必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.102.67.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.102.67.139.			IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:10:36 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
139.67.102.34.in-addr.arpa domain name pointer 139.67.102.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.67.102.34.in-addr.arpa	name = 139.67.102.34.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.89.211.184 attack
Dovecot Invalid User Login Attempt.
2020-05-05 04:19:01
129.226.179.187 attack
$f2bV_matches
2020-05-05 04:11:40
37.187.21.81 attack
May  4 22:21:12 Ubuntu-1404-trusty-64-minimal sshd\[26208\]: Invalid user huang from 37.187.21.81
May  4 22:21:12 Ubuntu-1404-trusty-64-minimal sshd\[26208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.21.81
May  4 22:21:14 Ubuntu-1404-trusty-64-minimal sshd\[26208\]: Failed password for invalid user huang from 37.187.21.81 port 41419 ssh2
May  4 22:28:08 Ubuntu-1404-trusty-64-minimal sshd\[29942\]: Invalid user anders from 37.187.21.81
May  4 22:28:08 Ubuntu-1404-trusty-64-minimal sshd\[29942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.21.81
2020-05-05 04:39:35
192.144.140.20 attack
k+ssh-bruteforce
2020-05-05 04:15:47
109.102.251.131 attackbotsspam
trying to access non-authorized port
2020-05-05 04:20:11
217.182.147.96 attack
20 attempts against mh-misbehave-ban on beach
2020-05-05 04:10:13
14.248.129.221 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-05-05 04:12:23
106.13.230.238 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-05 04:40:27
35.173.3.6 attackbots
www.rbtierfotografie.de 35.173.3.6 [04/May/2020:14:06:41 +0200] "POST /wp-login.php HTTP/1.1" 200 6190 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
www.rbtierfotografie.de 35.173.3.6 [04/May/2020:14:06:41 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4050 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-05 04:24:05
196.64.9.207 attackbotsspam
Automatic report - Port Scan Attack
2020-05-05 04:07:42
62.104.16.224 attackspam
May  4 22:04:30 jane sshd[22587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.104.16.224 
May  4 22:04:32 jane sshd[22587]: Failed password for invalid user lgs from 62.104.16.224 port 36302 ssh2
...
2020-05-05 04:22:03
106.75.90.200 attackspambots
W 5701,/var/log/auth.log,-,-
2020-05-05 04:31:50
45.142.195.7 attackbotsspam
May  4 22:37:51 srv01 postfix/smtpd\[10289\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 22:38:02 srv01 postfix/smtpd\[10289\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 22:38:04 srv01 postfix/smtpd\[10319\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 22:38:05 srv01 postfix/smtpd\[10320\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 22:38:42 srv01 postfix/smtpd\[10289\]: warning: unknown\[45.142.195.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-05 04:41:18
186.92.7.223 attackspam
Unauthorized connection attempt detected from IP address 186.92.7.223 to port 80
2020-05-05 04:26:49
37.59.52.44 attackspam
Automatic report - Banned IP Access
2020-05-05 04:12:04

最近上报的IP列表

34.123.170.143 34.121.209.99 34.120.248.84 34.101.218.46
34.123.50.172 34.123.31.41 31.9.95.219 34.124.255.186
34.125.111.253 34.125.126.37 34.124.129.28 34.125.137.66
34.124.252.147 34.123.84.183 34.125.134.127 34.125.140.226
34.125.159.165 34.125.182.174 34.125.143.168 34.125.192.231