必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.130.21.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.130.21.185.			IN	A

;; AUTHORITY SECTION:
.			529	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091600 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 16 17:13:11 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 185.21.130.34.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 185.21.130.34.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.190.236.88 attackbots
Sep  3 18:14:09 TORMINT sshd\[13993\]: Invalid user ts3bot from 187.190.236.88
Sep  3 18:14:09 TORMINT sshd\[13993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.236.88
Sep  3 18:14:11 TORMINT sshd\[13993\]: Failed password for invalid user ts3bot from 187.190.236.88 port 39848 ssh2
...
2019-09-04 06:17:07
106.13.2.130 attack
Sep  3 12:34:04 kapalua sshd\[28894\]: Invalid user applmgr from 106.13.2.130
Sep  3 12:34:04 kapalua sshd\[28894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.2.130
Sep  3 12:34:07 kapalua sshd\[28894\]: Failed password for invalid user applmgr from 106.13.2.130 port 36276 ssh2
Sep  3 12:39:16 kapalua sshd\[29638\]: Invalid user aj from 106.13.2.130
Sep  3 12:39:16 kapalua sshd\[29638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.2.130
2019-09-04 06:45:24
178.49.9.210 attackspambots
Sep  4 00:03:11 vps691689 sshd[32697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.49.9.210
Sep  4 00:03:14 vps691689 sshd[32697]: Failed password for invalid user test1 from 178.49.9.210 port 60044 ssh2
Sep  4 00:08:26 vps691689 sshd[386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.49.9.210
...
2019-09-04 06:08:39
49.88.112.90 attackspambots
Sep  3 21:55:01 game-panel sshd[8609]: Failed password for root from 49.88.112.90 port 52967 ssh2
Sep  3 21:55:03 game-panel sshd[8609]: Failed password for root from 49.88.112.90 port 52967 ssh2
Sep  3 21:55:06 game-panel sshd[8609]: Failed password for root from 49.88.112.90 port 52967 ssh2
2019-09-04 05:59:19
144.217.5.73 attack
Sep  3 10:16:11 hanapaa sshd\[1891\]: Invalid user uftp from 144.217.5.73
Sep  3 10:16:11 hanapaa sshd\[1891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-144-217-5.net
Sep  3 10:16:13 hanapaa sshd\[1891\]: Failed password for invalid user uftp from 144.217.5.73 port 41320 ssh2
Sep  3 10:20:36 hanapaa sshd\[2285\]: Invalid user webmaster from 144.217.5.73
Sep  3 10:20:36 hanapaa sshd\[2285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-144-217-5.net
2019-09-04 06:27:28
192.42.116.16 attackspam
Sep  4 00:31:33 dedicated sshd[21323]: Failed password for root from 192.42.116.16 port 35146 ssh2
Sep  4 00:31:35 dedicated sshd[21323]: Failed password for root from 192.42.116.16 port 35146 ssh2
Sep  4 00:31:37 dedicated sshd[21323]: Failed password for root from 192.42.116.16 port 35146 ssh2
Sep  4 00:31:39 dedicated sshd[21323]: Failed password for root from 192.42.116.16 port 35146 ssh2
Sep  4 00:31:42 dedicated sshd[21323]: Failed password for root from 192.42.116.16 port 35146 ssh2
2019-09-04 06:37:58
119.146.150.134 attack
Sep  3 12:00:16 php2 sshd\[30875\]: Invalid user joan from 119.146.150.134
Sep  3 12:00:16 php2 sshd\[30875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.150.134
Sep  3 12:00:19 php2 sshd\[30875\]: Failed password for invalid user joan from 119.146.150.134 port 59744 ssh2
Sep  3 12:03:25 php2 sshd\[31274\]: Invalid user teamspeak3 from 119.146.150.134
Sep  3 12:03:25 php2 sshd\[31274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.150.134
2019-09-04 06:33:20
93.54.125.82 attackbotsspam
Admin logins
2019-09-04 06:48:06
129.204.77.45 attack
Sep  3 18:14:17 ny01 sshd[31679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.45
Sep  3 18:14:19 ny01 sshd[31679]: Failed password for invalid user qwerty from 129.204.77.45 port 34245 ssh2
Sep  3 18:19:13 ny01 sshd[32454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.45
2019-09-04 06:32:54
37.59.100.22 attackspambots
Sep  3 09:53:35 eddieflores sshd\[8494\]: Invalid user yoshiaki from 37.59.100.22
Sep  3 09:53:35 eddieflores sshd\[8494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=22.ip-37-59-100.eu
Sep  3 09:53:37 eddieflores sshd\[8494\]: Failed password for invalid user yoshiaki from 37.59.100.22 port 38390 ssh2
Sep  3 09:57:41 eddieflores sshd\[8900\]: Invalid user mcserv from 37.59.100.22
Sep  3 09:57:41 eddieflores sshd\[8900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=22.ip-37-59-100.eu
2019-09-04 06:01:40
220.134.138.111 attack
Sep  3 22:40:20 dev0-dcfr-rnet sshd[26582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.138.111
Sep  3 22:40:23 dev0-dcfr-rnet sshd[26582]: Failed password for invalid user crm from 220.134.138.111 port 43116 ssh2
Sep  3 22:45:22 dev0-dcfr-rnet sshd[26699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.138.111
2019-09-04 06:23:45
162.247.74.200 attackbotsspam
Sep  3 22:17:04 MK-Soft-VM5 sshd\[18814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.200  user=root
Sep  3 22:17:06 MK-Soft-VM5 sshd\[18814\]: Failed password for root from 162.247.74.200 port 41164 ssh2
Sep  3 22:17:08 MK-Soft-VM5 sshd\[18814\]: Failed password for root from 162.247.74.200 port 41164 ssh2
...
2019-09-04 06:24:32
49.231.229.227 attackbots
Sep  4 01:41:59 taivassalofi sshd[128682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.229.227
Sep  4 01:42:01 taivassalofi sshd[128682]: Failed password for invalid user aman from 49.231.229.227 port 32990 ssh2
...
2019-09-04 06:45:55
162.247.74.74 attackbotsspam
v+ssh-bruteforce
2019-09-04 06:40:54
185.176.27.34 attack
firewall-block, port(s): 32397/tcp
2019-09-04 06:49:02

最近上报的IP列表

193.7.200.104 143.255.143.190 13.127.205.195 200.43.238.126
246.198.149.150 72.242.226.4 226.214.16.48 30.176.227.223
175.26.245.173 167.43.3.188 27.222.118.0 215.82.32.44
53.210.217.8 111.72.194.79 222.162.175.252 216.252.136.23
211.254.79.98 208.157.253.236 35.183.140.10 121.216.160.38