必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.195.131.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.195.131.144.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:56:06 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
144.131.195.34.in-addr.arpa domain name pointer ec2-34-195-131-144.compute-1.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.131.195.34.in-addr.arpa	name = ec2-34-195-131-144.compute-1.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.39.70.5 attackspambots
Sep  7 05:50:53 localhost sshd\[15359\]: Invalid user bkpuser from 202.39.70.5 port 60886
Sep  7 05:50:53 localhost sshd\[15359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5
Sep  7 05:50:55 localhost sshd\[15359\]: Failed password for invalid user bkpuser from 202.39.70.5 port 60886 ssh2
2019-09-07 17:10:05
89.91.236.60 attackspam
Automatic report - Port Scan Attack
2019-09-07 17:07:57
81.22.45.239 attackbots
Sep  7 10:45:54 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.239 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=28938 PROTO=TCP SPT=57325 DPT=16001 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-07 16:48:23
142.93.212.131 attackspam
Sep  7 06:47:37 intra sshd\[55378\]: Invalid user daniel from 142.93.212.131Sep  7 06:47:38 intra sshd\[55378\]: Failed password for invalid user daniel from 142.93.212.131 port 36104 ssh2Sep  7 06:52:31 intra sshd\[55464\]: Invalid user postgres from 142.93.212.131Sep  7 06:52:33 intra sshd\[55464\]: Failed password for invalid user postgres from 142.93.212.131 port 51000 ssh2Sep  7 06:57:30 intra sshd\[55548\]: Invalid user test from 142.93.212.131Sep  7 06:57:32 intra sshd\[55548\]: Failed password for invalid user test from 142.93.212.131 port 37670 ssh2
...
2019-09-07 17:09:10
49.235.91.152 attackspam
Sep  6 17:01:32 hanapaa sshd\[7582\]: Invalid user ubuntu from 49.235.91.152
Sep  6 17:01:32 hanapaa sshd\[7582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.91.152
Sep  6 17:01:34 hanapaa sshd\[7582\]: Failed password for invalid user ubuntu from 49.235.91.152 port 52618 ssh2
Sep  6 17:06:25 hanapaa sshd\[7943\]: Invalid user ftptest from 49.235.91.152
Sep  6 17:06:25 hanapaa sshd\[7943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.91.152
2019-09-07 17:04:39
192.241.249.53 attack
Reported by AbuseIPDB proxy server.
2019-09-07 16:51:25
106.12.17.43 attackspambots
Sep  6 19:35:07 vtv3 sshd\[23174\]: Invalid user test from 106.12.17.43 port 40564
Sep  6 19:35:07 vtv3 sshd\[23174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.43
Sep  6 19:35:09 vtv3 sshd\[23174\]: Failed password for invalid user test from 106.12.17.43 port 40564 ssh2
Sep  6 19:39:56 vtv3 sshd\[25216\]: Invalid user ubuntu from 106.12.17.43 port 46484
Sep  6 19:39:56 vtv3 sshd\[25216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.43
Sep  6 19:53:28 vtv3 sshd\[32292\]: Invalid user guest from 106.12.17.43 port 36002
Sep  6 19:53:28 vtv3 sshd\[32292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.43
Sep  6 19:53:29 vtv3 sshd\[32292\]: Failed password for invalid user guest from 106.12.17.43 port 36002 ssh2
Sep  6 19:57:55 vtv3 sshd\[2101\]: Invalid user ftpuser2 from 106.12.17.43 port 41920
Sep  6 19:57:55 vtv3 sshd\[2101\]: pam_unix\(sshd
2019-09-07 16:36:52
62.210.178.165 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: 62-210-178-165.rev.poneytelecom.eu.
2019-09-07 17:01:37
95.6.77.61 attackbotsspam
[portscan] tcp/139 [NetBIOS Session Service]
*(RWIN=1024)(09071042)
2019-09-07 17:01:07
125.163.119.115 attackbots
Automatic report - Port Scan Attack
2019-09-07 17:09:33
138.68.208.199 attackbotsspam
138.68.208.199 - - - [07/Sep/2019:05:25:32 +0000] "GET / HTTP/1.1" 404 162 "-" "Mozilla/5.0 zgrab/0.x" "-" "-"
2019-09-07 16:53:08
49.83.118.97 attackbotsspam
$f2bV_matches
2019-09-07 16:57:12
165.22.242.104 attack
Sep  7 10:50:49 dedicated sshd[1691]: Invalid user user from 165.22.242.104 port 41580
2019-09-07 16:57:34
184.105.139.74 attack
firewall-block, port(s): 123/udp
2019-09-07 17:00:42
83.143.86.62 attackbots
SS1,DEF GET /admin.php
2019-09-07 16:38:00

最近上报的IP列表

25.22.44.165 43.208.225.63 39.212.201.30 44.35.233.155
152.56.181.127 147.49.219.212 122.247.114.13 37.188.57.39
130.21.42.89 220.165.197.128 117.35.94.175 242.7.220.246
138.10.251.252 133.216.186.43 98.132.100.162 2.70.161.58
117.47.47.129 133.114.152.148 38.175.219.201 235.173.162.208