必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Council Bluffs

省份(region): Iowa

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.41.138.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.41.138.226.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025082102 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 22 11:00:18 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
226.138.41.34.in-addr.arpa domain name pointer 226.138.41.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
226.138.41.34.in-addr.arpa	name = 226.138.41.34.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.209.236.191 attackspambots
2020-06-07T10:20:11.3088951240 sshd\[7028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.236.191  user=root
2020-06-07T10:20:12.9407641240 sshd\[7028\]: Failed password for root from 134.209.236.191 port 35804 ssh2
2020-06-07T10:23:39.5286901240 sshd\[7197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.236.191  user=root
...
2020-06-07 16:58:16
145.239.87.35 attack
Jun  6 19:57:19 wbs sshd\[10516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.ip-145-239-87.eu  user=root
Jun  6 19:57:21 wbs sshd\[10516\]: Failed password for root from 145.239.87.35 port 35306 ssh2
Jun  6 20:00:53 wbs sshd\[10892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.ip-145-239-87.eu  user=root
Jun  6 20:00:55 wbs sshd\[10892\]: Failed password for root from 145.239.87.35 port 38400 ssh2
Jun  6 20:04:29 wbs sshd\[11264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.ip-145-239-87.eu  user=root
2020-06-07 16:36:40
183.129.141.30 attack
Jun  7 00:54:46 NPSTNNYC01T sshd[10674]: Failed password for root from 183.129.141.30 port 57640 ssh2
Jun  7 00:58:34 NPSTNNYC01T sshd[10946]: Failed password for root from 183.129.141.30 port 47316 ssh2
...
2020-06-07 16:48:30
106.12.69.53 attack
Jun  7 09:10:30 vps639187 sshd\[22317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.69.53  user=root
Jun  7 09:10:31 vps639187 sshd\[22317\]: Failed password for root from 106.12.69.53 port 44868 ssh2
Jun  7 09:14:06 vps639187 sshd\[22326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.69.53  user=root
...
2020-06-07 16:46:04
181.116.228.193 attack
Jun  1 07:23:47 vmd46520 sshd[32473]: Failed password for r.r from 181.116.228.193 port 37390 ssh2
Jun  1 07:28:14 vmd46520 sshd[32733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.116.228.193  user=r.r
Jun  1 07:28:16 vmd46520 sshd[32733]: Failed password for r.r from 181.116.228.193 port 43230 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.116.228.193
2020-06-07 16:57:09
36.72.216.72 attack
20/6/7@00:54:10: FAIL: Alarm-Network address from=36.72.216.72
20/6/7@00:54:10: FAIL: Alarm-Network address from=36.72.216.72
...
2020-06-07 16:50:59
95.31.245.93 attackspambots
belitungshipwreck.org 95.31.245.93 [07/Jun/2020:08:18:05 +0200] "POST /wp-login.php HTTP/1.1" 200 5891 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
belitungshipwreck.org 95.31.245.93 [07/Jun/2020:08:18:05 +0200] "POST /wp-login.php HTTP/1.1" 200 5863 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-07 17:04:32
122.51.216.203 attackbotsspam
Jun  7 08:34:17 vps sshd[14506]: Failed password for root from 122.51.216.203 port 34222 ssh2
Jun  7 08:42:22 vps sshd[15040]: Failed password for root from 122.51.216.203 port 56018 ssh2
...
2020-06-07 17:09:53
45.55.145.31 attack
Jun  6 23:44:26 NPSTNNYC01T sshd[4002]: Failed password for root from 45.55.145.31 port 34514 ssh2
Jun  6 23:47:44 NPSTNNYC01T sshd[4401]: Failed password for root from 45.55.145.31 port 35792 ssh2
...
2020-06-07 17:02:16
104.248.205.67 attack
Jun  7 04:52:05 cdc sshd[15576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67  user=root
Jun  7 04:52:08 cdc sshd[15576]: Failed password for invalid user root from 104.248.205.67 port 57740 ssh2
2020-06-07 16:30:25
122.51.227.65 attackspambots
Jun  7 10:41:10 itv-usvr-01 sshd[9237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.227.65  user=root
Jun  7 10:41:12 itv-usvr-01 sshd[9237]: Failed password for root from 122.51.227.65 port 39614 ssh2
Jun  7 10:46:01 itv-usvr-01 sshd[9417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.227.65  user=root
Jun  7 10:46:03 itv-usvr-01 sshd[9417]: Failed password for root from 122.51.227.65 port 35036 ssh2
Jun  7 10:50:51 itv-usvr-01 sshd[10056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.227.65  user=root
Jun  7 10:50:52 itv-usvr-01 sshd[10056]: Failed password for root from 122.51.227.65 port 58682 ssh2
2020-06-07 17:08:44
216.244.66.249 attackbots
20 attempts against mh-misbehave-ban on train
2020-06-07 16:34:55
155.94.177.153 attackbots
*Port Scan* detected from 155.94.177.153 (US/United States/California/Los Angeles (Downtown)/155.94.177.153.static.quadranet.com). 4 hits in the last 70 seconds
2020-06-07 17:12:01
129.28.191.35 attackbotsspam
SSH Bruteforce attack
2020-06-07 17:07:53
118.40.248.20 attackbots
Triggered by Fail2Ban at Ares web server
2020-06-07 16:58:48

最近上报的IP列表

194.110.115.13 76.5.239.126 60.79.237.39 99.93.52.239
87.251.78.131 124.245.110.150 147.185.132.198 138.201.252.115
164.92.232.89 192.168.0.213 112.50.61.22 112.97.0.202
163.61.207.162 176.65.149.77 91.149.242.127 165.154.179.204
203.202.242.20 147.185.133.247 8.147.131.178 178.79.129.94