必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Council Bluffs

省份(region): Iowa

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.30.141.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57282
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.30.141.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:29:20 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
12.141.30.34.in-addr.arpa domain name pointer 12.141.30.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.141.30.34.in-addr.arpa	name = 12.141.30.34.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.68.219.240 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:43:36
222.186.173.180 attackbotsspam
2019-10-27T18:32:19.885759lon01.zurich-datacenter.net sshd\[32602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
2019-10-27T18:32:21.875627lon01.zurich-datacenter.net sshd\[32602\]: Failed password for root from 222.186.173.180 port 45418 ssh2
2019-10-27T18:32:26.195805lon01.zurich-datacenter.net sshd\[32602\]: Failed password for root from 222.186.173.180 port 45418 ssh2
2019-10-27T18:32:30.732289lon01.zurich-datacenter.net sshd\[32602\]: Failed password for root from 222.186.173.180 port 45418 ssh2
2019-10-27T18:32:35.288770lon01.zurich-datacenter.net sshd\[32602\]: Failed password for root from 222.186.173.180 port 45418 ssh2
...
2019-10-28 01:35:10
217.68.219.157 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:50:59
217.68.218.51 attackbotsspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 02:04:26
217.68.219.82 attackbots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:32:24
58.249.78.116 attackspambots
Port Scan
2019-10-28 01:45:20
111.231.71.157 attackbots
Oct 27 17:21:24 MK-Soft-VM7 sshd[7691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.157 
Oct 27 17:21:25 MK-Soft-VM7 sshd[7691]: Failed password for invalid user pos from 111.231.71.157 port 56610 ssh2
...
2019-10-28 01:50:31
42.242.161.111 attack
Port Scan
2019-10-28 01:57:41
217.68.219.67 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:36:10
157.55.39.1 attack
Automatic report - Banned IP Access
2019-10-28 02:03:09
217.68.220.150 attackbots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:26:44
175.0.207.215 attackbots
Unauthorised access (Oct 27) SRC=175.0.207.215 LEN=40 TOS=0x10 PREC=0x40 TTL=240 ID=10027 TCP DPT=1433 WINDOW=1024 SYN
2019-10-28 01:59:34
217.68.220.109 attackspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:30:14
217.68.219.128 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 01:54:35
121.121.104.237 attack
B: /wp-login.php attack
2019-10-28 01:50:14

最近上报的IP列表

149.129.123.104 17.44.81.69 235.165.131.11 127.178.168.159
178.229.235.56 150.130.158.226 40.3.60.130 233.181.230.174
159.5.58.159 119.38.241.165 141.66.59.71 118.130.138.84
43.224.139.164 30.86.171.74 208.240.204.124 94.193.151.237
76.119.35.226 30.43.80.15 191.189.5.156 104.250.87.65