必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.212.45.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.212.45.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:56:41 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
150.45.212.34.in-addr.arpa domain name pointer ec2-34-212-45-150.us-west-2.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.45.212.34.in-addr.arpa	name = ec2-34-212-45-150.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.112.33.200 attackbots
Nov 27 09:47:59 ny01 sshd[2661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.33.200
Nov 27 09:48:02 ny01 sshd[2661]: Failed password for invalid user sergo from 193.112.33.200 port 44616 ssh2
Nov 27 09:53:17 ny01 sshd[3149]: Failed password for root from 193.112.33.200 port 50242 ssh2
2019-11-28 00:49:55
115.57.127.137 attackspam
2019-11-27T15:42:41.817322abusebot.cloudsearch.cf sshd\[7497\]: Invalid user db2inst1 from 115.57.127.137 port 40676
2019-11-28 00:45:23
196.52.43.59 attackbotsspam
11/27/2019-11:00:32.174277 196.52.43.59 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-28 00:21:59
103.43.83.130 attackbotsspam
Unauthorised access (Nov 27) SRC=103.43.83.130 LEN=52 TTL=106 ID=21157 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-28 00:48:47
222.186.175.202 attackspambots
[ssh] SSH attack
2019-11-28 00:47:26
202.162.196.139 attack
Fail2Ban Ban Triggered
2019-11-28 00:36:38
104.248.87.174 attackbots
11/27/2019-11:26:15.647106 104.248.87.174 Protocol: 6 ET SCAN Potential SSH Scan
2019-11-28 00:26:42
164.132.54.215 attack
2019-11-27T16:15:55.892197abusebot-8.cloudsearch.cf sshd\[7134\]: Invalid user balcerak from 164.132.54.215 port 50838
2019-11-28 00:30:31
66.108.165.215 attackspam
$f2bV_matches
2019-11-28 00:33:16
196.52.43.58 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 00:25:32
24.34.101.107 attackspambots
Nov 27 16:15:48 vps666546 sshd\[7018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.34.101.107  user=daemon
Nov 27 16:15:50 vps666546 sshd\[7018\]: Failed password for daemon from 24.34.101.107 port 35213 ssh2
Nov 27 16:16:24 vps666546 sshd\[7034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.34.101.107  user=root
Nov 27 16:16:26 vps666546 sshd\[7034\]: Failed password for root from 24.34.101.107 port 48979 ssh2
Nov 27 16:16:59 vps666546 sshd\[7068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.34.101.107  user=root
...
2019-11-28 00:24:50
103.22.250.194 attack
103.22.250.194 - - \[27/Nov/2019:15:53:03 +0100\] "POST /wp-login.php HTTP/1.0" 200 7611 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.22.250.194 - - \[27/Nov/2019:15:53:06 +0100\] "POST /wp-login.php HTTP/1.0" 200 7441 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
103.22.250.194 - - \[27/Nov/2019:15:53:08 +0100\] "POST /wp-login.php HTTP/1.0" 200 7435 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-28 00:57:11
39.106.91.66 attack
RDP Bruteforce
2019-11-28 00:34:11
78.128.113.130 attackbotsspam
Nov 21 02:23:09 vtv3 sshd[11885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.113.130 
Nov 21 02:23:11 vtv3 sshd[11885]: Failed password for invalid user admin from 78.128.113.130 port 44280 ssh2
Nov 21 02:29:54 vtv3 sshd[14266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.113.130 
Nov 22 10:29:21 vtv3 sshd[27284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.113.130 
Nov 22 10:29:23 vtv3 sshd[27284]: Failed password for invalid user admin from 78.128.113.130 port 33106 ssh2
Nov 22 10:37:35 vtv3 sshd[30940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.113.130 
Nov 27 18:39:07 vtv3 sshd[30352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.113.130 
Nov 27 18:39:09 vtv3 sshd[30352]: Failed password for invalid user admin from 78.128.113.130 port 40618 ssh2
Nov 27
2019-11-28 00:24:26
193.105.134.45 attack
Nov 27 17:20:37 herz-der-gamer sshd[31480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.105.134.45  user=ts3
Nov 27 17:20:39 herz-der-gamer sshd[31480]: Failed password for ts3 from 193.105.134.45 port 64814 ssh2
...
2019-11-28 00:57:50

最近上报的IP列表

119.128.209.21 97.109.101.209 32.1.203.132 24.246.13.169
109.146.131.178 59.225.102.11 46.161.177.127 44.132.224.187
14.129.153.102 123.133.109.181 24.25.4.243 242.187.37.66
137.200.5.88 76.195.103.31 2.94.208.105 145.102.117.182
35.134.14.150 3.40.33.127 24.117.200.0 50.187.109.99