必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.134.197.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;249.134.197.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 19:29:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 53.197.134.249.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.197.134.249.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
197.62.204.3 attackbots
Jun 16 03:33:43 itv-usvr-01 sshd[13586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.62.204.3  user=root
Jun 16 03:33:45 itv-usvr-01 sshd[13586]: Failed password for root from 197.62.204.3 port 44339 ssh2
Jun 16 03:42:07 itv-usvr-01 sshd[14032]: Invalid user dio from 197.62.204.3
Jun 16 03:42:07 itv-usvr-01 sshd[14032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.62.204.3
Jun 16 03:42:07 itv-usvr-01 sshd[14032]: Invalid user dio from 197.62.204.3
Jun 16 03:42:09 itv-usvr-01 sshd[14032]: Failed password for invalid user dio from 197.62.204.3 port 28097 ssh2
2020-06-16 07:23:47
200.194.36.54 attack
Automatic report - Port Scan Attack
2020-06-16 07:37:25
186.10.125.209 attackbots
sshd
2020-06-16 07:10:30
45.122.221.210 attackbotsspam
Jun 15 23:17:41 lnxweb61 sshd[1976]: Failed password for root from 45.122.221.210 port 58510 ssh2
Jun 15 23:17:41 lnxweb61 sshd[1976]: Failed password for root from 45.122.221.210 port 58510 ssh2
2020-06-16 07:43:28
195.1.144.210 attack
Lines containing failures of 195.1.144.210
Jun 15 21:21:53 shared11 sshd[7938]: Connection closed by 195.1.144.210 port 56662 [preauth]
Jun 15 21:32:47 shared11 sshd[11614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.1.144.210  user=r.r
Jun 15 21:32:48 shared11 sshd[11614]: Failed password for r.r from 195.1.144.210 port 56975 ssh2
Jun 15 21:32:48 shared11 sshd[11614]: Received disconnect from 195.1.144.210 port 56975:11: Bye Bye [preauth]
Jun 15 21:32:48 shared11 sshd[11614]: Disconnected from authenticating user r.r 195.1.144.210 port 56975 [preauth]
Jun 15 21:43:28 shared11 sshd[16335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.1.144.210  user=r.r
Jun 15 21:43:29 shared11 sshd[16335]: Failed password for r.r from 195.1.144.210 port 57287 ssh2
Jun 15 21:43:29 shared11 sshd[16335]: Received disconnect from 195.1.144.210 port 57287:11: Bye Bye [preauth]
Jun 15 21:43:29 shar........
------------------------------
2020-06-16 07:23:02
49.232.135.102 attackbots
Jun 15 20:19:42 vps46666688 sshd[15901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.135.102
Jun 15 20:19:44 vps46666688 sshd[15901]: Failed password for invalid user amy from 49.232.135.102 port 48882 ssh2
...
2020-06-16 07:30:22
140.255.57.1 attackbots
spam (f2b h2)
2020-06-16 07:16:19
110.50.85.28 attackbots
Jun 15 21:36:46 new sshd[13443]: reveeclipse mapping checking getaddrinfo for ip-85-28.mncplaymedia.com [110.50.85.28] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 15 21:36:48 new sshd[13443]: Failed password for invalid user db2inst3 from 110.50.85.28 port 47814 ssh2
Jun 15 21:36:48 new sshd[13443]: Received disconnect from 110.50.85.28: 11: Bye Bye [preauth]
Jun 15 21:50:45 new sshd[17544]: reveeclipse mapping checking getaddrinfo for ip-85-28.mncplaymedia.com [110.50.85.28] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 15 21:50:45 new sshd[17544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.50.85.28  user=r.r
Jun 15 21:50:47 new sshd[17544]: Failed password for r.r from 110.50.85.28 port 42024 ssh2
Jun 15 21:50:47 new sshd[17544]: Received disconnect from 110.50.85.28: 11: Bye Bye [preauth]
Jun 15 21:55:02 new sshd[18367]: reveeclipse mapping checking getaddrinfo for ip-85-28.mncplaymedia.com [110.50.85.28] failed - POSSIBLE BREAK........
-------------------------------
2020-06-16 07:15:11
203.130.242.68 attackbotsspam
Invalid user demo from 203.130.242.68 port 54088
2020-06-16 07:18:54
173.212.247.160 attackspambots
fail2ban/Jun 16 00:14:27 h1962932 sshd[4386]: Invalid user gordon from 173.212.247.160 port 60064
Jun 16 00:14:27 h1962932 sshd[4386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi146647.contaboserver.net
Jun 16 00:14:27 h1962932 sshd[4386]: Invalid user gordon from 173.212.247.160 port 60064
Jun 16 00:14:29 h1962932 sshd[4386]: Failed password for invalid user gordon from 173.212.247.160 port 60064 ssh2
Jun 16 00:21:30 h1962932 sshd[4632]: Invalid user www from 173.212.247.160 port 42440
2020-06-16 07:20:08
188.3.124.105 attackspam
Automatic report - XMLRPC Attack
2020-06-16 07:21:08
114.67.76.166 attackbots
Jun 16 01:12:53 ift sshd\[52737\]: Invalid user jdebruin from 114.67.76.166Jun 16 01:12:56 ift sshd\[52737\]: Failed password for invalid user jdebruin from 114.67.76.166 port 33774 ssh2Jun 16 01:18:25 ift sshd\[54253\]: Invalid user dps from 114.67.76.166Jun 16 01:18:27 ift sshd\[54253\]: Failed password for invalid user dps from 114.67.76.166 port 41542 ssh2Jun 16 01:21:22 ift sshd\[54877\]: Invalid user juliana from 114.67.76.166
...
2020-06-16 07:23:20
137.74.44.162 attackbotsspam
Jun 15 15:58:37 dignus sshd[1858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.44.162
Jun 15 15:58:39 dignus sshd[1858]: Failed password for invalid user musikbot from 137.74.44.162 port 47880 ssh2
Jun 15 16:01:40 dignus sshd[2193]: Invalid user jenkins from 137.74.44.162 port 47860
Jun 15 16:01:40 dignus sshd[2193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.44.162
Jun 15 16:01:42 dignus sshd[2193]: Failed password for invalid user jenkins from 137.74.44.162 port 47860 ssh2
...
2020-06-16 07:04:39
180.76.108.73 attack
Invalid user jumper from 180.76.108.73 port 38936
2020-06-16 07:10:55
180.166.141.58 attackbots
Jun 16 01:32:15 debian-2gb-nbg1-2 kernel: \[14522640.684010\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=180.166.141.58 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x00 TTL=237 ID=30945 PROTO=TCP SPT=50029 DPT=61405 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-16 07:34:08

最近上报的IP列表

30.106.12.140 127.85.9.114 251.108.169.9 99.198.255.228
32.238.108.34 7.81.131.151 255.242.99.145 160.23.117.197
217.1.137.113 198.10.177.230 163.218.146.138 210.34.202.77
220.141.54.151 4.56.52.229 118.226.96.218 236.31.122.175
230.155.73.145 233.161.114.37 207.248.111.224 247.128.148.19