必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
34.64.68.78 attack
scans 2 times in preceeding hours on the ports (in chronological order) 1720 11511 resulting in total of 8 scans from 34.64.0.0/10 block.
2020-04-26 00:04:35
34.64.68.78 attackbotsspam
" "
2020-04-23 20:25:32
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.64.68.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.64.68.145.			IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101801 1800 900 604800 86400

;; Query time: 163 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 19 03:23:52 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
145.68.64.34.in-addr.arpa domain name pointer 145.68.64.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.68.64.34.in-addr.arpa	name = 145.68.64.34.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.170.13.225 attackbots
Aug 15 23:37:41 lukav-desktop sshd\[1963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225  user=root
Aug 15 23:37:43 lukav-desktop sshd\[1963\]: Failed password for root from 188.170.13.225 port 33752 ssh2
Aug 15 23:41:36 lukav-desktop sshd\[3552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225  user=root
Aug 15 23:41:38 lukav-desktop sshd\[3552\]: Failed password for root from 188.170.13.225 port 43012 ssh2
Aug 15 23:45:34 lukav-desktop sshd\[5047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225  user=root
2020-08-16 06:06:32
180.76.246.38 attack
2020-08-15T22:37:18.432836vps751288.ovh.net sshd\[15487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.38  user=root
2020-08-15T22:37:20.843551vps751288.ovh.net sshd\[15487\]: Failed password for root from 180.76.246.38 port 43718 ssh2
2020-08-15T22:41:33.191045vps751288.ovh.net sshd\[15535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.38  user=root
2020-08-15T22:41:35.275543vps751288.ovh.net sshd\[15535\]: Failed password for root from 180.76.246.38 port 54618 ssh2
2020-08-15T22:45:46.021900vps751288.ovh.net sshd\[15593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.38  user=root
2020-08-16 05:56:37
110.49.70.240 attack
$f2bV_matches
2020-08-16 05:59:18
121.10.41.88 attackbots
Unauthorized connection attempt from IP address 121.10.41.88 on Port 445(SMB)
2020-08-16 05:46:07
138.197.132.143 attack
Aug 15 20:41:02 plex-server sshd[1648105]: Failed password for root from 138.197.132.143 port 51136 ssh2
Aug 15 20:43:25 plex-server sshd[1649059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.132.143  user=root
Aug 15 20:43:28 plex-server sshd[1649059]: Failed password for root from 138.197.132.143 port 54774 ssh2
Aug 15 20:45:52 plex-server sshd[1650024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.132.143  user=root
Aug 15 20:45:54 plex-server sshd[1650024]: Failed password for root from 138.197.132.143 port 58412 ssh2
...
2020-08-16 05:48:34
37.209.169.77 attack
IP 37.209.169.77 attacked honeypot on port: 80 at 8/15/2020 1:45:15 PM
2020-08-16 05:33:35
124.204.65.82 attackspam
Aug 15 18:49:59 firewall sshd[20889]: Failed password for root from 124.204.65.82 port 55117 ssh2
Aug 15 18:53:34 firewall sshd[21018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.65.82  user=root
Aug 15 18:53:36 firewall sshd[21018]: Failed password for root from 124.204.65.82 port 39434 ssh2
...
2020-08-16 05:56:56
198.50.249.62 attackspambots
ENG,DEF GET /w00tw00t.at.ISC.SANS.DFind:)
2020-08-16 05:47:43
52.187.49.96 attack
[Sat Aug 15 22:45:59.137326 2020] [access_compat:error] [pid 9610] [client 52.187.49.96:60286] AH01797: client denied by server configuration: /var/www/braunensis.cz/www/xmlrpc.php
[Sat Aug 15 22:45:59.297335 2020] [access_compat:error] [pid 9610] [client 52.187.49.96:60286] AH01797: client denied by server configuration: /var/www/braunensis.cz/www/xmlrpc.php
...
2020-08-16 05:38:50
42.248.93.10 attackbots
Aug 15 23:24:20 sd-126173 sshd[14072]: User root from 42.248.93.10 not allowed because not listed in AllowUsers
Aug 15 23:24:21 sd-126173 sshd[14072]: error: maximum authentication attempts exceeded for invalid user root from 42.248.93.10 port 48686 ssh2 [preauth]
2020-08-16 05:41:47
203.34.48.33 attack
Attempted connection to port 6379.
2020-08-16 05:42:39
188.165.169.238 attack
Aug 15 23:15:52 OPSO sshd\[29650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.169.238  user=root
Aug 15 23:15:55 OPSO sshd\[29650\]: Failed password for root from 188.165.169.238 port 55710 ssh2
Aug 15 23:18:26 OPSO sshd\[30139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.169.238  user=root
Aug 15 23:18:27 OPSO sshd\[30139\]: Failed password for root from 188.165.169.238 port 44882 ssh2
Aug 15 23:20:54 OPSO sshd\[30841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.169.238  user=root
2020-08-16 05:30:47
14.47.229.118 attack
[Sat Aug 15 15:59:40 2020] - Syn Flood From IP: 14.47.229.118 Port: 46592
2020-08-16 06:05:15
203.195.144.114 attack
Aug 15 21:31:39 rush sshd[15120]: Failed password for root from 203.195.144.114 port 33088 ssh2
Aug 15 21:35:48 rush sshd[15284]: Failed password for root from 203.195.144.114 port 44296 ssh2
...
2020-08-16 05:55:53
142.93.130.169 attackbotsspam
Unauthorized access detected from black listed ip!
2020-08-16 05:35:05

最近上报的IP列表

160.16.94.153 31.53.224.131 200.213.165.124 64.166.107.127
114.47.81.55 36.115.132.128 131.164.155.43 201.72.238.179
100.24.128.41 39.44.79.231 162.155.147.10 97.206.205.87
176.231.134.113 86.24.64.243 32.43.117.4 84.250.191.129
123.18.179.227 196.18.50.113 212.169.239.61 53.250.158.74