必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.73.100.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.73.100.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 19:39:31 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 134.100.73.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.100.73.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.211.249 attackspam
2020-03-08T04:46:15.313911abusebot-7.cloudsearch.cf sshd[19465]: Invalid user airbot from 122.51.211.249 port 39764
2020-03-08T04:46:15.318298abusebot-7.cloudsearch.cf sshd[19465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.211.249
2020-03-08T04:46:15.313911abusebot-7.cloudsearch.cf sshd[19465]: Invalid user airbot from 122.51.211.249 port 39764
2020-03-08T04:46:17.874446abusebot-7.cloudsearch.cf sshd[19465]: Failed password for invalid user airbot from 122.51.211.249 port 39764 ssh2
2020-03-08T04:51:24.441922abusebot-7.cloudsearch.cf sshd[19728]: Invalid user tester from 122.51.211.249 port 34116
2020-03-08T04:51:24.445990abusebot-7.cloudsearch.cf sshd[19728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.211.249
2020-03-08T04:51:24.441922abusebot-7.cloudsearch.cf sshd[19728]: Invalid user tester from 122.51.211.249 port 34116
2020-03-08T04:51:26.420277abusebot-7.cloudsearch.cf sshd[19
...
2020-03-08 18:37:42
45.146.201.199 attackbotsspam
Mar  8 06:41:08 mail.srvfarm.net postfix/smtpd[3250222]: NOQUEUE: reject: RCPT from unknown[45.146.201.199]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  8 06:41:08 mail.srvfarm.net postfix/smtpd[3251595]: NOQUEUE: reject: RCPT from unknown[45.146.201.199]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  8 06:41:08 mail.srvfarm.net postfix/smtpd[3252800]: NOQUEUE: reject: RCPT from unknown[45.146.201.199]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  8 06:41:08 mail.srvfarm.net postfix/smtpd[3252865]: NOQUEUE: reje
2020-03-08 18:22:47
162.243.59.16 attackbotsspam
Automatic report - Banned IP Access
2020-03-08 18:28:59
63.82.48.83 attackspambots
Mar  8 05:40:01 web01 postfix/smtpd[25065]: connect from sombrero.saparel.com[63.82.48.83]
Mar  8 05:40:01 web01 policyd-spf[25069]: None; identhostnamey=helo; client-ip=63.82.48.83; helo=sombrero.kranbery.com; envelope-from=x@x
Mar  8 05:40:01 web01 policyd-spf[25069]: Pass; identhostnamey=mailfrom; client-ip=63.82.48.83; helo=sombrero.kranbery.com; envelope-from=x@x
Mar x@x
Mar  8 05:40:02 web01 postfix/smtpd[25065]: disconnect from sombrero.saparel.com[63.82.48.83]
Mar  8 05:43:52 web01 postfix/smtpd[25718]: connect from sombrero.saparel.com[63.82.48.83]
Mar  8 05:43:52 web01 policyd-spf[25723]: None; identhostnamey=helo; client-ip=63.82.48.83; helo=sombrero.kranbery.com; envelope-from=x@x
Mar  8 05:43:52 web01 policyd-spf[25723]: Pass; identhostnamey=mailfrom; client-ip=63.82.48.83; helo=sombrero.kranbery.com; envelope-from=x@x
Mar x@x
Mar  8 05:43:53 web01 postfix/smtpd[25718]: disconnect from sombrero.saparel.com[63.82.48.83]
Mar  8 05:44:59 web01 postfix/smtpd[25........
-------------------------------
2020-03-08 18:21:25
69.94.158.95 attackspam
Mar  8 05:37:33 mail.srvfarm.net postfix/smtpd[3230896]: NOQUEUE: reject: RCPT from cheap.swingthelamp.com[69.94.158.95]: 554 5.7.1 Service unavailable; Client host [69.94.158.95] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
Mar  8 05:39:36 mail.srvfarm.net postfix/smtpd[3216090]: NOQUEUE: reject: RCPT from cheap.swingthelamp.com[69.94.158.95]: 554 5.7.1 Service unavailable; Client host [69.94.158.95] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
Mar  8 05:42:44 mail.srvfarm.net postfix/smtpd[3230033]: NOQUEUE: reject: RCPT from cheap.swingthelamp.com[69.94.158.95]: 554 5.7.1 Service unavailable; Client host [69.94.158.95] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from=
2020-03-08 18:16:49
106.12.22.208 attackbotsspam
2020-03-08T05:48:02.499952  sshd[20345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.22.208  user=root
2020-03-08T05:48:04.078012  sshd[20345]: Failed password for root from 106.12.22.208 port 41810 ssh2
2020-03-08T05:51:43.270193  sshd[20379]: Invalid user chenhangting from 106.12.22.208 port 32836
...
2020-03-08 18:27:00
14.232.235.234 attackspam
Mar  8 05:44:15 mail.srvfarm.net postfix/smtps/smtpd[3228444]: warning: unknown[14.232.235.234]: SASL PLAIN authentication failed: 
Mar  8 05:44:15 mail.srvfarm.net postfix/smtps/smtpd[3228444]: lost connection after AUTH from unknown[14.232.235.234]
Mar  8 05:47:36 mail.srvfarm.net postfix/smtps/smtpd[3232583]: warning: unknown[14.232.235.234]: SASL PLAIN authentication failed: 
Mar  8 05:47:37 mail.srvfarm.net postfix/smtps/smtpd[3232583]: lost connection after AUTH from unknown[14.232.235.234]
Mar  8 05:49:55 mail.srvfarm.net postfix/smtps/smtpd[3230140]: warning: unknown[14.232.235.234]: SASL PLAIN authentication failed:
2020-03-08 18:25:35
218.92.0.207 attackbotsspam
Mar  8 09:55:12 vpn01 sshd[9822]: Failed password for root from 218.92.0.207 port 10462 ssh2
Mar  8 09:55:14 vpn01 sshd[9822]: Failed password for root from 218.92.0.207 port 10462 ssh2
...
2020-03-08 18:09:16
176.226.190.80 attackspambots
1583643123 - 03/08/2020 05:52:03 Host: 176.226.190.80/176.226.190.80 Port: 445 TCP Blocked
2020-03-08 18:04:55
134.73.51.173 attackspam
Mar  8 06:56:17 mail.srvfarm.net postfix/smtpd[3252800]: NOQUEUE: reject: RCPT from unknown[134.73.51.173]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  8 06:56:19 mail.srvfarm.net postfix/smtpd[3252801]: NOQUEUE: reject: RCPT from unknown[134.73.51.173]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  8 06:56:19 mail.srvfarm.net postfix/smtpd[3252800]: NOQUEUE: reject: RCPT from unknown[134.73.51.173]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  8 06:56:19 mail.srvfarm.net postfix/smtpd[3252862]: NOQUEUE: reject: RCPT
2020-03-08 18:15:18
46.101.77.58 attack
2020-03-08T06:30:18.835885homeassistant sshd[15267]: Invalid user server from 46.101.77.58 port 43482
2020-03-08T06:30:18.848249homeassistant sshd[15267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.77.58
...
2020-03-08 18:04:20
122.177.51.170 attack
Honeypot attack, port: 81, PTR: abts-north-dynamic-170.51.177.122.airtelbroadband.in.
2020-03-08 18:12:06
47.254.77.228 attackspambots
Wordpress Admin Login attack
2020-03-08 18:05:37
69.94.134.225 attack
Mar  8 04:28:21 web01 postfix/smtpd[22499]: warning: hostname 69-94-134-225.nca.datanoc.com does not resolve to address 69.94.134.225
Mar  8 04:28:21 web01 postfix/smtpd[22499]: connect from unknown[69.94.134.225]
Mar  8 04:28:21 web01 policyd-spf[22500]: None; identhostnamey=helo; client-ip=69.94.134.225; helo=difficult.eurekafied.com; envelope-from=x@x
Mar  8 04:28:21 web01 policyd-spf[22500]: Pass; identhostnamey=mailfrom; client-ip=69.94.134.225; helo=difficult.eurekafied.com; envelope-from=x@x
Mar x@x
Mar  8 04:28:22 web01 postfix/smtpd[22499]: disconnect from unknown[69.94.134.225]
Mar  8 04:31:47 web01 postfix/smtpd[22526]: warning: hostname 69-94-134-225.nca.datanoc.com does not resolve to address 69.94.134.225
Mar  8 04:31:47 web01 postfix/smtpd[22526]: connect from unknown[69.94.134.225]
Mar  8 04:31:47 web01 policyd-spf[22529]: None; identhostnamey=helo; client-ip=69.94.134.225; helo=difficult.eurekafied.com; envelope-from=x@x
Mar  8 04:31:47 web01 policyd-sp........
-------------------------------
2020-03-08 18:19:17
88.104.33.170 attack
Automatic report - Port Scan Attack
2020-03-08 18:29:30

最近上报的IP列表

41.211.119.48 230.18.4.81 170.229.50.71 166.74.196.166
120.13.219.35 63.26.90.89 93.98.166.90 175.37.141.208
149.176.244.78 138.53.228.246 253.166.76.166 216.9.111.217
62.41.61.139 37.57.78.161 127.177.113.247 191.25.208.50
74.200.240.213 56.232.225.230 47.98.193.68 7.69.162.175