必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.149.110.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.149.110.134.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 05:52:44 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 134.110.149.245.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.110.149.245.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.28.168.86 attack
web-1 [ssh] SSH Attack
2019-09-16 22:29:14
119.163.250.237 attackbotsspam
Sep 16 03:22:21 mailman sshd[15644]: Invalid user pi from 119.163.250.237
Sep 16 03:22:21 mailman sshd[15642]: Invalid user pi from 119.163.250.237
Sep 16 03:22:21 mailman sshd[15642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.250.237 
Sep 16 03:22:21 mailman sshd[15644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.250.237
2019-09-16 23:32:03
197.161.142.31 attackbots
Lines containing failures of 197.161.142.31
Sep 16 10:17:56 shared10 sshd[10698]: Invalid user admin from 197.161.142.31 port 37925
Sep 16 10:17:56 shared10 sshd[10698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.161.142.31
Sep 16 10:17:59 shared10 sshd[10698]: Failed password for invalid user admin from 197.161.142.31 port 37925 ssh2
Sep 16 10:17:59 shared10 sshd[10698]: Connection closed by invalid user admin 197.161.142.31 port 37925 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.161.142.31
2019-09-16 22:24:37
178.33.233.54 attackspam
Sep 16 04:22:24 friendsofhawaii sshd\[20041\]: Invalid user qmailq from 178.33.233.54
Sep 16 04:22:24 friendsofhawaii sshd\[20041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns231729.ovh.net
Sep 16 04:22:27 friendsofhawaii sshd\[20041\]: Failed password for invalid user qmailq from 178.33.233.54 port 37825 ssh2
Sep 16 04:26:31 friendsofhawaii sshd\[20387\]: Invalid user aartjan from 178.33.233.54
Sep 16 04:26:31 friendsofhawaii sshd\[20387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns231729.ovh.net
2019-09-16 22:42:05
94.177.214.200 attack
$f2bV_matches
2019-09-16 22:43:36
115.178.24.72 attackspam
Sep 16 04:06:04 lcdev sshd\[16157\]: Invalid user shuihaw from 115.178.24.72
Sep 16 04:06:04 lcdev sshd\[16157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.178.24.72
Sep 16 04:06:06 lcdev sshd\[16157\]: Failed password for invalid user shuihaw from 115.178.24.72 port 47644 ssh2
Sep 16 04:13:55 lcdev sshd\[16934\]: Invalid user tftp from 115.178.24.72
Sep 16 04:13:55 lcdev sshd\[16934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.178.24.72
2019-09-16 22:19:19
144.217.84.164 attackspam
Sep 16 14:26:17 MK-Soft-VM3 sshd\[17785\]: Invalid user erman from 144.217.84.164 port 41184
Sep 16 14:26:17 MK-Soft-VM3 sshd\[17785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.84.164
Sep 16 14:26:19 MK-Soft-VM3 sshd\[17785\]: Failed password for invalid user erman from 144.217.84.164 port 41184 ssh2
...
2019-09-16 23:22:43
84.63.68.211 attackbots
Sep 16 10:17:48 carla sshd[16784]: Invalid user pi from 84.63.68.211
Sep 16 10:17:48 carla sshd[16786]: Invalid user pi from 84.63.68.211
Sep 16 10:17:50 carla sshd[16786]: Failed password for invalid user pi from 84.63.68.211 port 46996 ssh2
Sep 16 10:17:50 carla sshd[16784]: Failed password for invalid user pi from 84.63.68.211 port 46994 ssh2
Sep 16 10:17:50 carla sshd[16787]: Connection closed by 84.63.68.211
Sep 16 10:17:50 carla sshd[16785]: Connection closed by 84.63.68.211


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=84.63.68.211
2019-09-16 22:17:40
185.143.221.104 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-16 23:02:02
37.187.117.187 attack
Sep 16 16:35:46 vps647732 sshd[23015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.117.187
Sep 16 16:35:48 vps647732 sshd[23015]: Failed password for invalid user d from 37.187.117.187 port 56780 ssh2
...
2019-09-16 23:25:58
107.179.28.32 attack
Sep 16 10:17:38 mxgate1 postfix/postscreen[23159]: CONNECT from [107.179.28.32]:43716 to [176.31.12.44]:25
Sep 16 10:17:38 mxgate1 postfix/dnsblog[23286]: addr 107.179.28.32 listed by domain zen.spamhaus.org as 127.0.0.3
Sep 16 10:17:38 mxgate1 postfix/dnsblog[23283]: addr 107.179.28.32 listed by domain b.barracudacentral.org as 127.0.0.2
Sep 16 10:17:44 mxgate1 postfix/postscreen[23159]: DNSBL rank 3 for [107.179.28.32]:43716
Sep x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=107.179.28.32
2019-09-16 22:14:24
127.0.0.1 attackspambots
Test Connectivity
2019-09-16 22:26:56
124.133.52.153 attack
Sep 16 11:23:14 SilenceServices sshd[2816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.133.52.153
Sep 16 11:23:17 SilenceServices sshd[2816]: Failed password for invalid user co from 124.133.52.153 port 34006 ssh2
Sep 16 11:28:20 SilenceServices sshd[4755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.133.52.153
2019-09-16 22:13:43
211.193.13.111 attackbotsspam
2019-09-16T14:03:30.730295hub.schaetter.us sshd\[10978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.13.111  user=mail
2019-09-16T14:03:32.219496hub.schaetter.us sshd\[10978\]: Failed password for mail from 211.193.13.111 port 28074 ssh2
2019-09-16T14:08:03.224077hub.schaetter.us sshd\[11018\]: Invalid user odroid from 211.193.13.111
2019-09-16T14:08:03.295747hub.schaetter.us sshd\[11018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.13.111
2019-09-16T14:08:05.262085hub.schaetter.us sshd\[11018\]: Failed password for invalid user odroid from 211.193.13.111 port 48574 ssh2
...
2019-09-16 22:58:00
79.188.68.90 attackbots
Sep 16 04:18:15 TORMINT sshd\[17200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.68.90  user=root
Sep 16 04:18:16 TORMINT sshd\[17200\]: Failed password for root from 79.188.68.90 port 35364 ssh2
Sep 16 04:23:23 TORMINT sshd\[17521\]: Invalid user cfabllc from 79.188.68.90
Sep 16 04:23:23 TORMINT sshd\[17521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.68.90
...
2019-09-16 22:36:39

最近上报的IP列表

18.207.78.157 121.99.27.130 255.55.137.210 250.229.159.200
203.169.242.197 55.137.118.45 104.252.213.67 220.244.57.183
120.152.80.17 240.106.182.117 181.179.41.8 19.185.6.168
21.122.107.18 73.218.143.248 251.93.224.187 27.115.191.103
103.41.9.149 155.181.233.105 8.85.76.246 160.111.90.126