207.219.185 (KR/South Korea/-). 4 hits in the last 21 seconds
2019-10-16 07:13:03
50.63.166.50 attackspam
Authentication failure for eboney
2019-10-16 07:20:47
92.118.38.37 attackspam
Oct 16 01:22:38 vmanager6029 postfix/smtpd\[21780\]: warning: unknown\[92.118.38.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 16 01:23:14 vmanager6029 postfix/smtpd\[21714\]: warning: unknown\[92.118.38.37\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-16 07:25:33
101.36.150.231 attackspam
Lines containing failures of 101.36.150.231
Oct 15 18:56:21 nextcloud sshd[6956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.150.231  user=r.r
Oct 15 18:56:23 nextcloud sshd[6956]: Failed password for r.r from 101.36.150.231 port 45980 ssh2
Oct 15 18:56:24 nextcloud sshd[6956]: Received disconnect from 101.36.150.231 port 45980:11: Bye Bye [preauth]
Oct 15 18:56:24 nextcloud sshd[6956]: Disconnected from authenticating user r.r 101.36.150.231 port 45980 [preauth]
Oct 15 19:14:34 nextcloud sshd[9838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.150.231  user=games
Oct 15 19:14:36 nextcloud sshd[9838]: Failed password for games from 101.36.150.231 port 32958 ssh2
Oct 15 19:14:36 nextcloud sshd[9838]: Received disconnect from 101.36.150.231 port 32958:11: Bye Bye [preauth]
Oct 15 19:14:36 nextcloud sshd[9838]: Disconnected from authenticating user games 101.36.150.231 port........
------------------------------
2019-10-16 07:08:07
37.156.28.212 attack
Automatic report - Port Scan
2019-10-16 07:38:43
178.62.244.194 attackspambots
Oct 15 12:34:03 sachi sshd\[3779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.244.194  user=root
Oct 15 12:34:05 sachi sshd\[3779\]: Failed password for root from 178.62.244.194 port 51711 ssh2
Oct 15 12:38:44 sachi sshd\[4134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.244.194  user=root
Oct 15 12:38:46 sachi sshd\[4134\]: Failed password for root from 178.62.244.194 port 43209 ssh2
Oct 15 12:43:24 sachi sshd\[4577\]: Invalid user aagesen from 178.62.244.194
Oct 15 12:43:24 sachi sshd\[4577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.244.194
2019-10-16 07:06:13
183.82.100.141 attackbotsspam
2019-10-15T23:08:01.644285shield sshd\[24772\]: Invalid user limin from 183.82.100.141 port 18346
2019-10-15T23:08:01.649654shield sshd\[24772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.100.141
2019-10-15T23:08:03.871360shield sshd\[24772\]: Failed password for invalid user limin from 183.82.100.141 port 18346 ssh2
2019-10-15T23:14:56.139231shield sshd\[25585\]: Invalid user administrator from 183.82.100.141 port 5410
2019-10-15T23:14:56.144830shield sshd\[25585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.100.141
2019-10-16 07:18:00
202.46.129.204 attack
C1,WP GET /suche/wp-login.php
2019-10-16 07:31:54
195.154.169.186 attack
Oct 15 23:57:25 v22018076622670303 sshd\[26043\]: Invalid user 1 from 195.154.169.186 port 46994
Oct 15 23:57:25 v22018076622670303 sshd\[26043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.169.186
Oct 15 23:57:27 v22018076622670303 sshd\[26043\]: Failed password for invalid user 1 from 195.154.169.186 port 46994 ssh2
...
2019-10-16 07:04:59
18.197.107.157 attack
" "
2019-10-16 07:35:51
41.213.216.242 attackbots
Oct 16 00:42:55 vmanager6029 sshd\[21045\]: Invalid user be from 41.213.216.242 port 42238
Oct 16 00:42:55 vmanager6029 sshd\[21045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.213.216.242
Oct 16 00:42:58 vmanager6029 sshd\[21045\]: Failed password for invalid user be from 41.213.216.242 port 42238 ssh2
2019-10-16 07:19:19
159.203.75.13 attack
2019-10-15T21:41:36.970470abusebot-6.cloudsearch.cf sshd\[29176\]: Invalid user oracle from 159.203.75.13 port 58782
2019-10-16 07:13:38
157.230.251.115 attackspam
Oct 15 12:47:41 hpm sshd\[5358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.251.115  user=root
Oct 15 12:47:43 hpm sshd\[5358\]: Failed password for root from 157.230.251.115 port 45092 ssh2
Oct 15 12:52:04 hpm sshd\[5735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.251.115  user=root
Oct 15 12:52:05 hpm sshd\[5735\]: Failed password for root from 157.230.251.115 port 55798 ssh2
Oct 15 12:56:36 hpm sshd\[6087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.251.115  user=root
2019-10-16 07:12:19
39.64.193.37 attack
Oct 15 19:54:44 localhost sshd\[130210\]: Invalid user pi from 39.64.193.37 port 51920
Oct 15 19:54:44 localhost sshd\[130211\]: Invalid user pi from 39.64.193.37 port 51918
Oct 15 19:54:44 localhost sshd\[130210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.64.193.37
Oct 15 19:54:44 localhost sshd\[130211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.64.193.37
Oct 15 19:54:46 localhost sshd\[130210\]: Failed password for invalid user pi from 39.64.193.37 port 51920 ssh2
...
2019-10-16 07:03:29
191.34.162.186 attack
2019-10-15T15:50:10.879723ns525875 sshd\[1682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.162.186  user=root
2019-10-15T15:50:12.419750ns525875 sshd\[1682\]: Failed password for root from 191.34.162.186 port 58882 ssh2
2019-10-15T15:54:39.574563ns525875 sshd\[7311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.162.186  user=root
2019-10-15T15:54:41.376218ns525875 sshd\[7311\]: Failed password for root from 191.34.162.186 port 56301 ssh2
...
2019-10-16 07:26:00

最近上报的IP列表

84.61.113.95 25.23.191.207 47.218.239.211 229.13.120.169
251.31.171.167 69.65.62.44 123.220.62.247 213.95.71.93
29.238.15.127 33.98.20.232 39.145.132.237 179.236.154.81
4.201.20.49 247.79.145.14 173.198.167.66 76.117.173.230
169.168.48.37 58.103.80.112 154.118.89.110 235.132.250.126