必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.90.12.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.90.12.134.			IN	A

;; AUTHORITY SECTION:
.			323	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091500 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 00:08:28 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 134.12.90.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.12.90.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.201.22.228 attack
Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-14 13:48:29
209.97.167.137 attack
Apr 14 07:15:59 legacy sshd[13294]: Failed password for root from 209.97.167.137 port 52208 ssh2
Apr 14 07:17:42 legacy sshd[13351]: Failed password for root from 209.97.167.137 port 49908 ssh2
Apr 14 07:19:24 legacy sshd[13396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.167.137
...
2020-04-14 14:12:26
36.84.39.30 attackbotsspam
Icarus honeypot on github
2020-04-14 13:58:38
141.98.80.30 attackbots
2020-04-14 08:25:10 dovecot_login authenticator failed for \(\[141.98.80.30\]\) \[141.98.80.30\]: 535 Incorrect authentication data \(set_id=inarcassaonline@opso.it\)
2020-04-14 08:25:17 dovecot_login authenticator failed for \(\[141.98.80.30\]\) \[141.98.80.30\]: 535 Incorrect authentication data
2020-04-14 08:25:26 dovecot_login authenticator failed for \(\[141.98.80.30\]\) \[141.98.80.30\]: 535 Incorrect authentication data
2020-04-14 08:25:31 dovecot_login authenticator failed for \(\[141.98.80.30\]\) \[141.98.80.30\]: 535 Incorrect authentication data
2020-04-14 08:25:42 dovecot_login authenticator failed for \(\[141.98.80.30\]\) \[141.98.80.30\]: 535 Incorrect authentication data
2020-04-14 14:28:15
64.139.73.170 attackspambots
2020-04-13T23:52:33.596127mail.thespaminator.com sshd[9209]: Invalid user pi from 64.139.73.170 port 57214
2020-04-13T23:52:33.596151mail.thespaminator.com sshd[9211]: Invalid user pi from 64.139.73.170 port 57222
...
2020-04-14 14:19:19
179.181.162.124 attack
20/4/13@23:52:59: FAIL: Alarm-Network address from=179.181.162.124
20/4/13@23:52:59: FAIL: Alarm-Network address from=179.181.162.124
...
2020-04-14 14:01:56
178.170.58.28 attackbots
(smtpauth) Failed SMTP AUTH login from 178.170.58.28 (NL/Netherlands/frhb40262flex.ikexpress.com): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-14 08:23:16 login authenticator failed for frhb40262flex.ikexpress.com (ADMIN) [178.170.58.28]: 535 Incorrect authentication data (set_id=dr.akhavan@rahapharm.com)
2020-04-14 13:47:34
195.231.3.181 attack
Apr 14 07:04:48 mail.srvfarm.net postfix/smtpd[1373226]: lost connection after CONNECT from unknown[195.231.3.181]
Apr 14 07:09:39 mail.srvfarm.net postfix/smtpd[1391017]: lost connection after CONNECT from unknown[195.231.3.181]
Apr 14 07:09:42 mail.srvfarm.net postfix/smtpd[1371249]: lost connection after CONNECT from unknown[195.231.3.181]
Apr 14 07:09:43 mail.srvfarm.net postfix/smtpd[1377640]: lost connection after CONNECT from unknown[195.231.3.181]
Apr 14 07:09:43 mail.srvfarm.net postfix/smtpd[1377707]: lost connection after CONNECT from unknown[195.231.3.181]
2020-04-14 14:25:21
179.110.222.46 attack
Apr 14 06:55:21 server sshd[1469]: Failed password for root from 179.110.222.46 port 51393 ssh2
Apr 14 07:23:38 server sshd[23173]: Failed password for invalid user www from 179.110.222.46 port 38273 ssh2
Apr 14 07:29:21 server sshd[27255]: Failed password for invalid user home from 179.110.222.46 port 58239 ssh2
2020-04-14 14:08:52
196.43.165.47 attackbots
(sshd) Failed SSH login from 196.43.165.47 (UG/Uganda/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 14 03:38:34 andromeda sshd[3951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.165.47  user=root
Apr 14 03:38:35 andromeda sshd[3951]: Failed password for root from 196.43.165.47 port 42284 ssh2
Apr 14 03:52:28 andromeda sshd[4671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.165.47  user=root
2020-04-14 14:17:12
98.143.148.45 attackbotsspam
2020-04-14T06:18:36.042623shield sshd\[3082\]: Invalid user harry from 98.143.148.45 port 51942
2020-04-14T06:18:36.046332shield sshd\[3082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.143.148.45
2020-04-14T06:18:37.912840shield sshd\[3082\]: Failed password for invalid user harry from 98.143.148.45 port 51942 ssh2
2020-04-14T06:22:18.908720shield sshd\[3882\]: Invalid user user from 98.143.148.45 port 43080
2020-04-14T06:22:18.912170shield sshd\[3882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.143.148.45
2020-04-14 14:23:20
49.88.112.114 attackspam
Apr 14 02:22:17 plusreed sshd[18840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Apr 14 02:22:19 plusreed sshd[18840]: Failed password for root from 49.88.112.114 port 29991 ssh2
...
2020-04-14 14:23:07
193.70.43.220 attackbots
$f2bV_matches
2020-04-14 14:20:59
180.97.80.12 attack
Apr 14 06:55:33 localhost sshd\[23548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.97.80.12  user=root
Apr 14 06:55:35 localhost sshd\[23548\]: Failed password for root from 180.97.80.12 port 33880 ssh2
Apr 14 06:59:20 localhost sshd\[23835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.97.80.12  user=root
Apr 14 06:59:22 localhost sshd\[23835\]: Failed password for root from 180.97.80.12 port 58982 ssh2
Apr 14 07:03:21 localhost sshd\[24114\]: Invalid user maggie from 180.97.80.12
...
2020-04-14 14:14:55
195.231.3.188 attackbotsspam
Apr 14 07:47:58 mail.srvfarm.net postfix/smtpd[1393796]: warning: unknown[195.231.3.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 14 07:47:58 mail.srvfarm.net postfix/smtpd[1391017]: warning: unknown[195.231.3.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 14 07:47:58 mail.srvfarm.net postfix/smtpd[1395237]: warning: unknown[195.231.3.188]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 14 07:47:58 mail.srvfarm.net postfix/smtpd[1391017]: lost connection after AUTH from unknown[195.231.3.188]
Apr 14 07:47:58 mail.srvfarm.net postfix/smtpd[1393796]: lost connection after AUTH from unknown[195.231.3.188]
Apr 14 07:47:58 mail.srvfarm.net postfix/smtpd[1395237]: lost connection after AUTH from unknown[195.231.3.188]
2020-04-14 14:25:09

最近上报的IP列表

65.21.141.242 113.102.206.239 116.25.45.65 113.102.204.206
115.136.152.231 103.27.230.61 113.78.112.106 113.102.204.48
178.128.60.6 114.226.90.98 79.224.178.247 45.134.224.83
183.157.175.45 179.100.127.69 180.141.175.108 180.252.175.77
105.213.133.180 116.105.26.100 92.205.109.111 58.220.126.62