必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.45.234.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4813
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.45.234.131.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:57:52 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 131.234.45.211.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.234.45.211.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.197.78.121 attack
Nov  9 09:36:48 legacy sshd[8574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.78.121
Nov  9 09:36:50 legacy sshd[8574]: Failed password for invalid user angeleyes from 138.197.78.121 port 56828 ssh2
Nov  9 09:40:59 legacy sshd[8695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.78.121
...
2019-11-09 16:46:24
88.89.44.167 attackspambots
Nov  9 07:54:58 localhost sshd\[8555\]: Invalid user marseill from 88.89.44.167
Nov  9 07:54:58 localhost sshd\[8555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.89.44.167
Nov  9 07:55:00 localhost sshd\[8555\]: Failed password for invalid user marseill from 88.89.44.167 port 47697 ssh2
Nov  9 07:58:55 localhost sshd\[8732\]: Invalid user blaze from 88.89.44.167
Nov  9 07:58:55 localhost sshd\[8732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.89.44.167
...
2019-11-09 16:37:04
107.161.91.53 attackspam
2019-11-09T07:17:08.275724hub.schaetter.us sshd\[7965\]: Invalid user edna from 107.161.91.53 port 55708
2019-11-09T07:17:08.285086hub.schaetter.us sshd\[7965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.anitech.xyz
2019-11-09T07:17:10.537222hub.schaetter.us sshd\[7965\]: Failed password for invalid user edna from 107.161.91.53 port 55708 ssh2
2019-11-09T07:20:49.400249hub.schaetter.us sshd\[7993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.anitech.xyz  user=root
2019-11-09T07:20:51.657721hub.schaetter.us sshd\[7993\]: Failed password for root from 107.161.91.53 port 39134 ssh2
...
2019-11-09 16:18:30
46.166.151.47 attackbotsspam
\[2019-11-09 03:48:57\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T03:48:57.087-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146462607509",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/57858",ACLName="no_extension_match"
\[2019-11-09 03:51:56\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T03:51:56.066-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146462607509",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/51878",ACLName="no_extension_match"
\[2019-11-09 03:54:42\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T03:54:42.978-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00146462607509",SessionID="0x7fdf2cd1cd48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/57877",ACLName="no_exten
2019-11-09 17:01:55
61.216.15.225 attackspambots
Nov  9 04:29:27 firewall sshd[23253]: Failed password for invalid user fengjian from 61.216.15.225 port 48160 ssh2
Nov  9 04:33:55 firewall sshd[23318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.15.225  user=root
Nov  9 04:33:57 firewall sshd[23318]: Failed password for root from 61.216.15.225 port 58230 ssh2
...
2019-11-09 17:02:25
139.59.41.170 attackspam
Nov  9 08:24:44 game-panel sshd[7440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.170
Nov  9 08:24:46 game-panel sshd[7440]: Failed password for invalid user Pass from 139.59.41.170 port 41880 ssh2
Nov  9 08:29:15 game-panel sshd[7604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.170
2019-11-09 16:42:06
118.24.242.239 attack
Nov  9 09:16:36 vps647732 sshd[17246]: Failed password for root from 118.24.242.239 port 38980 ssh2
...
2019-11-09 16:44:42
121.162.131.223 attackspam
Nov  9 07:27:13 ArkNodeAT sshd\[9871\]: Invalid user mb from 121.162.131.223
Nov  9 07:27:13 ArkNodeAT sshd\[9871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.131.223
Nov  9 07:27:16 ArkNodeAT sshd\[9871\]: Failed password for invalid user mb from 121.162.131.223 port 53075 ssh2
2019-11-09 16:29:29
83.48.101.184 attackspambots
Nov  9 09:02:53 ns381471 sshd[20656]: Failed password for root from 83.48.101.184 port 47380 ssh2
2019-11-09 17:01:38
133.130.123.238 attackbotsspam
Nov  8 22:23:13 mockhub sshd[7216]: Failed password for root from 133.130.123.238 port 47882 ssh2
Nov  8 22:27:24 mockhub sshd[7331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.123.238
...
2019-11-09 16:24:10
82.149.194.134 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/82.149.194.134/ 
 
 RU - 1H : (117)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN6863 
 
 IP : 82.149.194.134 
 
 CIDR : 82.149.192.0/19 
 
 PREFIX COUNT : 11 
 
 UNIQUE IP COUNT : 53504 
 
 
 ATTACKS DETECTED ASN6863 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-09 09:22:00 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-09 16:45:02
106.54.33.63 attackspam
Invalid user dc2008 from 106.54.33.63 port 49730
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.33.63
Failed password for invalid user dc2008 from 106.54.33.63 port 49730 ssh2
Invalid user sky123 from 106.54.33.63 port 51764
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.33.63
2019-11-09 16:27:06
182.61.166.179 attackbots
" "
2019-11-09 16:51:29
178.33.45.156 attackbots
Nov  9 02:39:44 ny01 sshd[7258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.45.156
Nov  9 02:39:46 ny01 sshd[7258]: Failed password for invalid user adipa from 178.33.45.156 port 33164 ssh2
Nov  9 02:43:47 ny01 sshd[7651]: Failed password for root from 178.33.45.156 port 44080 ssh2
2019-11-09 17:00:03
181.48.68.54 attack
Nov  9 08:30:00 MK-Soft-VM7 sshd[21067]: Failed password for root from 181.48.68.54 port 34972 ssh2
...
2019-11-09 16:35:04

最近上报的IP列表

159.202.0.148 138.25.13.174 186.0.135.107 139.52.240.221
131.27.76.61 35.8.62.58 155.197.120.6 121.78.214.99
128.138.155.59 205.73.206.0 33.110.246.67 192.156.213.88
78.71.25.224 117.140.116.255 34.187.174.162 89.184.177.212
136.15.127.243 23.241.67.197 59.105.208.151 133.19.228.130