必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.47.199.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12538
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.47.199.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:23:26 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
134.199.47.207.in-addr.arpa domain name pointer 207-47-199-134.regn.hsdb.sasknet.sk.ca.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.199.47.207.in-addr.arpa	name = 207-47-199-134.regn.hsdb.sasknet.sk.ca.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.88.112.77 attackspambots
$f2bV_matches
2019-09-19 23:03:12
207.46.13.133 attackspambots
Automatic report - Banned IP Access
2019-09-19 23:16:35
78.156.226.162 attack
Unauthorized connection attempt from IP address 78.156.226.162 on Port 445(SMB)
2019-09-19 23:01:39
171.238.39.126 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 11:52:09.
2019-09-19 23:34:19
203.205.41.78 attackspambots
Automatic report - Port Scan Attack
2019-09-19 22:51:53
193.32.163.182 attackspambots
SSH bruteforce (Triggered fail2ban)  Sep 19 16:51:29 dev1 sshd[201318]: Disconnecting invalid user admin 193.32.163.182 port 40918: Change of username or service not allowed: (admin,ssh-connection) -> (user,ssh-connection) [preauth]
2019-09-19 22:52:58
78.129.204.110 attackbots
Unauthorized connection attempt from IP address 78.129.204.110 on Port 445(SMB)
2019-09-19 23:07:26
193.239.235.124 attackbotsspam
2019-09-19T11:52:26.612295+01:00 suse sshd[19485]: Invalid user admin from 193.239.235.124 port 36155
2019-09-19T11:52:29.120767+01:00 suse sshd[19485]: error: PAM: User not known to the underlying authentication module for illegal user admin from 193.239.235.124
2019-09-19T11:52:26.612295+01:00 suse sshd[19485]: Invalid user admin from 193.239.235.124 port 36155
2019-09-19T11:52:29.120767+01:00 suse sshd[19485]: error: PAM: User not known to the underlying authentication module for illegal user admin from 193.239.235.124
2019-09-19T11:52:26.612295+01:00 suse sshd[19485]: Invalid user admin from 193.239.235.124 port 36155
2019-09-19T11:52:29.120767+01:00 suse sshd[19485]: error: PAM: User not known to the underlying authentication module for illegal user admin from 193.239.235.124
2019-09-19T11:52:29.122228+01:00 suse sshd[19485]: Failed keyboard-interactive/pam for invalid user admin from 193.239.235.124 port 36155 ssh2
...
2019-09-19 23:17:10
187.18.106.198 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/187.18.106.198/ 
 BR - 1H : (133)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN22689 
 
 IP : 187.18.106.198 
 
 CIDR : 187.18.96.0/19 
 
 PREFIX COUNT : 52 
 
 UNIQUE IP COUNT : 160768 
 
 
 WYKRYTE ATAKI Z ASN22689 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-19 22:54:22
121.138.213.2 attackspam
Sep 19 10:56:32 TORMINT sshd\[31829\]: Invalid user ghm from 121.138.213.2
Sep 19 10:56:32 TORMINT sshd\[31829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.138.213.2
Sep 19 10:56:34 TORMINT sshd\[31829\]: Failed password for invalid user ghm from 121.138.213.2 port 50554 ssh2
...
2019-09-19 23:11:00
162.209.226.68 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 11:52:07.
2019-09-19 23:36:25
203.166.240.3 attackbotsspam
firewall-block, port(s): 22/tcp
2019-09-19 23:38:03
113.173.132.110 attackbots
2019-09-19T11:52:03.830401+01:00 suse sshd[19443]: Invalid user admin from 113.173.132.110 port 38000
2019-09-19T11:52:06.968472+01:00 suse sshd[19443]: error: PAM: User not known to the underlying authentication module for illegal user admin from 113.173.132.110
2019-09-19T11:52:03.830401+01:00 suse sshd[19443]: Invalid user admin from 113.173.132.110 port 38000
2019-09-19T11:52:06.968472+01:00 suse sshd[19443]: error: PAM: User not known to the underlying authentication module for illegal user admin from 113.173.132.110
2019-09-19T11:52:03.830401+01:00 suse sshd[19443]: Invalid user admin from 113.173.132.110 port 38000
2019-09-19T11:52:06.968472+01:00 suse sshd[19443]: error: PAM: User not known to the underlying authentication module for illegal user admin from 113.173.132.110
2019-09-19T11:52:06.969064+01:00 suse sshd[19443]: Failed keyboard-interactive/pam for invalid user admin from 113.173.132.110 port 38000 ssh2
...
2019-09-19 23:41:34
125.24.249.4 attack
Unauthorized connection attempt from IP address 125.24.249.4 on Port 445(SMB)
2019-09-19 23:35:15
177.44.4.254 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 11:52:26.
2019-09-19 23:18:29

最近上报的IP列表

66.193.46.108 62.233.250.226 34.240.245.186 212.60.66.4
243.73.113.133 131.66.183.246 23.91.86.102 39.218.171.2
172.135.220.164 122.8.206.34 144.67.204.83 106.224.179.17
255.134.9.231 133.3.71.2 20.145.42.95 252.200.198.113
96.109.233.200 58.92.76.198 227.51.161.155 74.194.111.221