必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.134.75.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.134.75.20.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010900 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 18:01:06 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
20.75.134.41.in-addr.arpa domain name pointer 41-134-75-20.dsl.mweb.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.75.134.41.in-addr.arpa	name = 41-134-75-20.dsl.mweb.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
24.45.4.1 attackbots
Telnet Server BruteForce Attack
2020-09-08 05:13:16
81.183.221.50 attackbotsspam
20/9/7@13:36:08: FAIL: Alarm-Network address from=81.183.221.50
20/9/7@13:36:08: FAIL: Alarm-Network address from=81.183.221.50
...
2020-09-08 04:51:22
111.93.235.74 attack
Sep  7 22:27:04 v22019038103785759 sshd\[27783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74  user=root
Sep  7 22:27:07 v22019038103785759 sshd\[27783\]: Failed password for root from 111.93.235.74 port 9376 ssh2
Sep  7 22:31:10 v22019038103785759 sshd\[28166\]: Invalid user butter from 111.93.235.74 port 13549
Sep  7 22:31:10 v22019038103785759 sshd\[28166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74
Sep  7 22:31:12 v22019038103785759 sshd\[28166\]: Failed password for invalid user butter from 111.93.235.74 port 13549 ssh2
...
2020-09-08 04:58:28
193.35.51.21 attackbots
Sep  7 23:11:58 galaxy event: galaxy/lswi: smtp: julia@wirtschaftsinformatik-potsdam.de [193.35.51.21] authentication failure using internet password
Sep  7 23:11:59 galaxy event: galaxy/lswi: smtp: julia [193.35.51.21] authentication failure using internet password
Sep  7 23:12:00 galaxy event: galaxy/lswi: smtp: maja@wirtschaftsinformatik-potsdam.de [193.35.51.21] authentication failure using internet password
Sep  7 23:12:01 galaxy event: galaxy/lswi: smtp: maja [193.35.51.21] authentication failure using internet password
Sep  7 23:12:02 galaxy event: galaxy/lswi: smtp: ap@wirtschaftsinformatik-potsdam.de [193.35.51.21] authentication failure using internet password
...
2020-09-08 05:14:55
165.227.62.103 attackbotsspam
Failed password for root from 165.227.62.103 port 44888 ssh2
Failed password for root from 165.227.62.103 port 49672 ssh2
2020-09-08 05:28:40
176.122.129.114 attack
Sep  7 18:55:58 jumpserver sshd[48428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.122.129.114 
Sep  7 18:55:58 jumpserver sshd[48428]: Invalid user test from 176.122.129.114 port 58664
Sep  7 18:56:00 jumpserver sshd[48428]: Failed password for invalid user test from 176.122.129.114 port 58664 ssh2
...
2020-09-08 05:13:28
170.80.154.197 attackspambots
[ER hit] Tried to deliver spam. Already well known.
2020-09-08 05:15:16
123.59.195.16 attackspam
2020-09-07T19:53:33.998266abusebot.cloudsearch.cf sshd[11611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.195.16  user=root
2020-09-07T19:53:35.990247abusebot.cloudsearch.cf sshd[11611]: Failed password for root from 123.59.195.16 port 37916 ssh2
2020-09-07T19:57:20.661905abusebot.cloudsearch.cf sshd[11648]: Invalid user ritchel from 123.59.195.16 port 39555
2020-09-07T19:57:20.671271abusebot.cloudsearch.cf sshd[11648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.195.16
2020-09-07T19:57:20.661905abusebot.cloudsearch.cf sshd[11648]: Invalid user ritchel from 123.59.195.16 port 39555
2020-09-07T19:57:22.161218abusebot.cloudsearch.cf sshd[11648]: Failed password for invalid user ritchel from 123.59.195.16 port 39555 ssh2
2020-09-07T20:01:17.878919abusebot.cloudsearch.cf sshd[11766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.195.16  use
...
2020-09-08 05:14:18
222.186.175.150 attackbotsspam
2020-09-07T23:00:36.437587 sshd[3087986]: Unable to negotiate with 222.186.175.150 port 48868: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
2020-09-07T23:00:45.115590 sshd[3088110]: Unable to negotiate with 222.186.175.150 port 7336: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
2020-09-07T23:00:45.117272 sshd[3088119]: Unable to negotiate with 222.186.175.150 port 28568: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
2020-09-08 05:11:37
179.174.15.2 attack
Automatic report - Port Scan Attack
2020-09-08 04:53:49
115.134.44.76 attack
(sshd) Failed SSH login from 115.134.44.76 (MY/Malaysia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  7 10:50:52 cvps sshd[10452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.134.44.76  user=root
Sep  7 10:50:55 cvps sshd[10452]: Failed password for root from 115.134.44.76 port 33976 ssh2
Sep  7 10:53:22 cvps sshd[11438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.134.44.76  user=root
Sep  7 10:53:24 cvps sshd[11438]: Failed password for root from 115.134.44.76 port 39392 ssh2
Sep  7 10:55:21 cvps sshd[12147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.134.44.76  user=root
2020-09-08 05:01:16
162.144.83.51 attackbotsspam
SpamScore above: 10.0
2020-09-08 05:27:29
222.186.175.167 attackbotsspam
Sep  7 22:13:10 ajax sshd[11391]: Failed password for root from 222.186.175.167 port 19062 ssh2
Sep  7 22:13:15 ajax sshd[11391]: Failed password for root from 222.186.175.167 port 19062 ssh2
2020-09-08 05:16:01
91.240.118.101 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 4444 proto: tcp cat: Misc Attackbytes: 60
2020-09-08 05:18:35
106.12.171.188 attackspam
2020-09-07T16:49:55.180063ionos.janbro.de sshd[60514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.171.188  user=root
2020-09-07T16:49:56.928634ionos.janbro.de sshd[60514]: Failed password for root from 106.12.171.188 port 49066 ssh2
2020-09-07T16:51:46.913300ionos.janbro.de sshd[60528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.171.188  user=root
2020-09-07T16:51:49.232529ionos.janbro.de sshd[60528]: Failed password for root from 106.12.171.188 port 59010 ssh2
2020-09-07T16:53:38.835616ionos.janbro.de sshd[60531]: Invalid user guest from 106.12.171.188 port 40708
2020-09-07T16:53:39.069915ionos.janbro.de sshd[60531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.171.188
2020-09-07T16:53:38.835616ionos.janbro.de sshd[60531]: Invalid user guest from 106.12.171.188 port 40708
2020-09-07T16:53:41.570416ionos.janbro.de sshd[60531]: Failed 
...
2020-09-08 04:54:51

最近上报的IP列表

169.116.80.182 154.86.198.94 209.55.231.168 119.10.76.22
182.65.174.244 201.27.164.120 93.227.223.146 69.132.2.162
46.152.136.144 109.36.131.64 100.102.61.172 161.149.136.162
109.90.79.53 2403:6200:8830:834:a823:9a1e:c773:d2a7 225.231.194.178 178.244.7.179
218.201.160.13 162.116.207.46 70.130.107.51 95.239.56.75