必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.90.117.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.90.117.30.			IN	A

;; AUTHORITY SECTION:
.			423	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:32:32 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
30.117.90.34.in-addr.arpa domain name pointer 30.117.90.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.117.90.34.in-addr.arpa	name = 30.117.90.34.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.61.162.54 attack
ssh failed login
2019-09-29 17:25:40
185.164.56.104 attackspambots
B: Magento admin pass test (wrong country)
2019-09-29 17:25:22
130.61.88.225 attackbotsspam
Invalid user debian from 130.61.88.225 port 65380
2019-09-29 17:54:15
221.148.45.168 attack
Sep 28 20:31:08 sachi sshd\[30240\]: Invalid user ts3 from 221.148.45.168
Sep 28 20:31:08 sachi sshd\[30240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.148.45.168
Sep 28 20:31:10 sachi sshd\[30240\]: Failed password for invalid user ts3 from 221.148.45.168 port 48258 ssh2
Sep 28 20:36:14 sachi sshd\[30629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.148.45.168  user=root
Sep 28 20:36:16 sachi sshd\[30629\]: Failed password for root from 221.148.45.168 port 40090 ssh2
2019-09-29 17:18:29
177.21.131.21 attack
port scan and connect, tcp 23 (telnet)
2019-09-29 17:23:53
58.21.23.4 attackspambots
Honeypot attack, port: 81, PTR: 4.23.21.58.adsl-pool.jlccptt.net.cn.
2019-09-29 17:23:26
66.249.75.93 attack
Automatic report - Banned IP Access
2019-09-29 17:52:06
13.67.88.233 attack
Sep 29 10:11:13 [munged] sshd[1695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.88.233
2019-09-29 17:41:33
14.111.93.2 attackspam
Sep 29 05:43:00 ns4 sshd[12847]: Invalid user mv from 14.111.93.2
Sep 29 05:43:00 ns4 sshd[12847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.2 
Sep 29 05:43:02 ns4 sshd[12847]: Failed password for invalid user mv from 14.111.93.2 port 51152 ssh2
Sep 29 05:47:44 ns4 sshd[13375]: Invalid user hz from 14.111.93.2
Sep 29 05:47:44 ns4 sshd[13375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.2 
Sep 29 05:47:46 ns4 sshd[13375]: Failed password for invalid user hz from 14.111.93.2 port 34866 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.111.93.2
2019-09-29 17:34:04
195.234.4.55 attackspambots
Forged login request.
2019-09-29 17:36:38
88.28.196.29 attackbotsspam
Honeypot attack, port: 445, PTR: 29.red-88-28-196.staticip.rima-tde.net.
2019-09-29 17:33:39
121.69.130.2 attackbotsspam
Invalid user neil from 121.69.130.2 port 2165
2019-09-29 17:20:49
61.223.75.20 attackbotsspam
Honeypot attack, port: 23, PTR: 61-223-75-20.dynamic-ip.hinet.net.
2019-09-29 17:46:36
106.3.130.53 attack
Sep 29 11:29:21 root sshd[4467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.3.130.53 
Sep 29 11:29:23 root sshd[4467]: Failed password for invalid user gpadmin from 106.3.130.53 port 46624 ssh2
Sep 29 11:35:15 root sshd[4592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.3.130.53 
...
2019-09-29 17:42:05
40.122.168.223 attack
Sep 28 19:21:03 php1 sshd\[17933\]: Invalid user lorilyn from 40.122.168.223
Sep 28 19:21:03 php1 sshd\[17933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.122.168.223
Sep 28 19:21:05 php1 sshd\[17933\]: Failed password for invalid user lorilyn from 40.122.168.223 port 46924 ssh2
Sep 28 19:26:02 php1 sshd\[18414\]: Invalid user passwd from 40.122.168.223
Sep 28 19:26:02 php1 sshd\[18414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.122.168.223
2019-09-29 17:28:20

最近上报的IP列表

34.89.233.61 34.89.109.250 34.86.9.43 34.90.12.200
34.90.246.182 34.91.100.78 34.90.81.197 34.90.193.219
34.91.219.22 34.91.212.35 34.91.64.141 34.93.167.196
34.91.59.8 34.91.51.38 34.93.215.12 34.94.8.31
34.93.209.199 34.93.190.16 34.94.89.153 34.94.208.122