必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 32.134.30.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;32.134.30.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 19:50:34 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 142.30.134.32.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.30.134.32.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
166.139.68.6 attackspambots
Bruteforce detected by fail2ban
2020-08-10 22:16:19
222.186.175.217 attackbots
SSH Brute-Force attacks
2020-08-10 22:26:10
164.68.112.178 attackspam
Unauthorized connection attempt from IP address 164.68.112.178 on Port 143(IMAP)
2020-08-10 21:58:42
117.254.186.98 attack
Aug 10 13:55:08 onepixel sshd[1810278]: Failed password for invalid user QW from 117.254.186.98 port 33620 ssh2
Aug 10 13:59:19 onepixel sshd[1812625]: Invalid user 1qaz#EDCxsw2 from 117.254.186.98 port 56858
Aug 10 13:59:19 onepixel sshd[1812625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.254.186.98 
Aug 10 13:59:19 onepixel sshd[1812625]: Invalid user 1qaz#EDCxsw2 from 117.254.186.98 port 56858
Aug 10 13:59:21 onepixel sshd[1812625]: Failed password for invalid user 1qaz#EDCxsw2 from 117.254.186.98 port 56858 ssh2
2020-08-10 22:23:52
213.183.101.89 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-10 22:05:45
122.117.202.246 attack
1597061250 - 08/10/2020 14:07:30 Host: 122.117.202.246/122.117.202.246 Port: 23 TCP Blocked
...
2020-08-10 22:13:32
143.255.8.2 attackspambots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-10 21:47:48
178.153.103.113 attack
Bruteforce detected by fail2ban
2020-08-10 21:52:27
192.144.218.101 attackbotsspam
Aug 10 13:56:33 roki-contabo sshd\[14573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.101  user=root
Aug 10 13:56:36 roki-contabo sshd\[14573\]: Failed password for root from 192.144.218.101 port 43930 ssh2
Aug 10 14:03:43 roki-contabo sshd\[14711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.101  user=root
Aug 10 14:03:45 roki-contabo sshd\[14711\]: Failed password for root from 192.144.218.101 port 35560 ssh2
Aug 10 14:07:19 roki-contabo sshd\[14765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.101  user=root
...
2020-08-10 22:23:29
180.76.120.49 attack
Aug 10 09:13:08 vm0 sshd[28883]: Failed password for root from 180.76.120.49 port 48294 ssh2
Aug 10 14:56:32 vm0 sshd[16799]: Failed password for root from 180.76.120.49 port 43644 ssh2
...
2020-08-10 21:54:15
87.98.153.22 attack
Aug 10 04:51:12 spidey sshd[22948]: Invalid user admin from 87.98.153.22 port 41252
Aug 10 04:51:15 spidey sshd[22948]: error: PAM: User not known to the underlying authentication module for illegal user admin from 87.98.153.22
Aug 10 04:51:12 spidey sshd[22948]: Invalid user admin from 87.98.153.22 port 41252
Aug 10 04:51:15 spidey sshd[22948]: error: PAM: User not known to the underlying authentication module for illegal user admin from 87.98.153.22
Aug 10 04:51:12 spidey sshd[22948]: Invalid user admin from 87.98.153.22 port 41252
Aug 10 04:51:15 spidey sshd[22948]: error: PAM: User not known to the underlying authentication module for illegal user admin from 87.98.153.22
Aug 10 04:51:15 spidey sshd[22948]: Failed keyboard-interactive/pam for invalid user admin from 87.98.153.22 port 41252 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=87.98.153.22
2020-08-10 22:08:25
106.13.84.151 attack
2020-08-10T13:35:15.288734shield sshd\[30257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
2020-08-10T13:35:16.551252shield sshd\[30257\]: Failed password for root from 106.13.84.151 port 48410 ssh2
2020-08-10T13:39:04.415061shield sshd\[30603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
2020-08-10T13:39:06.114193shield sshd\[30603\]: Failed password for root from 106.13.84.151 port 59730 ssh2
2020-08-10T13:42:41.268600shield sshd\[30920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.151  user=root
2020-08-10 22:15:14
212.124.181.119 attackspam
Automatic report - Port Scan Attack
2020-08-10 21:46:41
222.186.180.147 attackbots
2020-08-10T14:08:06.687225shield sshd\[2269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
2020-08-10T14:08:08.867763shield sshd\[2269\]: Failed password for root from 222.186.180.147 port 23646 ssh2
2020-08-10T14:08:11.829651shield sshd\[2269\]: Failed password for root from 222.186.180.147 port 23646 ssh2
2020-08-10T14:08:15.870847shield sshd\[2269\]: Failed password for root from 222.186.180.147 port 23646 ssh2
2020-08-10T14:08:19.130887shield sshd\[2269\]: Failed password for root from 222.186.180.147 port 23646 ssh2
2020-08-10 22:12:03
222.75.1.197 attackspambots
2020-08-10T15:15:29.062369vps773228.ovh.net sshd[26449]: Failed password for root from 222.75.1.197 port 43836 ssh2
2020-08-10T15:19:14.538036vps773228.ovh.net sshd[26489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.75.1.197  user=root
2020-08-10T15:19:16.538041vps773228.ovh.net sshd[26489]: Failed password for root from 222.75.1.197 port 54008 ssh2
2020-08-10T15:23:03.631142vps773228.ovh.net sshd[26529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.75.1.197  user=root
2020-08-10T15:23:05.400134vps773228.ovh.net sshd[26529]: Failed password for root from 222.75.1.197 port 35948 ssh2
...
2020-08-10 22:19:12

最近上报的IP列表

136.246.169.185 224.158.234.114 12.49.77.255 173.172.20.219
195.74.154.4 140.191.138.158 182.130.25.125 235.12.31.208
75.209.196.93 185.50.226.218 192.129.254.234 108.162.247.155
49.202.44.222 53.6.96.232 245.147.214.75 80.97.180.171
255.28.164.8 142.15.159.87 70.184.153.220 28.195.200.159