必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.11.91.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19395
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.11.91.134.			IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:02:34 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 134.91.11.34.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.91.11.34.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.62.153.15 attackspam
$f2bV_matches
2020-07-22 13:25:23
37.187.75.16 attackbotsspam
37.187.75.16 - - [22/Jul/2020:06:44:20 +0100] "POST /wp-login.php HTTP/1.1" 200 4971 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.187.75.16 - - [22/Jul/2020:06:46:25 +0100] "POST /wp-login.php HTTP/1.1" 200 4971 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.187.75.16 - - [22/Jul/2020:06:48:25 +0100] "POST /wp-login.php HTTP/1.1" 200 4971 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-07-22 14:00:03
49.235.132.42 attackbotsspam
Jul 22 07:26:37 prod4 sshd\[9450\]: Invalid user fyn from 49.235.132.42
Jul 22 07:26:39 prod4 sshd\[9450\]: Failed password for invalid user fyn from 49.235.132.42 port 32926 ssh2
Jul 22 07:31:20 prod4 sshd\[10953\]: Invalid user mxc from 49.235.132.42
...
2020-07-22 13:45:07
1.214.156.164 attackbotsspam
Invalid user vbox from 1.214.156.164 port 33980
2020-07-22 13:56:31
200.31.19.206 attack
2020-07-22T07:07:21.122622ns386461 sshd\[12837\]: Invalid user sawada from 200.31.19.206 port 46470
2020-07-22T07:07:21.127187ns386461 sshd\[12837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.31.19.206
2020-07-22T07:07:22.750049ns386461 sshd\[12837\]: Failed password for invalid user sawada from 200.31.19.206 port 46470 ssh2
2020-07-22T07:10:43.085383ns386461 sshd\[15772\]: Invalid user lyt from 200.31.19.206 port 38102
2020-07-22T07:10:43.088756ns386461 sshd\[15772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.31.19.206
...
2020-07-22 13:39:14
129.204.176.120 attackspam
2020-07-22 07:20:36,119 fail2ban.actions: WARNING [ssh] Ban 129.204.176.120
2020-07-22 13:55:06
171.100.114.150 attackspambots
Jul 22 04:57:26 sigma sshd\[16412\]: Invalid user admina from 171.100.114.150Jul 22 04:57:28 sigma sshd\[16412\]: Failed password for invalid user admina from 171.100.114.150 port 44936 ssh2
...
2020-07-22 13:57:12
91.121.221.195 attackspambots
Jul 22 06:56:44 fhem-rasp sshd[3868]: Invalid user surya from 91.121.221.195 port 40816
...
2020-07-22 13:34:40
120.79.180.193 attack
120.79.180.193 - - [22/Jul/2020:04:57:25 +0100] "POST /wp-login.php HTTP/1.1" 200 2018 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
120.79.180.193 - - [22/Jul/2020:04:57:34 +0100] "POST /wp-login.php HTTP/1.1" 200 2000 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
120.79.180.193 - - [22/Jul/2020:04:57:39 +0100] "POST /wp-login.php HTTP/1.1" 200 1997 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-22 13:38:41
194.87.138.32 attackbotsspam
Invalid user ubnt from 194.87.138.32 port 50098
2020-07-22 13:24:27
68.183.83.38 attackbotsspam
Jul 22 06:57:05 h2779839 sshd[18194]: Invalid user white from 68.183.83.38 port 52536
Jul 22 06:57:05 h2779839 sshd[18194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.38
Jul 22 06:57:05 h2779839 sshd[18194]: Invalid user white from 68.183.83.38 port 52536
Jul 22 06:57:07 h2779839 sshd[18194]: Failed password for invalid user white from 68.183.83.38 port 52536 ssh2
Jul 22 07:01:45 h2779839 sshd[18249]: Invalid user sjw from 68.183.83.38 port 38468
Jul 22 07:01:45 h2779839 sshd[18249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.38
Jul 22 07:01:45 h2779839 sshd[18249]: Invalid user sjw from 68.183.83.38 port 38468
Jul 22 07:01:47 h2779839 sshd[18249]: Failed password for invalid user sjw from 68.183.83.38 port 38468 ssh2
Jul 22 07:06:18 h2779839 sshd[18339]: Invalid user csc from 68.183.83.38 port 52634
...
2020-07-22 13:45:22
159.65.224.137 attackbots
Jul 22 07:32:34 vps sshd[919960]: Failed password for invalid user cbl from 159.65.224.137 port 42224 ssh2
Jul 22 07:37:07 vps sshd[940277]: Invalid user sw from 159.65.224.137 port 57656
Jul 22 07:37:07 vps sshd[940277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.224.137
Jul 22 07:37:09 vps sshd[940277]: Failed password for invalid user sw from 159.65.224.137 port 57656 ssh2
Jul 22 07:41:55 vps sshd[962007]: Invalid user whj from 159.65.224.137 port 44856
...
2020-07-22 13:47:14
218.92.0.248 attack
Jul 22 07:21:22 vps sshd[871535]: Failed password for root from 218.92.0.248 port 62575 ssh2
Jul 22 07:21:24 vps sshd[871535]: Failed password for root from 218.92.0.248 port 62575 ssh2
Jul 22 07:21:29 vps sshd[871535]: Failed password for root from 218.92.0.248 port 62575 ssh2
Jul 22 07:21:32 vps sshd[871535]: Failed password for root from 218.92.0.248 port 62575 ssh2
Jul 22 07:21:35 vps sshd[871535]: Failed password for root from 218.92.0.248 port 62575 ssh2
...
2020-07-22 13:29:38
61.68.227.94 attack
Jul 22 06:59:56 srv-ubuntu-dev3 sshd[89630]: Invalid user user from 61.68.227.94
Jul 22 06:59:56 srv-ubuntu-dev3 sshd[89630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.68.227.94
Jul 22 06:59:56 srv-ubuntu-dev3 sshd[89630]: Invalid user user from 61.68.227.94
Jul 22 06:59:57 srv-ubuntu-dev3 sshd[89630]: Failed password for invalid user user from 61.68.227.94 port 50662 ssh2
Jul 22 07:04:49 srv-ubuntu-dev3 sshd[90240]: Invalid user na from 61.68.227.94
Jul 22 07:04:49 srv-ubuntu-dev3 sshd[90240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.68.227.94
Jul 22 07:04:49 srv-ubuntu-dev3 sshd[90240]: Invalid user na from 61.68.227.94
Jul 22 07:04:52 srv-ubuntu-dev3 sshd[90240]: Failed password for invalid user na from 61.68.227.94 port 58636 ssh2
Jul 22 07:09:39 srv-ubuntu-dev3 sshd[90807]: Invalid user asshole from 61.68.227.94
...
2020-07-22 13:46:32
91.92.231.224 attackbotsspam
07/21/2020-23:58:17.341624 91.92.231.224 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-22 13:23:05

最近上报的IP列表

155.44.180.244 30.195.223.221 172.62.224.16 144.210.170.2
115.197.137.113 10.200.76.137 143.1.131.62 160.135.61.91
138.152.57.100 193.224.38.98 150.90.80.185 103.229.74.25
159.228.157.234 151.183.188.130 118.239.82.73 177.244.71.42
231.92.158.236 170.101.191.184 131.211.59.46 222.118.18.185