必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Miami

省份(region): Florida

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): NETTOGO

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.21.68.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4575
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.21.68.134.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 22 23:26:13 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
134.68.21.216.in-addr.arpa domain name pointer nettogo-68-134.nettogo.net.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
134.68.21.216.in-addr.arpa	name = nettogo-68-134.nettogo.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.112.1.26 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-08 05:50:23
51.79.100.13 attackspam
51.79.100.13 - - \[07/Aug/2020:23:13:31 +0200\] "POST /wp-login.php HTTP/1.0" 200 6906 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
51.79.100.13 - - \[07/Aug/2020:23:13:33 +0200\] "POST /wp-login.php HTTP/1.0" 200 6728 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
51.79.100.13 - - \[07/Aug/2020:23:13:35 +0200\] "POST /wp-login.php HTTP/1.0" 200 6722 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-08 05:39:19
193.112.126.198 attack
Aug  7 23:34:52 ip106 sshd[30289]: Failed password for root from 193.112.126.198 port 36752 ssh2
...
2020-08-08 06:04:40
119.45.154.156 attack
Aug  7 23:42:49 vpn01 sshd[7002]: Failed password for root from 119.45.154.156 port 48136 ssh2
...
2020-08-08 05:59:23
51.91.111.136 attackspam
Aug  5 21:41:54 node1 sshd[23818]: Received disconnect from 51.91.111.136: 11: Normal Shutdown, Thank you for playing [preauth]
Aug  5 21:41:57 node1 sshd[23821]: Received disconnect from 51.91.111.136: 11: Normal Shutdown, Thank you for playing [preauth]
Aug  5 21:42:01 node1 sshd[23866]: Received disconnect from 51.91.111.136: 11: Normal Shutdown, Thank you for playing [preauth]
Aug  5 21:42:06 node1 sshd[23873]: Received disconnect from 51.91.111.136: 11: Normal Shutdown, Thank you for playing [preauth]
Aug  5 21:42:10 node1 sshd[23918]: Received disconnect from 51.91.111.136: 11: Normal Shutdown, Thank you for playing [preauth]
Aug  5 21:42:14 node1 sshd[23924]: Received disconnect from 51.91.111.136: 11: Normal Shutdown, Thank you for playing [preauth]
Aug  5 21:42:18 node1 sshd[23928]: Received disconnect from 51.91.111.136: 11: Normal Shutdown, Thank you for playing [preauth]
Aug  5 21:42:23 node1 sshd[23941]: Received disconnect from 51.91.111.136: 11: Normal Sh........
-------------------------------
2020-08-08 05:55:06
222.186.173.238 attackspambots
$f2bV_matches
2020-08-08 06:00:55
189.37.72.229 attack
Wordpress attack
2020-08-08 05:57:48
193.27.228.220 attack
SmallBizIT.US 3 packets to tcp(1001,1111,33389)
2020-08-08 06:02:47
206.189.158.130 attackbots
Attempt to login to WordPress via /wp-login.php
2020-08-08 06:13:32
113.61.47.184 attack
Port Scan
...
2020-08-08 05:42:43
180.101.145.234 attackspam
Aug  7 22:27:19 srv-ubuntu-dev3 postfix/smtpd[65529]: warning: unknown[180.101.145.234]: SASL LOGIN authentication failed: authentication failure
Aug  7 22:27:20 srv-ubuntu-dev3 postfix/smtpd[65529]: warning: unknown[180.101.145.234]: SASL LOGIN authentication failed: authentication failure
Aug  7 22:27:21 srv-ubuntu-dev3 postfix/smtpd[65529]: warning: unknown[180.101.145.234]: SASL LOGIN authentication failed: authentication failure
Aug  7 22:27:22 srv-ubuntu-dev3 postfix/smtpd[65529]: warning: unknown[180.101.145.234]: SASL LOGIN authentication failed: authentication failure
Aug  7 22:27:23 srv-ubuntu-dev3 postfix/smtpd[65529]: warning: unknown[180.101.145.234]: SASL LOGIN authentication failed: authentication failure
...
2020-08-08 05:40:43
222.186.175.169 attackbots
Aug  7 23:14:28 jane sshd[13138]: Failed password for root from 222.186.175.169 port 44304 ssh2
Aug  7 23:14:31 jane sshd[13138]: Failed password for root from 222.186.175.169 port 44304 ssh2
...
2020-08-08 06:05:40
167.99.13.195 attackspam
167.99.13.195 - - [07/Aug/2020:21:27:06 +0100] "POST /wp-login.php HTTP/1.1" 200 2345 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.13.195 - - [07/Aug/2020:21:27:08 +0100] "POST /wp-login.php HTTP/1.1" 200 2329 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.13.195 - - [07/Aug/2020:21:27:08 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-08 05:50:54
115.231.231.3 attack
Aug  7 23:52:48 abendstille sshd\[32524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.231.3  user=root
Aug  7 23:52:50 abendstille sshd\[32524\]: Failed password for root from 115.231.231.3 port 52990 ssh2
Aug  7 23:56:43 abendstille sshd\[4015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.231.3  user=root
Aug  7 23:56:44 abendstille sshd\[4015\]: Failed password for root from 115.231.231.3 port 46154 ssh2
Aug  8 00:00:36 abendstille sshd\[7727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.231.3  user=root
...
2020-08-08 06:05:11
194.26.29.12 attack
Multiport scan : 96 ports scanned 10 20 21 23 30 40 50 70 80 81 123 200 303 400 404 443 444 555 600 700 808 1001 1111 1122 1234 2002 2020 2211 2222 3000 3322 3344 3381 3382 3383 3385 3386 3387 3388 3390 3393 3394 3397 3399 3400 3401 4004 4444 4455 5000 5005 5050 5544 5555 5566 6000 6006 6060 6666 6677 7007 7766 7788 8000 8008 8080 8877 8899 9000 9009 9090 9988 9999 10001 11000 11111 12000 12345 13000 13389 14000 15000 16000 17000 .....
2020-08-08 05:47:49

最近上报的IP列表

182.226.170.14 163.135.243.12 13.232.170.138 203.215.191.158
123.97.39.13 117.97.213.248 177.144.175.200 38.122.139.154
79.253.66.145 113.161.165.139 46.111.61.245 79.8.42.216
146.132.72.167 101.35.187.33 49.4.29.110 193.45.82.192
154.16.12.169 188.158.217.24 81.99.199.33 125.199.6.244