必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.53.200.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42978
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.53.200.134.			IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100600 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 06 14:51:40 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 134.200.53.212.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.200.53.212.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.149.162.78 attack
Oct  2 23:27:38 mail sshd[19393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.149.162.78
Oct  2 23:27:40 mail sshd[19393]: Failed password for invalid user perry from 82.149.162.78 port 35162 ssh2
...
2019-10-03 07:02:45
222.186.190.2 attackspambots
2019-10-03T01:09:15.9737331240 sshd\[7384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2019-10-03T01:09:18.2227461240 sshd\[7384\]: Failed password for root from 222.186.190.2 port 9006 ssh2
2019-10-03T01:09:22.0629641240 sshd\[7384\]: Failed password for root from 222.186.190.2 port 9006 ssh2
...
2019-10-03 07:11:34
46.38.144.32 attack
Oct  3 00:51:22 relay postfix/smtpd\[11841\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 00:51:50 relay postfix/smtpd\[29306\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 00:53:50 relay postfix/smtpd\[11841\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 00:54:22 relay postfix/smtpd\[29306\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  3 00:56:26 relay postfix/smtpd\[25587\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-03 07:03:35
115.238.229.39 attackspam
Oct  3 03:47:03 areeb-Workstation sshd[9692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.229.39
Oct  3 03:47:05 areeb-Workstation sshd[9692]: Failed password for invalid user cislvertenzedei from 115.238.229.39 port 24618 ssh2
...
2019-10-03 07:05:04
156.212.205.132 attackspambots
C1,WP GET /wp-login.php
2019-10-03 07:36:11
181.114.149.61 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/181.114.149.61/ 
 AR - 1H : (156)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN27818 
 
 IP : 181.114.149.61 
 
 CIDR : 181.114.149.0/24 
 
 PREFIX COUNT : 65 
 
 UNIQUE IP COUNT : 17408 
 
 
 WYKRYTE ATAKI Z ASN27818 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 2 
 
 DateTime : 2019-10-02 23:26:55 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-03 07:24:37
151.80.61.103 attackbotsspam
Oct  2 23:24:07 MainVPS sshd[16573]: Invalid user alex from 151.80.61.103 port 43194
Oct  2 23:24:07 MainVPS sshd[16573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.61.103
Oct  2 23:24:07 MainVPS sshd[16573]: Invalid user alex from 151.80.61.103 port 43194
Oct  2 23:24:09 MainVPS sshd[16573]: Failed password for invalid user alex from 151.80.61.103 port 43194 ssh2
Oct  2 23:27:35 MainVPS sshd[16810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.61.103  user=root
Oct  2 23:27:38 MainVPS sshd[16810]: Failed password for root from 151.80.61.103 port 55398 ssh2
...
2019-10-03 07:04:30
49.234.179.127 attackspam
Oct  2 12:13:39 php1 sshd\[16694\]: Invalid user test from 49.234.179.127
Oct  2 12:13:39 php1 sshd\[16694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.179.127
Oct  2 12:13:41 php1 sshd\[16694\]: Failed password for invalid user test from 49.234.179.127 port 48776 ssh2
Oct  2 12:17:55 php1 sshd\[17073\]: Invalid user prueba from 49.234.179.127
Oct  2 12:17:55 php1 sshd\[17073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.179.127
2019-10-03 07:21:29
222.186.31.136 attack
Oct  3 01:33:50 herz-der-gamer sshd[32205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
Oct  3 01:33:51 herz-der-gamer sshd[32205]: Failed password for root from 222.186.31.136 port 15076 ssh2
...
2019-10-03 07:34:38
111.231.239.143 attackspambots
Oct  2 13:20:22 web9 sshd\[23922\]: Invalid user compsx from 111.231.239.143
Oct  2 13:20:22 web9 sshd\[23922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.239.143
Oct  2 13:20:23 web9 sshd\[23922\]: Failed password for invalid user compsx from 111.231.239.143 port 33372 ssh2
Oct  2 13:24:03 web9 sshd\[24395\]: Invalid user zabbix from 111.231.239.143
Oct  2 13:24:03 web9 sshd\[24395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.239.143
2019-10-03 07:28:52
31.179.144.190 attack
Oct  2 23:23:01 SilenceServices sshd[16114]: Failed password for git from 31.179.144.190 port 33866 ssh2
Oct  2 23:26:52 SilenceServices sshd[18578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.179.144.190
Oct  2 23:26:54 SilenceServices sshd[18578]: Failed password for invalid user tester from 31.179.144.190 port 53987 ssh2
2019-10-03 07:31:03
68.251.142.26 attackspam
10/02/2019-18:45:28.904571 68.251.142.26 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 35
2019-10-03 07:22:07
197.243.34.154 attackbotsspam
Oct  2 19:10:55 plusreed sshd[9415]: Invalid user user2 from 197.243.34.154
...
2019-10-03 07:19:41
209.212.206.133 attackspam
Automatic report - Port Scan Attack
2019-10-03 07:15:29
85.185.81.132 attackbotsspam
Unauthorised access (Oct  3) SRC=85.185.81.132 LEN=52 PREC=0x20 TTL=104 ID=25676 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct  1) SRC=85.185.81.132 LEN=52 PREC=0x20 TTL=102 ID=31727 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-03 07:20:51

最近上报的IP列表

10.223.161.53 118.18.202.178 176.16.5.97 66.64.68.205
10.17.84.90 216.2.196.236 210.16.188.59 121.69.159.147
110.83.91.252 155.228.167.59 148.65.155.61 117.72.249.255
197.112.196.98 51.161.68.81 219.233.17.84 106.53.92.85
27.157.90.107 177.156.95.250 154.8.195.36 121.169.34.103