必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.131.139.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.131.139.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 18:40:53 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
195.139.131.34.in-addr.arpa domain name pointer 195.139.131.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
195.139.131.34.in-addr.arpa	name = 195.139.131.34.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.75.16.138 attackspam
Aug 16 05:20:39 pixelmemory sshd[2227158]: Invalid user 6 from 51.75.16.138 port 34026
Aug 16 05:20:39 pixelmemory sshd[2227158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.16.138 
Aug 16 05:20:39 pixelmemory sshd[2227158]: Invalid user 6 from 51.75.16.138 port 34026
Aug 16 05:20:40 pixelmemory sshd[2227158]: Failed password for invalid user 6 from 51.75.16.138 port 34026 ssh2
Aug 16 05:24:53 pixelmemory sshd[2227958]: Invalid user pepper from 51.75.16.138 port 38961
...
2020-08-16 22:19:33
154.85.38.237 attackbotsspam
2020-08-16T16:53:34.812085lavrinenko.info sshd[14296]: Invalid user min from 154.85.38.237 port 38072
2020-08-16T16:53:34.817829lavrinenko.info sshd[14296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.85.38.237
2020-08-16T16:53:34.812085lavrinenko.info sshd[14296]: Invalid user min from 154.85.38.237 port 38072
2020-08-16T16:53:36.242451lavrinenko.info sshd[14296]: Failed password for invalid user min from 154.85.38.237 port 38072 ssh2
2020-08-16T16:57:48.225829lavrinenko.info sshd[14445]: Invalid user julie from 154.85.38.237 port 46800
...
2020-08-16 22:02:25
94.128.213.185 attackbots
Aug 16 12:43:39 ip-172-31-16-56 sshd\[13526\]: Invalid user lk from 94.128.213.185\
Aug 16 12:43:41 ip-172-31-16-56 sshd\[13526\]: Failed password for invalid user lk from 94.128.213.185 port 35196 ssh2\
Aug 16 12:48:31 ip-172-31-16-56 sshd\[13555\]: Invalid user bdos from 94.128.213.185\
Aug 16 12:48:33 ip-172-31-16-56 sshd\[13555\]: Failed password for invalid user bdos from 94.128.213.185 port 35197 ssh2\
Aug 16 12:53:29 ip-172-31-16-56 sshd\[13603\]: Invalid user admin from 94.128.213.185\
2020-08-16 22:04:13
103.136.40.88 attackbots
Aug 16 14:04:19 game-panel sshd[13544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.40.88
Aug 16 14:04:21 game-panel sshd[13544]: Failed password for invalid user darren from 103.136.40.88 port 60536 ssh2
Aug 16 14:07:55 game-panel sshd[13705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.40.88
2020-08-16 22:21:13
59.125.160.248 attackspam
Aug 16 08:10:08 r.ca sshd[31432]: Failed password for invalid user iptv from 59.125.160.248 port 53475 ssh2
2020-08-16 22:21:30
119.45.137.244 attackspam
Aug 16 16:12:58 abendstille sshd\[30760\]: Invalid user viki from 119.45.137.244
Aug 16 16:12:58 abendstille sshd\[30760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.137.244
Aug 16 16:13:00 abendstille sshd\[30760\]: Failed password for invalid user viki from 119.45.137.244 port 40200 ssh2
Aug 16 16:16:32 abendstille sshd\[2931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.137.244  user=root
Aug 16 16:16:35 abendstille sshd\[2931\]: Failed password for root from 119.45.137.244 port 45574 ssh2
...
2020-08-16 22:27:21
200.133.39.84 attack
Aug 16 14:05:53 rush sshd[23244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.133.39.84
Aug 16 14:05:55 rush sshd[23244]: Failed password for invalid user vps from 200.133.39.84 port 51362 ssh2
Aug 16 14:10:22 rush sshd[23463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.133.39.84
...
2020-08-16 22:20:21
85.209.0.251 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 80 - port: 22 proto: tcp cat: Misc Attackbytes: 74
2020-08-16 22:02:55
117.86.124.36 attackspam
Fail2Ban Ban Triggered
2020-08-16 22:26:21
213.141.157.220 attackbots
Aug 16 14:10:26 ns392434 sshd[4438]: Invalid user zcy from 213.141.157.220 port 32838
Aug 16 14:10:26 ns392434 sshd[4438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.141.157.220
Aug 16 14:10:26 ns392434 sshd[4438]: Invalid user zcy from 213.141.157.220 port 32838
Aug 16 14:10:28 ns392434 sshd[4438]: Failed password for invalid user zcy from 213.141.157.220 port 32838 ssh2
Aug 16 14:21:17 ns392434 sshd[4929]: Invalid user zxc from 213.141.157.220 port 59264
Aug 16 14:21:17 ns392434 sshd[4929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.141.157.220
Aug 16 14:21:17 ns392434 sshd[4929]: Invalid user zxc from 213.141.157.220 port 59264
Aug 16 14:21:19 ns392434 sshd[4929]: Failed password for invalid user zxc from 213.141.157.220 port 59264 ssh2
Aug 16 14:25:04 ns392434 sshd[5113]: Invalid user ad from 213.141.157.220 port 40672
2020-08-16 22:00:42
212.70.149.19 attackbotsspam
Aug 16 16:29:01 galaxy event: galaxy/lswi: smtp: testftp4@uni-potsdam.de [212.70.149.19] authentication failure using internet password
Aug 16 16:29:23 galaxy event: galaxy/lswi: smtp: testftp5@uni-potsdam.de [212.70.149.19] authentication failure using internet password
Aug 16 16:29:46 galaxy event: galaxy/lswi: smtp: testftp6@uni-potsdam.de [212.70.149.19] authentication failure using internet password
Aug 16 16:30:09 galaxy event: galaxy/lswi: smtp: testftp7@uni-potsdam.de [212.70.149.19] authentication failure using internet password
Aug 16 16:30:32 galaxy event: galaxy/lswi: smtp: testftp8@uni-potsdam.de [212.70.149.19] authentication failure using internet password
...
2020-08-16 22:36:07
106.51.3.214 attack
2020-08-16T12:19:48.228340abusebot-6.cloudsearch.cf sshd[7622]: Invalid user dados from 106.51.3.214 port 58542
2020-08-16T12:19:48.235200abusebot-6.cloudsearch.cf sshd[7622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.3.214
2020-08-16T12:19:48.228340abusebot-6.cloudsearch.cf sshd[7622]: Invalid user dados from 106.51.3.214 port 58542
2020-08-16T12:19:50.643741abusebot-6.cloudsearch.cf sshd[7622]: Failed password for invalid user dados from 106.51.3.214 port 58542 ssh2
2020-08-16T12:24:58.704771abusebot-6.cloudsearch.cf sshd[7795]: Invalid user test1 from 106.51.3.214 port 35279
2020-08-16T12:24:58.712501abusebot-6.cloudsearch.cf sshd[7795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.3.214
2020-08-16T12:24:58.704771abusebot-6.cloudsearch.cf sshd[7795]: Invalid user test1 from 106.51.3.214 port 35279
2020-08-16T12:25:00.343443abusebot-6.cloudsearch.cf sshd[7795]: Failed password for i
...
2020-08-16 22:11:38
161.35.193.16 attackspam
Aug 16 12:11:25 XXX sshd[3003]: Invalid user diz from 161.35.193.16 port 49938
2020-08-16 22:02:01
212.129.61.228 attack
212.129.61.228 - - [16/Aug/2020:15:17:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2264 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.61.228 - - [16/Aug/2020:15:17:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2229 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.61.228 - - [16/Aug/2020:15:17:54 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-16 22:38:14
119.2.17.138 attackbots
Aug 16 16:21:15 cosmoit sshd[6903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.2.17.138
2020-08-16 22:35:04

最近上报的IP列表

79.124.82.242 121.66.204.94 48.68.229.68 109.22.60.113
32.175.252.67 59.129.149.87 217.11.198.5 26.226.81.89
198.245.79.152 216.67.160.115 149.134.79.15 238.218.103.99
81.143.177.180 190.61.106.19 18.25.87.33 89.34.237.151
148.68.137.195 244.135.83.25 8.102.179.77 122.130.209.64