必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Multicast Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 234.20.199.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;234.20.199.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 07:11:12 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 137.199.20.234.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.199.20.234.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.56.110.203 attackspam
Nov  1 11:48:00 localhost sshd[10427]: Failed password for root from 218.56.110.203 port 61761 ssh2
Nov  1 11:52:35 localhost sshd[10496]: Invalid user demo from 218.56.110.203 port 18482
Nov  1 11:52:35 localhost sshd[10496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.110.203 
Nov  1 11:52:35 localhost sshd[10496]: Invalid user demo from 218.56.110.203 port 18482
Nov  1 11:52:37 localhost sshd[10496]: Failed password for invalid user demo from 218.56.110.203 port 18482 ssh2
2019-11-01 21:07:49
167.99.196.237 attack
2019-11-01T13:43:03.906646hz01.yumiweb.com sshd\[19639\]: Invalid user admin from 167.99.196.237 port 59782
2019-11-01T13:43:04.172589hz01.yumiweb.com sshd\[19641\]: Invalid user admin from 167.99.196.237 port 60084
2019-11-01T13:43:04.441935hz01.yumiweb.com sshd\[19643\]: Invalid user user from 167.99.196.237 port 60420
...
2019-11-01 20:47:14
101.109.250.11 attack
Automatic report - Banned IP Access
2019-11-01 21:21:10
154.8.217.73 attackspam
Nov  1 13:45:28 dedicated sshd[13228]: Invalid user O0I9U8 from 154.8.217.73 port 58080
2019-11-01 21:04:30
89.238.150.235 attack
2019-11-01T12:53:31.487068mail01 postfix/smtpd[9910]: warning: unknown[89.238.150.235]: SASL PLAIN authentication failed:
2019-11-01T12:53:37.254935mail01 postfix/smtpd[9910]: warning: unknown[89.238.150.235]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-01T12:53:46.127199mail01 postfix/smtpd[32628]: warning: unknown[89.238.150.235]: SASL PLAIN authentication failed:
2019-11-01 20:57:57
62.175.182.165 attack
Automatic report - Port Scan Attack
2019-11-01 20:46:28
191.252.204.222 attack
Lines containing failures of 191.252.204.222
Oct 30 18:05:07 siirappi sshd[2292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.204.222  user=r.r
Oct 30 18:05:09 siirappi sshd[2292]: Failed password for r.r from 191.252.204.222 port 54470 ssh2
Oct 30 18:05:10 siirappi sshd[2292]: Received disconnect from 191.252.204.222 port 54470:11: Bye Bye [preauth]
Oct 30 18:05:10 siirappi sshd[2292]: Disconnected from 191.252.204.222 port 54470 [preauth]
Oct 30 18:23:17 siirappi sshd[2544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.204.222  user=r.r
Oct 30 18:23:18 siirappi sshd[2544]: Failed password for r.r from 191.252.204.222 port 47260 ssh2
Oct 30 18:23:19 siirappi sshd[2544]: Received disconnect from 191.252.204.222 port 47260:11: Bye Bye [preauth]
Oct 30 18:23:19 siirappi sshd[2544]: Disconnected from 191.252.204.222 port 47260 [preauth]
Oct 30 18:29:51 siirappi sshd[2618]:........
------------------------------
2019-11-01 21:18:37
122.51.113.137 attackspam
/var/log/messages:Nov  1 12:33:08 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1572611588.730:122181): pid=23470 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=23471 suid=74 rport=47678 laddr=104.167.106.93 lport=23  exe="/usr/sbin/sshd" hostname=? addr=122.51.113.137 terminal=? res=success'
/var/log/messages:Nov  1 12:33:08 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1572611588.734:122182): pid=23470 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=23471 suid=74 rport=47678 laddr=104.167.106.93 lport=23  exe="/usr/sbin/sshd" hostname=? addr=122.51.113.137 terminal=? res=success'
/var/log/messages:Nov  1 12:33:10 sanyalnet-cloud-vps fail2ban.filter[1538]: INFO [sshd] F........
-------------------------------
2019-11-01 21:08:43
134.209.108.30 attack
Nov  1 02:27:06 auw2 sshd\[8336\]: Invalid user youmuyou from 134.209.108.30
Nov  1 02:27:06 auw2 sshd\[8336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30
Nov  1 02:27:07 auw2 sshd\[8336\]: Failed password for invalid user youmuyou from 134.209.108.30 port 35024 ssh2
Nov  1 02:31:54 auw2 sshd\[8707\]: Invalid user gamespot from 134.209.108.30
Nov  1 02:31:54 auw2 sshd\[8707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30
2019-11-01 20:48:05
80.211.159.118 attack
Nov  1 12:50:00 cvbnet sshd[18806]: Failed password for root from 80.211.159.118 port 54072 ssh2
Nov  1 12:53:53 cvbnet sshd[18809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.159.118 
...
2019-11-01 20:54:41
51.15.203.103 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/51.15.203.103/ 
 
 FR - 1H : (61)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN12876 
 
 IP : 51.15.203.103 
 
 CIDR : 51.15.128.0/17 
 
 PREFIX COUNT : 18 
 
 UNIQUE IP COUNT : 507904 
 
 
 ATTACKS DETECTED ASN12876 :  
  1H - 1 
  3H - 2 
  6H - 6 
 12H - 8 
 24H - 15 
 
 DateTime : 2019-11-01 12:54:02 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-01 20:45:30
119.18.192.98 attack
Nov  1 13:50:05 vps01 sshd[2668]: Failed password for root from 119.18.192.98 port 25413 ssh2
2019-11-01 20:59:32
106.12.24.1 attackbotsspam
Automatic report - Banned IP Access
2019-11-01 20:58:43
182.61.109.103 attackbotsspam
Nov  1 03:01:40 web9 sshd\[3606\]: Invalid user homeward from 182.61.109.103
Nov  1 03:01:40 web9 sshd\[3606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.103
Nov  1 03:01:43 web9 sshd\[3606\]: Failed password for invalid user homeward from 182.61.109.103 port 36142 ssh2
Nov  1 03:06:07 web9 sshd\[4268\]: Invalid user mikkel from 182.61.109.103
Nov  1 03:06:07 web9 sshd\[4268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.103
2019-11-01 21:15:17
106.13.123.134 attackbotsspam
Nov  1 13:38:31 vps01 sshd[2463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.123.134
Nov  1 13:38:32 vps01 sshd[2463]: Failed password for invalid user oniyacya from 106.13.123.134 port 41920 ssh2
2019-11-01 20:48:26

最近上报的IP列表

90.20.185.170 189.185.224.84 210.128.126.29 106.196.65.229
54.241.159.230 58.100.31.181 232.120.168.100 126.246.16.82
209.35.195.58 217.10.119.230 247.117.116.222 179.59.28.210
33.11.229.183 175.195.88.99 161.189.199.0 68.48.70.91
101.9.82.1 119.149.126.90 145.247.187.63 67.149.118.18