必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.119.22.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1351
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.119.22.139.			IN	A

;; AUTHORITY SECTION:
.			2516	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082001 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 21 02:37:07 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 139.22.119.34.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 139.22.119.34.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
142.112.147.62 attack
(From hafner.thorsten@gmail.com) We're looking for website owners like yourself who want to automate their existing business and make some extra income... Continuous Residual Income and the product practically sells itself on auto pilot. Check out: http://trimurl.co/AutomateAnyBusiness.
2019-12-09 18:48:26
195.154.242.206 attack
--- report ---
Dec  9 04:28:11 sshd: Connection from 195.154.242.206 port 57239
Dec  9 04:28:11 sshd: Invalid user letmein from 195.154.242.206
Dec  9 04:28:14 sshd: Failed password for invalid user letmein from 195.154.242.206 port 57239 ssh2
Dec  9 04:28:14 sshd: Received disconnect from 195.154.242.206: 11: Bye Bye [preauth]
2019-12-09 18:40:48
61.12.38.162 attackspambots
Dec  9 15:21:31 vibhu-HP-Z238-Microtower-Workstation sshd\[27106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162  user=root
Dec  9 15:21:33 vibhu-HP-Z238-Microtower-Workstation sshd\[27106\]: Failed password for root from 61.12.38.162 port 38166 ssh2
Dec  9 15:29:26 vibhu-HP-Z238-Microtower-Workstation sshd\[27670\]: Invalid user tuoi from 61.12.38.162
Dec  9 15:29:26 vibhu-HP-Z238-Microtower-Workstation sshd\[27670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162
Dec  9 15:29:28 vibhu-HP-Z238-Microtower-Workstation sshd\[27670\]: Failed password for invalid user tuoi from 61.12.38.162 port 46826 ssh2
...
2019-12-09 19:10:57
139.199.248.153 attackbots
Dec  9 11:46:34 localhost sshd\[20163\]: Invalid user dexter from 139.199.248.153
Dec  9 11:46:34 localhost sshd\[20163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153
Dec  9 11:46:35 localhost sshd\[20163\]: Failed password for invalid user dexter from 139.199.248.153 port 60168 ssh2
Dec  9 11:52:24 localhost sshd\[20481\]: Invalid user emplazamiento from 139.199.248.153
Dec  9 11:52:24 localhost sshd\[20481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153
...
2019-12-09 19:00:46
220.79.10.134 attackspambots
Dec  9 09:28:20 hosting sshd[23231]: Invalid user pcap from 220.79.10.134 port 53474
...
2019-12-09 18:44:59
114.230.24.251 spamattack
SASL broute force
2019-12-09 18:57:31
212.92.112.111 attackspam
RDP brute forcing (d)
2019-12-09 18:47:31
123.58.235.59 attack
Dec  9 12:12:53 vps647732 sshd[21136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.235.59
Dec  9 12:12:55 vps647732 sshd[21136]: Failed password for invalid user mongo12 from 123.58.235.59 port 34151 ssh2
...
2019-12-09 19:19:13
45.7.144.2 attack
Dec  9 01:27:58 mail sshd\[62866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.144.2  user=root
...
2019-12-09 19:13:41
159.203.77.51 attackspambots
Dec  9 05:12:53 vps sshd\[23602\]: Invalid user postgres from 159.203.77.51
Dec  9 09:57:59 vps sshd\[28837\]: Invalid user ts from 159.203.77.51
...
2019-12-09 18:50:04
172.72.134.234 attack
2019-12-09T03:00:43.391716homeassistant sshd[28183]: Failed password for invalid user hahn from 172.72.134.234 port 50172 ssh2
2019-12-09T08:03:25.631670homeassistant sshd[4505]: Invalid user yukami from 172.72.134.234 port 42068
2019-12-09T08:03:25.638253homeassistant sshd[4505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.72.134.234
...
2019-12-09 18:49:50
157.245.98.160 attackspam
Dec  9 16:37:52 webhost01 sshd[32166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.98.160
Dec  9 16:37:54 webhost01 sshd[32166]: Failed password for invalid user syamsul from 157.245.98.160 port 33044 ssh2
...
2019-12-09 19:16:52
103.76.22.115 attackbotsspam
2019-12-09T10:40:10.764656abusebot.cloudsearch.cf sshd\[32228\]: Invalid user 123 from 103.76.22.115 port 47040
2019-12-09 18:46:22
151.80.61.103 attackbots
Dec  9 11:33:52 meumeu sshd[7198]: Failed password for root from 151.80.61.103 port 56956 ssh2
Dec  9 11:39:50 meumeu sshd[8320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.61.103 
Dec  9 11:39:53 meumeu sshd[8320]: Failed password for invalid user ulriksen from 151.80.61.103 port 36926 ssh2
...
2019-12-09 18:43:16
118.89.191.145 attackspambots
$f2bV_matches
2019-12-09 19:14:44

最近上报的IP列表

104.168.64.38 11.184.182.220 82.78.189.254 226.117.204.29
84.61.138.153 100.63.182.15 101.159.244.212 97.94.130.244
216.36.25.72 58.202.245.213 242.160.186.2 55.241.185.172
106.236.47.141 104.181.16.38 58.159.210.74 242.122.13.111
0.248.224.15 200.107.235.194 100.215.57.66 127.96.81.233