必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Charter Communications

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.134.19.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45900
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;47.134.19.197.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042701 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 27 23:59:35 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
197.19.134.47.in-addr.arpa domain name pointer 047-134-019-197.res.spectrum.com.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
197.19.134.47.in-addr.arpa	name = 047-134-019-197.res.spectrum.com.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.226.170 attack
Aug  6 23:41:35 localhost sshd[1117392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.226.170  user=root
Aug  6 23:41:37 localhost sshd[1117392]: Failed password for root from 106.13.226.170 port 48324 ssh2
...
2020-08-06 22:31:02
125.99.173.162 attack
Aug  6 16:24:43 vps647732 sshd[10071]: Failed password for root from 125.99.173.162 port 36443 ssh2
...
2020-08-06 22:44:18
89.248.167.141 attackspam
Aug  6 16:53:13 mertcangokgoz-v4-main kernel: [338932.286486] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:5a:6b:04:d2:74:7f:6e:37:e3:08:00 SRC=89.248.167.141 DST=94.130.96.165 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=6193 PROTO=TCP SPT=8080 DPT=9542 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-06 22:13:43
222.186.175.151 attackspambots
Aug  6 16:38:36 server sshd[14488]: Failed none for root from 222.186.175.151 port 48084 ssh2
Aug  6 16:38:38 server sshd[14488]: Failed password for root from 222.186.175.151 port 48084 ssh2
Aug  6 16:38:43 server sshd[14488]: Failed password for root from 222.186.175.151 port 48084 ssh2
2020-08-06 22:51:00
213.32.70.208 attackbotsspam
Aug  6 15:32:50 buvik sshd[15631]: Failed password for root from 213.32.70.208 port 40302 ssh2
Aug  6 15:36:54 buvik sshd[16205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.70.208  user=root
Aug  6 15:36:56 buvik sshd[16205]: Failed password for root from 213.32.70.208 port 45946 ssh2
...
2020-08-06 22:08:25
188.166.164.10 attack
2020-08-06T14:31:36.286461shield sshd\[28271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=web.wicon.ru  user=root
2020-08-06T14:31:37.849184shield sshd\[28271\]: Failed password for root from 188.166.164.10 port 50132 ssh2
2020-08-06T14:35:34.896686shield sshd\[28621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=web.wicon.ru  user=root
2020-08-06T14:35:36.797294shield sshd\[28621\]: Failed password for root from 188.166.164.10 port 33426 ssh2
2020-08-06T14:39:34.884313shield sshd\[28992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=web.wicon.ru  user=root
2020-08-06 22:41:02
129.226.117.160 attackbots
Aug  6 13:36:34 jumpserver sshd[44668]: Failed password for root from 129.226.117.160 port 47702 ssh2
Aug  6 13:41:24 jumpserver sshd[44703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.117.160  user=root
Aug  6 13:41:26 jumpserver sshd[44703]: Failed password for root from 129.226.117.160 port 58260 ssh2
...
2020-08-06 22:36:04
114.207.139.203 attackbots
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-06 22:30:47
91.205.75.94 attackspam
Aug  6 03:31:26 php1 sshd\[29922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.75.94  user=root
Aug  6 03:31:28 php1 sshd\[29922\]: Failed password for root from 91.205.75.94 port 39662 ssh2
Aug  6 03:36:25 php1 sshd\[30320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.75.94  user=root
Aug  6 03:36:27 php1 sshd\[30320\]: Failed password for root from 91.205.75.94 port 50276 ssh2
Aug  6 03:41:17 php1 sshd\[30885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.75.94  user=root
2020-08-06 22:22:04
182.208.185.213 attackspambots
Aug  6 16:29:18 PorscheCustomer sshd[527]: Failed password for root from 182.208.185.213 port 53156 ssh2
Aug  6 16:32:27 PorscheCustomer sshd[628]: Failed password for root from 182.208.185.213 port 43112 ssh2
...
2020-08-06 22:41:24
51.83.73.109 attackbotsspam
Aug  6 13:33:25 localhost sshd[109796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.ip-51-83-73.eu  user=root
Aug  6 13:33:27 localhost sshd[109796]: Failed password for root from 51.83.73.109 port 55816 ssh2
Aug  6 13:37:35 localhost sshd[110293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.ip-51-83-73.eu  user=root
Aug  6 13:37:37 localhost sshd[110293]: Failed password for root from 51.83.73.109 port 39474 ssh2
Aug  6 13:41:39 localhost sshd[110760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.ip-51-83-73.eu  user=root
Aug  6 13:41:42 localhost sshd[110760]: Failed password for root from 51.83.73.109 port 51384 ssh2
...
2020-08-06 22:14:57
112.85.42.172 attackspam
2020-08-06T17:14:58.141999afi-git.jinr.ru sshd[13047]: Failed password for root from 112.85.42.172 port 51903 ssh2
2020-08-06T17:15:01.009426afi-git.jinr.ru sshd[13047]: Failed password for root from 112.85.42.172 port 51903 ssh2
2020-08-06T17:15:04.890330afi-git.jinr.ru sshd[13047]: Failed password for root from 112.85.42.172 port 51903 ssh2
2020-08-06T17:15:04.890466afi-git.jinr.ru sshd[13047]: error: maximum authentication attempts exceeded for root from 112.85.42.172 port 51903 ssh2 [preauth]
2020-08-06T17:15:04.890479afi-git.jinr.ru sshd[13047]: Disconnecting: Too many authentication failures [preauth]
...
2020-08-06 22:19:48
167.99.77.94 attackspam
Aug  6 15:36:51 h2646465 sshd[5718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.77.94  user=root
Aug  6 15:36:54 h2646465 sshd[5718]: Failed password for root from 167.99.77.94 port 48466 ssh2
Aug  6 15:52:48 h2646465 sshd[7664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.77.94  user=root
Aug  6 15:52:50 h2646465 sshd[7664]: Failed password for root from 167.99.77.94 port 44192 ssh2
Aug  6 15:57:21 h2646465 sshd[8253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.77.94  user=root
Aug  6 15:57:23 h2646465 sshd[8253]: Failed password for root from 167.99.77.94 port 54286 ssh2
Aug  6 16:01:52 h2646465 sshd[9278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.77.94  user=root
Aug  6 16:01:53 h2646465 sshd[9278]: Failed password for root from 167.99.77.94 port 36154 ssh2
Aug  6 16:06:18 h2646465 sshd[9866]: pam_uni
2020-08-06 22:24:38
122.51.246.97 attackspambots
Aug  6 10:05:52 NPSTNNYC01T sshd[4864]: Failed password for root from 122.51.246.97 port 37984 ssh2
Aug  6 10:07:39 NPSTNNYC01T sshd[4991]: Failed password for root from 122.51.246.97 port 53436 ssh2
...
2020-08-06 22:36:31
88.218.16.65 attackspambots
[Wed Aug 05 09:09:45 2020] - DDoS Attack From IP: 88.218.16.65 Port: 50085
2020-08-06 22:32:00

最近上报的IP列表

218.238.161.96 1.55.190.84 125.249.58.25 162.241.131.144
39.50.240.78 57.236.181.115 117.2.17.32 79.7.36.114
116.222.82.138 101.255.17.78 49.230.71.39 94.108.207.82
202.51.120.22 217.74.240.196 197.227.150.235 183.70.49.45
88.148.44.233 74.85.165.101 216.144.166.47 140.204.9.172