必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
220.134.249.134 attackbotsspam
Unauthorized connection attempt detected from IP address 220.134.249.134 to port 9530 [T]
2020-08-14 01:09:50
220.134.242.132 attackbots
Jul  8 05:40:12 debian-2gb-nbg1-2 kernel: \[16438212.938274\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=220.134.242.132 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=51408 PROTO=TCP SPT=18308 DPT=85 WINDOW=45676 RES=0x00 SYN URGP=0 
Jul  8 05:40:12 debian-2gb-nbg1-2 kernel: \[16438212.957913\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=220.134.242.132 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=51408 PROTO=TCP SPT=18308 DPT=85 WINDOW=45676 RES=0x00 SYN URGP=0
2020-07-08 19:18:45
220.134.240.155 attackbotsspam
 TCP (SYN) 220.134.240.155:63182 -> port 23, len 44
2020-05-27 19:01:37
220.134.24.45 attack
*Port Scan* detected from 220.134.24.45 (TW/Taiwan/220-134-24-45.HINET-IP.hinet.net). 11 hits in the last 110 seconds
2020-05-20 18:58:14
220.134.24.181 attackbotsspam
Port probing on unauthorized port 23
2020-05-08 17:02:19
220.134.240.68 attackbotsspam
Attempted connection to port 81.
2020-04-08 07:09:22
220.134.240.68 attackbotsspam
Honeypot attack, port: 81, PTR: 220-134-240-68.HINET-IP.hinet.net.
2020-03-03 08:35:09
220.134.243.192 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-02-27 09:09:59
220.134.240.184 attack
unauthorized connection attempt
2020-02-19 14:38:00
220.134.241.102 attackspam
Honeypot attack, port: 81, PTR: 220-134-241-102.HINET-IP.hinet.net.
2020-02-03 02:42:50
220.134.241.102 attackbotsspam
Unauthorized connection attempt detected from IP address 220.134.241.102 to port 23 [J]
2020-01-27 01:46:07
220.134.249.134 attackbots
unauthorized connection attempt
2020-01-25 18:52:24
220.134.249.134 attackspambots
Unauthorized connection attempt detected from IP address 220.134.249.134 to port 4567 [J]
2020-01-18 08:51:40
220.134.242.165 attackbotsspam
DATE:2019-08-12 04:29:33, IP:220.134.242.165, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-08-12 19:11:12
220.134.248.234 attackbots
Unauthorized connection attempt from IP address 220.134.248.234 on Port 445(SMB)
2019-07-14 07:44:25
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.134.24.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43319
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.134.24.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:35:27 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
248.24.134.220.in-addr.arpa domain name pointer 220-134-24-248.hinet-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.24.134.220.in-addr.arpa	name = 220-134-24-248.hinet-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.164.96.82 attackspambots
" "
2019-08-07 09:18:06
117.93.195.74 attack
port scan and connect, tcp 23 (telnet)
2019-08-07 09:33:16
58.219.230.229 attack
23/tcp 2323/tcp
[2019-07-30/08-06]2pkt
2019-08-07 09:06:22
104.248.1.14 attackbotsspam
Aug  7 00:33:14 host sshd\[27113\]: Invalid user shell from 104.248.1.14 port 36232
Aug  7 00:33:14 host sshd\[27113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.1.14
...
2019-08-07 09:12:58
209.97.169.136 attack
Aug  7 03:14:15 server sshd\[32027\]: Invalid user police from 209.97.169.136 port 56810
Aug  7 03:14:15 server sshd\[32027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.169.136
Aug  7 03:14:18 server sshd\[32027\]: Failed password for invalid user police from 209.97.169.136 port 56810 ssh2
Aug  7 03:19:30 server sshd\[16067\]: Invalid user aurora from 209.97.169.136 port 55144
Aug  7 03:19:30 server sshd\[16067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.169.136
2019-08-07 08:36:45
49.207.180.197 attack
2019-08-06T22:13:52.461439abusebot-4.cloudsearch.cf sshd\[11999\]: Invalid user jay from 49.207.180.197 port 5357
2019-08-07 09:32:23
91.134.169.200 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-28/08-06]6pkt,1pt.(tcp)
2019-08-07 09:09:29
109.92.229.239 attackbotsspam
23/tcp 23/tcp
[2019-07-19/08-06]2pkt
2019-08-07 09:14:07
120.92.191.244 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-07/08-06]38pkt,1pt.(tcp)
2019-08-07 09:15:57
117.93.112.166 attack
20 attempts against mh-ssh on beach.magehost.pro
2019-08-07 08:52:59
196.52.43.118 attack
9200/tcp 4786/tcp 9418/tcp...
[2019-06-07/08-06]36pkt,24pt.(tcp),7pt.(udp),1tp.(icmp)
2019-08-07 08:57:32
103.107.245.3 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-06/08-06]13pkt,1pt.(tcp)
2019-08-07 09:17:11
80.82.70.118 attack
Portscan or hack attempt detected by psad/fwsnort
2019-08-07 09:17:34
139.162.86.84 attackbotsspam
firewall-block, port(s): 8001/tcp
2019-08-07 09:08:35
123.214.170.38 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-07-18/08-06]5pkt,1pt.(tcp)
2019-08-07 09:22:46

最近上报的IP列表

208.218.182.52 233.68.222.174 28.255.93.77 81.158.21.247
243.28.180.116 5.2.111.146 246.91.66.212 219.16.49.148
240.47.18.133 132.33.106.214 95.6.111.94 39.207.78.176
224.167.54.26 124.106.217.49 166.58.173.48 14.129.199.52
232.157.125.231 206.155.126.81 62.244.140.145 177.92.15.41