必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Boardman

省份(region): Oregon

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Amazon.com, Inc.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.219.231.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42361
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.219.231.145.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 27 00:24:54 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
145.231.219.34.in-addr.arpa domain name pointer ec2-34-219-231-145.us-west-2.compute.amazonaws.com.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
145.231.219.34.in-addr.arpa	name = ec2-34-219-231-145.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.254.1.162 attack
Feb  8 21:29:31 lcl-usvr-02 sshd[14132]: Invalid user admin from 222.254.1.162 port 50765
Feb  8 21:29:31 lcl-usvr-02 sshd[14132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.254.1.162
Feb  8 21:29:31 lcl-usvr-02 sshd[14132]: Invalid user admin from 222.254.1.162 port 50765
Feb  8 21:29:33 lcl-usvr-02 sshd[14132]: Failed password for invalid user admin from 222.254.1.162 port 50765 ssh2
Feb  8 21:29:37 lcl-usvr-02 sshd[14185]: Invalid user admin from 222.254.1.162 port 50822
...
2020-02-09 00:17:21
139.186.74.64 attackbots
Automatic report - SSH Brute-Force Attack
2020-02-09 00:18:18
45.55.42.17 attackspam
Feb  8 15:20:09 * sshd[14686]: Failed password for root from 45.55.42.17 port 60922 ssh2
2020-02-09 00:55:15
185.20.88.13 attack
Port probing on unauthorized port 445
2020-02-09 00:33:56
117.50.65.217 attackbots
2020-02-08T10:18:04.3807431495-001 sshd[10171]: Invalid user jog from 117.50.65.217 port 42100
2020-02-08T10:18:04.3839691495-001 sshd[10171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.217
2020-02-08T10:18:04.3807431495-001 sshd[10171]: Invalid user jog from 117.50.65.217 port 42100
2020-02-08T10:18:06.6104341495-001 sshd[10171]: Failed password for invalid user jog from 117.50.65.217 port 42100 ssh2
2020-02-08T10:20:13.4779271495-001 sshd[10247]: Invalid user bci from 117.50.65.217 port 56186
2020-02-08T10:20:13.4868161495-001 sshd[10247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.217
2020-02-08T10:20:13.4779271495-001 sshd[10247]: Invalid user bci from 117.50.65.217 port 56186
2020-02-08T10:20:15.7585691495-001 sshd[10247]: Failed password for invalid user bci from 117.50.65.217 port 56186 ssh2
2020-02-08T10:22:27.2748131495-001 sshd[10399]: Invalid user knq from 117.50.65.
...
2020-02-09 00:32:52
189.7.81.29 attack
Feb  8 16:16:25 web8 sshd\[26952\]: Invalid user geq from 189.7.81.29
Feb  8 16:16:25 web8 sshd\[26952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.81.29
Feb  8 16:16:27 web8 sshd\[26952\]: Failed password for invalid user geq from 189.7.81.29 port 45744 ssh2
Feb  8 16:20:36 web8 sshd\[28924\]: Invalid user rwd from 189.7.81.29
Feb  8 16:20:36 web8 sshd\[28924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.81.29
2020-02-09 00:30:21
187.177.165.81 attack
Telnet Server BruteForce Attack
2020-02-09 01:13:54
151.45.248.76 attackbotsspam
Feb  8 09:29:00 plusreed sshd[20050]: Invalid user dgx from 151.45.248.76
...
2020-02-09 00:43:41
103.141.74.67 attackbotsspam
2020-02-08T14:19:15.446700abusebot-8.cloudsearch.cf sshd[11556]: Invalid user jhg from 103.141.74.67 port 41194
2020-02-08T14:19:15.453880abusebot-8.cloudsearch.cf sshd[11556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.74.67
2020-02-08T14:19:15.446700abusebot-8.cloudsearch.cf sshd[11556]: Invalid user jhg from 103.141.74.67 port 41194
2020-02-08T14:19:17.545148abusebot-8.cloudsearch.cf sshd[11556]: Failed password for invalid user jhg from 103.141.74.67 port 41194 ssh2
2020-02-08T14:28:53.439607abusebot-8.cloudsearch.cf sshd[12126]: Invalid user qed from 103.141.74.67 port 41685
2020-02-08T14:28:53.448682abusebot-8.cloudsearch.cf sshd[12126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.74.67
2020-02-08T14:28:53.439607abusebot-8.cloudsearch.cf sshd[12126]: Invalid user qed from 103.141.74.67 port 41685
2020-02-08T14:28:55.223928abusebot-8.cloudsearch.cf sshd[12126]: Failed password 
...
2020-02-09 00:46:45
222.247.38.150 attackspambots
Feb  8 12:31:36 firewall sshd[25573]: Invalid user gmh from 222.247.38.150
Feb  8 12:31:38 firewall sshd[25573]: Failed password for invalid user gmh from 222.247.38.150 port 45756 ssh2
Feb  8 12:34:19 firewall sshd[25659]: Invalid user pvc from 222.247.38.150
...
2020-02-09 00:45:31
151.41.235.240 attack
Automatic report - SSH Brute-Force Attack
2020-02-09 00:59:09
70.121.56.92 attackspam
Feb  8 17:13:10 server sshd\[27325\]: Invalid user fuj from 70.121.56.92
Feb  8 17:13:11 server sshd\[27325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-70-121-56-92.tx.res.rr.com 
Feb  8 17:13:12 server sshd\[27325\]: Failed password for invalid user fuj from 70.121.56.92 port 55846 ssh2
Feb  8 18:07:47 server sshd\[5116\]: Invalid user siv from 70.121.56.92
Feb  8 18:07:47 server sshd\[5116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-70-121-56-92.tx.res.rr.com 
...
2020-02-09 01:11:29
119.196.112.140 attackbots
Telnetd brute force attack detected by fail2ban
2020-02-09 00:44:40
178.60.197.1 attack
Feb  8 15:17:28 ovpn sshd\[30517\]: Invalid user lgj from 178.60.197.1
Feb  8 15:17:28 ovpn sshd\[30517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.60.197.1
Feb  8 15:17:30 ovpn sshd\[30517\]: Failed password for invalid user lgj from 178.60.197.1 port 35222 ssh2
Feb  8 15:28:21 ovpn sshd\[717\]: Invalid user try from 178.60.197.1
Feb  8 15:28:21 ovpn sshd\[717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.60.197.1
2020-02-09 01:10:45
80.211.166.139 attackspambots
Feb  8 17:17:32 markkoudstaal sshd[29981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.166.139
Feb  8 17:17:34 markkoudstaal sshd[29981]: Failed password for invalid user pvp from 80.211.166.139 port 49988 ssh2
Feb  8 17:19:58 markkoudstaal sshd[30459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.166.139
2020-02-09 00:21:32

最近上报的IP列表

97.57.93.162 220.184.237.216 202.32.243.25 188.75.223.11
221.178.129.221 162.244.148.231 34.95.9.106 170.24.28.210
95.116.72.19 193.127.137.220 115.78.130.246 51.15.113.160
112.211.64.179 81.213.245.77 105.82.145.177 32.188.146.215
150.161.8.175 68.171.162.81 51.15.245.44 104.71.107.225