必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.117.34.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35883
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.117.34.146.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011700 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 18 00:37:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 146.34.117.212.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.34.117.212.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.29.80.133 attack
Mar  4 01:37:58 server sshd\[8193\]: Invalid user www-data from 202.29.80.133
Mar  4 01:37:58 server sshd\[8193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.80.133 
Mar  4 01:38:00 server sshd\[8193\]: Failed password for invalid user www-data from 202.29.80.133 port 50700 ssh2
Mar  4 01:39:20 server sshd\[8388\]: Invalid user bit_users from 202.29.80.133
Mar  4 01:39:20 server sshd\[8388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.80.133 
...
2020-03-04 07:17:08
222.186.31.83 attackspam
Mar  3 23:45:42 localhost sshd\[17569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Mar  3 23:45:43 localhost sshd\[17569\]: Failed password for root from 222.186.31.83 port 21412 ssh2
Mar  3 23:45:45 localhost sshd\[17569\]: Failed password for root from 222.186.31.83 port 21412 ssh2
2020-03-04 06:48:48
198.211.110.116 attackspam
Mar  3 23:52:17 sd-53420 sshd\[14717\]: Invalid user admin from 198.211.110.116
Mar  3 23:52:17 sd-53420 sshd\[14717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.110.116
Mar  3 23:52:18 sd-53420 sshd\[14717\]: Failed password for invalid user admin from 198.211.110.116 port 46968 ssh2
Mar  4 00:01:42 sd-53420 sshd\[15514\]: Invalid user alex from 198.211.110.116
Mar  4 00:01:42 sd-53420 sshd\[15514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.110.116
...
2020-03-04 07:04:17
89.35.39.60 attackspam
C1,WP GET /wp-login.php
2020-03-04 07:18:59
45.120.69.82 attackbots
Mar  3 12:37:14 hpm sshd\[1669\]: Invalid user odoo from 45.120.69.82
Mar  3 12:37:14 hpm sshd\[1669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.120.69.82
Mar  3 12:37:17 hpm sshd\[1669\]: Failed password for invalid user odoo from 45.120.69.82 port 37682 ssh2
Mar  3 12:46:10 hpm sshd\[2959\]: Invalid user chenhaixin from 45.120.69.82
Mar  3 12:46:10 hpm sshd\[2959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.120.69.82
2020-03-04 07:09:07
152.136.96.32 attackspambots
Mar  3 23:27:04 silence02 sshd[6667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.96.32
Mar  3 23:27:06 silence02 sshd[6667]: Failed password for invalid user sig from 152.136.96.32 port 46498 ssh2
Mar  3 23:35:48 silence02 sshd[7604]: Failed password for root from 152.136.96.32 port 33694 ssh2
2020-03-04 06:55:37
120.70.100.88 attack
Mar  3 19:06:36 firewall sshd[13883]: Invalid user gameserver from 120.70.100.88
Mar  3 19:06:38 firewall sshd[13883]: Failed password for invalid user gameserver from 120.70.100.88 port 39920 ssh2
Mar  3 19:15:45 firewall sshd[14251]: Invalid user nfsnobody from 120.70.100.88
...
2020-03-04 07:15:35
189.7.81.29 attackspam
Mar  4 01:09:28 hosting sshd[17117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.81.29  user=admin
Mar  4 01:09:30 hosting sshd[17117]: Failed password for admin from 189.7.81.29 port 45508 ssh2
...
2020-03-04 07:17:39
190.154.48.51 attackbots
Mar  3 12:04:35 php1 sshd\[15244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.154.48.51  user=leadershipworks
Mar  3 12:04:37 php1 sshd\[15244\]: Failed password for leadershipworks from 190.154.48.51 port 41281 ssh2
Mar  3 12:09:25 php1 sshd\[15734\]: Invalid user user from 190.154.48.51
Mar  3 12:09:25 php1 sshd\[15734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.154.48.51
Mar  3 12:09:26 php1 sshd\[15734\]: Failed password for invalid user user from 190.154.48.51 port 54281 ssh2
2020-03-04 07:18:37
223.111.144.148 attackbotsspam
Mar  3 23:09:51 mail sshd\[13710\]: Invalid user ashish from 223.111.144.148
Mar  3 23:09:51 mail sshd\[13710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.111.144.148
Mar  3 23:09:53 mail sshd\[13710\]: Failed password for invalid user ashish from 223.111.144.148 port 56880 ssh2
...
2020-03-04 07:00:55
222.186.175.182 attackspambots
2020-03-03T22:40:27.961422shield sshd\[21101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2020-03-03T22:40:30.246352shield sshd\[21101\]: Failed password for root from 222.186.175.182 port 39096 ssh2
2020-03-03T22:40:33.296484shield sshd\[21101\]: Failed password for root from 222.186.175.182 port 39096 ssh2
2020-03-03T22:40:36.092647shield sshd\[21101\]: Failed password for root from 222.186.175.182 port 39096 ssh2
2020-03-03T22:40:39.297132shield sshd\[21101\]: Failed password for root from 222.186.175.182 port 39096 ssh2
2020-03-04 06:43:08
222.186.30.167 attackbotsspam
Mar  3 23:38:37 localhost sshd\[8928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
Mar  3 23:38:40 localhost sshd\[8928\]: Failed password for root from 222.186.30.167 port 10177 ssh2
Mar  3 23:38:41 localhost sshd\[8928\]: Failed password for root from 222.186.30.167 port 10177 ssh2
2020-03-04 06:41:09
150.109.126.175 attackspam
2020-03-03T22:00:37.716575abusebot-8.cloudsearch.cf sshd[4881]: Invalid user admin01 from 150.109.126.175 port 50968
2020-03-03T22:00:37.726450abusebot-8.cloudsearch.cf sshd[4881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.126.175
2020-03-03T22:00:37.716575abusebot-8.cloudsearch.cf sshd[4881]: Invalid user admin01 from 150.109.126.175 port 50968
2020-03-03T22:00:40.237763abusebot-8.cloudsearch.cf sshd[4881]: Failed password for invalid user admin01 from 150.109.126.175 port 50968 ssh2
2020-03-03T22:09:27.588611abusebot-8.cloudsearch.cf sshd[5435]: Invalid user test from 150.109.126.175 port 57798
2020-03-03T22:09:27.595509abusebot-8.cloudsearch.cf sshd[5435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.126.175
2020-03-03T22:09:27.588611abusebot-8.cloudsearch.cf sshd[5435]: Invalid user test from 150.109.126.175 port 57798
2020-03-03T22:09:29.865950abusebot-8.cloudsearch.cf sshd[543
...
2020-03-04 07:19:49
46.77.76.156 attackspam
Automatic report - Port Scan Attack
2020-03-04 06:54:28
149.129.233.149 attack
Mar  3 13:06:32 hanapaa sshd\[6694\]: Invalid user jiaxing from 149.129.233.149
Mar  3 13:06:32 hanapaa sshd\[6694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.233.149
Mar  3 13:06:33 hanapaa sshd\[6694\]: Failed password for invalid user jiaxing from 149.129.233.149 port 37050 ssh2
Mar  3 13:10:28 hanapaa sshd\[7268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.233.149  user=root
Mar  3 13:10:30 hanapaa sshd\[7268\]: Failed password for root from 149.129.233.149 port 40858 ssh2
2020-03-04 07:20:15

最近上报的IP列表

202.254.157.171 239.27.131.176 154.195.50.254 68.190.33.168
34.146.63.169 168.123.49.181 63.89.62.187 241.137.194.85
150.35.34.28 152.250.246.213 64.250.16.59 221.76.76.161
233.88.130.227 67.23.214.118 140.116.201.71 230.153.188.123
26.162.141.50 225.163.190.253 85.125.212.36 23.27.67.212