必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Mexico

运营商(isp): Planeta Local Mexico SA de CV

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Commercial

用户上报:
类型 评论内容 时间
attack
Sep 27 22:41:26 ajax sshd[26402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34 
Sep 27 22:41:29 ajax sshd[26402]: Failed password for invalid user student8 from 200.52.80.34 port 39824 ssh2
2020-09-28 07:05:03
attackspambots
Invalid user admin from 200.52.80.34 port 35086
2020-09-27 23:32:53
attack
$f2bV_matches
2020-09-27 15:34:15
attackspam
Sep 17 23:44:47 ns3033917 sshd[24459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
Sep 17 23:44:47 ns3033917 sshd[24459]: Invalid user chef from 200.52.80.34 port 56562
Sep 17 23:44:50 ns3033917 sshd[24459]: Failed password for invalid user chef from 200.52.80.34 port 56562 ssh2
...
2020-09-18 20:35:14
attackbotsspam
Sep 17 23:44:47 ns3033917 sshd[24459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
Sep 17 23:44:47 ns3033917 sshd[24459]: Invalid user chef from 200.52.80.34 port 56562
Sep 17 23:44:50 ns3033917 sshd[24459]: Failed password for invalid user chef from 200.52.80.34 port 56562 ssh2
...
2020-09-18 12:53:41
attack
2020-09-18T00:52:28.873063billing sshd[22326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-09-18T00:52:28.861870billing sshd[22326]: Invalid user vmail from 200.52.80.34 port 46166
2020-09-18T00:52:30.658972billing sshd[22326]: Failed password for invalid user vmail from 200.52.80.34 port 46166 ssh2
...
2020-09-18 03:09:01
attack
Sep 14 15:18:45 ip106 sshd[23721]: Failed password for root from 200.52.80.34 port 37052 ssh2
...
2020-09-14 21:34:11
attackspambots
(sshd) Failed SSH login from 200.52.80.34 (MX/Mexico/Mexico City/Mexico City (Jardines del Pedregal)/34.80.52.200.in-addr.arpa): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 14 00:43:33 atlas sshd[22638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34  user=root
Sep 14 00:43:35 atlas sshd[22638]: Failed password for root from 200.52.80.34 port 50264 ssh2
Sep 14 00:51:15 atlas sshd[24688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34  user=root
Sep 14 00:51:16 atlas sshd[24688]: Failed password for root from 200.52.80.34 port 46544 ssh2
Sep 14 00:55:30 atlas sshd[25695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34  user=root
2020-09-14 13:27:38
attack
Sep  9 14:45:27 Ubuntu-1404-trusty-64-minimal sshd\[32510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34  user=root
Sep  9 14:45:29 Ubuntu-1404-trusty-64-minimal sshd\[32510\]: Failed password for root from 200.52.80.34 port 38106 ssh2
Sep  9 14:58:02 Ubuntu-1404-trusty-64-minimal sshd\[7801\]: Invalid user invite from 200.52.80.34
Sep  9 14:58:02 Ubuntu-1404-trusty-64-minimal sshd\[7801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
Sep  9 14:58:04 Ubuntu-1404-trusty-64-minimal sshd\[7801\]: Failed password for invalid user invite from 200.52.80.34 port 48376 ssh2
2020-09-14 05:26:41
attackspambots
Aug 25 23:01:42 nuernberg-4g-01 sshd[31487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34 
Aug 25 23:01:44 nuernberg-4g-01 sshd[31487]: Failed password for invalid user zf from 200.52.80.34 port 47804 ssh2
Aug 25 23:05:43 nuernberg-4g-01 sshd[32762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-08-26 05:19:52
attackspam
Aug 24 10:07:58 ip40 sshd[13217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34 
Aug 24 10:08:00 ip40 sshd[13217]: Failed password for invalid user dev from 200.52.80.34 port 51052 ssh2
...
2020-08-24 17:21:33
attackspambots
Invalid user felix from 200.52.80.34 port 43344
2020-08-19 15:05:21
attackbots
Aug 15 01:40:59 cosmoit sshd[3185]: Failed password for root from 200.52.80.34 port 52320 ssh2
2020-08-15 08:05:11
attack
Aug  1 14:24:46 lnxded64 sshd[10555]: Failed password for root from 200.52.80.34 port 37032 ssh2
Aug  1 14:29:00 lnxded64 sshd[11657]: Failed password for root from 200.52.80.34 port 44064 ssh2
2020-08-01 21:30:02
attack
Invalid user test from 200.52.80.34 port 45640
2020-07-31 18:26:13
attack
2020-07-29T19:03:36.373264sd-86998 sshd[44425]: Invalid user liukaili from 200.52.80.34 port 47728
2020-07-29T19:03:36.376582sd-86998 sshd[44425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-07-29T19:03:36.373264sd-86998 sshd[44425]: Invalid user liukaili from 200.52.80.34 port 47728
2020-07-29T19:03:38.225432sd-86998 sshd[44425]: Failed password for invalid user liukaili from 200.52.80.34 port 47728 ssh2
2020-07-29T19:06:38.660598sd-86998 sshd[44823]: Invalid user yeqian from 200.52.80.34 port 55470
...
2020-07-30 01:54:37
attackspambots
2020-07-10T12:44:00.759451lavrinenko.info sshd[11049]: Invalid user rufina from 200.52.80.34 port 45322
2020-07-10T12:44:00.767089lavrinenko.info sshd[11049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-07-10T12:44:00.759451lavrinenko.info sshd[11049]: Invalid user rufina from 200.52.80.34 port 45322
2020-07-10T12:44:03.227594lavrinenko.info sshd[11049]: Failed password for invalid user rufina from 200.52.80.34 port 45322 ssh2
2020-07-10T12:45:44.902068lavrinenko.info sshd[11124]: Invalid user scott from 200.52.80.34 port 39932
...
2020-07-10 17:56:25
attack
srv02 SSH BruteForce Attacks 22 ..
2020-06-30 01:25:49
attackspambots
Invalid user techuser from 200.52.80.34 port 35174
2020-06-24 14:39:12
attack
2020-06-22T13:10:24.438837randservbullet-proofcloud-66.localdomain sshd[16518]: Invalid user haiyan from 200.52.80.34 port 41586
2020-06-22T13:10:24.444726randservbullet-proofcloud-66.localdomain sshd[16518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-06-22T13:10:24.438837randservbullet-proofcloud-66.localdomain sshd[16518]: Invalid user haiyan from 200.52.80.34 port 41586
2020-06-22T13:10:25.804652randservbullet-proofcloud-66.localdomain sshd[16518]: Failed password for invalid user haiyan from 200.52.80.34 port 41586 ssh2
...
2020-06-23 00:36:15
attackbotsspam
Jun 20 06:10:36 lnxweb61 sshd[2680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-06-20 12:11:30
attackbots
Jun 18 08:40:53 NPSTNNYC01T sshd[13023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
Jun 18 08:40:54 NPSTNNYC01T sshd[13023]: Failed password for invalid user postgres from 200.52.80.34 port 50816 ssh2
Jun 18 08:44:24 NPSTNNYC01T sshd[13368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
...
2020-06-19 00:17:12
attackbots
Jun 13 21:49:21 php1 sshd\[16863\]: Invalid user kfs from 200.52.80.34
Jun 13 21:49:21 php1 sshd\[16863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
Jun 13 21:49:23 php1 sshd\[16863\]: Failed password for invalid user kfs from 200.52.80.34 port 57354 ssh2
Jun 13 21:51:13 php1 sshd\[17003\]: Invalid user kunakorn from 200.52.80.34
Jun 13 21:51:13 php1 sshd\[17003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-06-14 16:33:28
attackbots
$f2bV_matches
2020-06-13 15:56:38
attackbotsspam
May 29 08:27:10 Tower sshd[3915]: Connection from 43.227.67.215 port 44382 on 192.168.10.220 port 22 rdomain ""
May 29 08:27:14 Tower sshd[3915]: Failed password for root from 43.227.67.215 port 44382 ssh2
May 29 08:27:15 Tower sshd[3915]: Received disconnect from 43.227.67.215 port 44382:11: Bye Bye [preauth]
May 29 08:27:15 Tower sshd[3915]: Disconnected from authenticating user root 43.227.67.215 port 44382 [preauth]
May 30 03:07:57 Tower sshd[3915]: Connection from 200.52.80.34 port 47084 on 192.168.10.220 port 22 rdomain ""
May 30 03:07:58 Tower sshd[3915]: Failed password for root from 200.52.80.34 port 47084 ssh2
May 30 03:07:58 Tower sshd[3915]: Received disconnect from 200.52.80.34 port 47084:11: Bye Bye [preauth]
May 30 03:07:58 Tower sshd[3915]: Disconnected from authenticating user root 200.52.80.34 port 47084 [preauth]
2020-05-30 15:42:38
attack
2020-05-16T11:52:38.669503vivaldi2.tree2.info sshd[25522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-05-16T11:52:38.657953vivaldi2.tree2.info sshd[25522]: Invalid user noc from 200.52.80.34
2020-05-16T11:52:40.552490vivaldi2.tree2.info sshd[25522]: Failed password for invalid user noc from 200.52.80.34 port 43690 ssh2
2020-05-16T11:55:30.925000vivaldi2.tree2.info sshd[25657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34  user=root
2020-05-16T11:55:32.421046vivaldi2.tree2.info sshd[25657]: Failed password for root from 200.52.80.34 port 47054 ssh2
...
2020-05-16 12:37:30
attackspam
$f2bV_matches
2020-05-03 04:04:12
attackbotsspam
2020-04-29T04:33:15.994674vivaldi2.tree2.info sshd[16213]: Invalid user hermit from 200.52.80.34
2020-04-29T04:33:16.009660vivaldi2.tree2.info sshd[16213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34
2020-04-29T04:33:15.994674vivaldi2.tree2.info sshd[16213]: Invalid user hermit from 200.52.80.34
2020-04-29T04:33:18.529495vivaldi2.tree2.info sshd[16213]: Failed password for invalid user hermit from 200.52.80.34 port 51434 ssh2
2020-04-29T04:37:20.582732vivaldi2.tree2.info sshd[16357]: Invalid user administrador from 200.52.80.34
...
2020-04-29 03:44:49
attack
(sshd) Failed SSH login from 200.52.80.34 (MX/Mexico/34.80.52.200.in-addr.arpa): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 28 08:47:55 amsweb01 sshd[30125]: User steam from 200.52.80.34 not allowed because not listed in AllowUsers
Apr 28 08:47:55 amsweb01 sshd[30125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34  user=steam
Apr 28 08:47:56 amsweb01 sshd[30125]: Failed password for invalid user steam from 200.52.80.34 port 53158 ssh2
Apr 28 08:52:27 amsweb01 sshd[30650]: Invalid user jj from 200.52.80.34 port 47284
Apr 28 08:52:28 amsweb01 sshd[30650]: Failed password for invalid user jj from 200.52.80.34 port 47284 ssh2
2020-04-28 17:34:32
attackspam
SSH Bruteforce attack
2020-04-28 02:54:27
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.52.80.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17846
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.52.80.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 25 18:56:54 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
34.80.52.200.in-addr.arpa domain name pointer 34.80.52.200.in-addr.arpa.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
34.80.52.200.in-addr.arpa	name = 34.80.52.200.in-addr.arpa.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.171 attackbotsspam
Mar  1 11:17:09 sachi sshd\[29285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Mar  1 11:17:11 sachi sshd\[29285\]: Failed password for root from 218.92.0.171 port 30525 ssh2
Mar  1 11:17:28 sachi sshd\[29293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Mar  1 11:17:30 sachi sshd\[29293\]: Failed password for root from 218.92.0.171 port 58751 ssh2
Mar  1 11:17:33 sachi sshd\[29293\]: Failed password for root from 218.92.0.171 port 58751 ssh2
2020-03-02 05:18:58
139.59.58.155 attackspam
Mar  1 21:36:58 vpn01 sshd[14179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.155
Mar  1 21:37:00 vpn01 sshd[14179]: Failed password for invalid user usuario from 139.59.58.155 port 57122 ssh2
...
2020-03-02 05:06:49
2.181.227.72 attackbotsspam
missing rdns
2020-03-02 04:56:55
94.100.177.59 attackbots
(imapd) Failed IMAP login from 94.100.177.59 (RU/Russia/rimap13.m.smailru.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar  1 16:46:35 ir1 dovecot[4133960]: imap-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=94.100.177.59, lip=5.63.12.44, TLS: Connection closed, session=
2020-03-02 05:12:24
139.59.80.65 attack
Mar  1 09:21:07 hanapaa sshd\[11889\]: Invalid user ut99 from 139.59.80.65
Mar  1 09:21:07 hanapaa sshd\[11889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.65
Mar  1 09:21:10 hanapaa sshd\[11889\]: Failed password for invalid user ut99 from 139.59.80.65 port 37760 ssh2
Mar  1 09:30:18 hanapaa sshd\[12605\]: Invalid user wocloud from 139.59.80.65
Mar  1 09:30:18 hanapaa sshd\[12605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.65
2020-03-02 04:50:25
27.64.41.71 attackspam
Mar  1 19:26:08 vmd17057 sshd[16446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.64.41.71 
Mar  1 19:26:10 vmd17057 sshd[16446]: Failed password for invalid user service from 27.64.41.71 port 51556 ssh2
...
2020-03-02 04:51:19
94.177.246.39 attackspambots
DATE:2020-03-01 14:17:24, IP:94.177.246.39, PORT:ssh SSH brute force auth (docker-dc)
2020-03-02 04:54:29
89.245.93.232 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-03-02 05:02:11
77.247.127.150 attackbots
Hits on port : 389
2020-03-02 05:17:26
219.146.149.138 attackbots
Unauthorized connection attempt from IP address 219.146.149.138 on Port 445(SMB)
2020-03-02 05:26:13
78.131.56.62 attackbotsspam
Mar  1 13:23:19 vlre-nyc-1 sshd\[7098\]: Invalid user laravel from 78.131.56.62
Mar  1 13:23:19 vlre-nyc-1 sshd\[7098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.131.56.62
Mar  1 13:23:21 vlre-nyc-1 sshd\[7098\]: Failed password for invalid user laravel from 78.131.56.62 port 56640 ssh2
Mar  1 13:31:23 vlre-nyc-1 sshd\[7271\]: Invalid user test from 78.131.56.62
Mar  1 13:31:23 vlre-nyc-1 sshd\[7271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.131.56.62
...
2020-03-02 05:21:02
180.164.255.12 attack
Mar  1 21:37:18 ns382633 sshd\[27925\]: Invalid user dspace from 180.164.255.12 port 35534
Mar  1 21:37:18 ns382633 sshd\[27925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.164.255.12
Mar  1 21:37:20 ns382633 sshd\[27925\]: Failed password for invalid user dspace from 180.164.255.12 port 35534 ssh2
Mar  1 22:03:01 ns382633 sshd\[31981\]: Invalid user cpanelrrdtool from 180.164.255.12 port 64331
Mar  1 22:03:01 ns382633 sshd\[31981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.164.255.12
2020-03-02 05:09:15
194.158.223.22 attackbotsspam
Unauthorized connection attempt detected from IP address 194.158.223.22 to port 1433 [J]
2020-03-02 04:49:55
45.10.24.222 attackbots
Mar  1 sshd[27331]: Invalid user nagios from 45.10.24.222 port 51976
2020-03-02 05:17:50
54.37.23.16 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/54.37.23.16/ 
 
 FR - 1H : (28)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN16276 
 
 IP : 54.37.23.16 
 
 CIDR : 54.37.0.0/16 
 
 PREFIX COUNT : 132 
 
 UNIQUE IP COUNT : 3052544 
 
 
 ATTACKS DETECTED ASN16276 :  
  1H - 3 
  3H - 5 
  6H - 6 
 12H - 7 
 24H - 7 
 
 DateTime : 2020-03-01 14:16:57 
 
 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN  - data recovery
2020-03-02 05:05:16

最近上报的IP列表

36.82.5.47 85.97.189.115 103.57.9.131 189.73.176.43
177.44.17.181 108.172.169.45 45.40.243.225 34.239.94.61
86.14.118.227 201.183.225.114 37.205.8.166 167.86.121.132
112.104.29.193 195.201.218.173 112.222.83.89 74.67.236.187
102.165.50.123 93.142.14.113 150.245.107.249 103.159.66.42