必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.134.75.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.134.75.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:37:21 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
18.75.134.212.in-addr.arpa domain name pointer mtfrm008.ccetsw.org.uk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.75.134.212.in-addr.arpa	name = mtfrm008.ccetsw.org.uk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.68.212.113 attackbotsspam
179/tcp 1433/tcp 5060/udp...
[2019-09-02/10-31]51pkt,43pt.(tcp),4pt.(udp)
2019-11-02 19:20:16
171.234.63.120 attackbots
Port 1433 Scan
2019-11-02 19:37:59
118.68.170.130 attack
xmlrpc attack
2019-11-02 19:38:47
116.255.182.245 attack
sshd jail - ssh hack attempt
2019-11-02 19:05:50
209.17.96.154 attackbots
port scan and connect, tcp 8888 (sun-answerbook)
2019-11-02 19:14:51
159.203.201.12 attackspam
Port scan: Attack repeated for 24 hours
2019-11-02 19:18:43
113.214.12.60 attackspambots
1433/tcp 1433/tcp 1433/tcp...
[2019-10-11/11-02]4pkt,1pt.(tcp)
2019-11-02 19:34:39
185.26.99.109 attackspambots
slow and persistent scanner
2019-11-02 19:40:42
209.17.97.66 attack
Automatic report - Banned IP Access
2019-11-02 19:08:06
41.228.12.149 attackbots
SSH brutforce
2019-11-02 19:39:36
117.4.32.63 attackbotsspam
445/tcp 445/tcp
[2019-10-05/11-02]2pkt
2019-11-02 19:33:24
117.4.168.208 attack
445/tcp 445/tcp
[2019-09-05/11-01]2pkt
2019-11-02 19:29:09
45.141.84.38 attackbots
2019-11-02T10:48:46.206631mail01 postfix/smtpd[14600]: warning: unknown[45.141.84.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-02T10:49:02.279296mail01 postfix/smtpd[21950]: warning: unknown[45.141.84.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-02T10:52:30.440655mail01 postfix/smtpd[23727]: warning: unknown[45.141.84.38]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-02 19:03:33
156.199.212.69 attack
ssh failed login
2019-11-02 19:09:11
124.235.206.130 attack
SSH Brute Force, server-1 sshd[21289]: Failed password for root from 124.235.206.130 port 26279 ssh2
2019-11-02 19:35:22

最近上报的IP列表

41.226.150.156 162.56.70.51 135.91.70.157 202.83.82.150
201.21.8.75 143.99.59.248 103.150.210.191 42.235.36.67
159.192.170.173 85.46.88.142 184.153.74.240 83.255.212.251
129.242.164.239 131.103.225.118 103.178.169.150 62.42.114.38
166.186.78.192 204.88.196.93 227.37.238.224 72.178.219.189