必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.118.242.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.118.242.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 20:50:10 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 134.242.118.56.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 56.118.242.134.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.107.136.207 attackspam
1596629997 - 08/05/2020 14:19:57 Host: 116.107.136.207/116.107.136.207 Port: 445 TCP Blocked
2020-08-05 21:09:26
51.89.68.141 attack
Aug  5 14:48:20 piServer sshd[12881]: Failed password for root from 51.89.68.141 port 41638 ssh2
Aug  5 14:51:10 piServer sshd[13164]: Failed password for root from 51.89.68.141 port 60988 ssh2
...
2020-08-05 21:09:56
122.51.31.171 attack
Aug  5 03:22:29 web9 sshd\[31939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.31.171  user=root
Aug  5 03:22:31 web9 sshd\[31939\]: Failed password for root from 122.51.31.171 port 42274 ssh2
Aug  5 03:24:52 web9 sshd\[32271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.31.171  user=root
Aug  5 03:24:55 web9 sshd\[32271\]: Failed password for root from 122.51.31.171 port 38922 ssh2
Aug  5 03:27:15 web9 sshd\[32715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.31.171  user=root
2020-08-05 21:34:17
37.49.224.33 attack
 UDP 37.49.224.33:52128 -> port 37810, len 32
2020-08-05 21:02:55
218.92.0.220 attack
Aug  5 15:38:51 * sshd[21702]: Failed password for root from 218.92.0.220 port 32805 ssh2
Aug  5 15:38:54 * sshd[21702]: Failed password for root from 218.92.0.220 port 32805 ssh2
2020-08-05 21:40:27
45.145.67.153 attackbotsspam
[Wed Aug 05 13:16:46 2020] - DDoS Attack From IP: 45.145.67.153 Port: 58867
2020-08-05 21:39:16
167.114.152.170 attackspambots
167.114.152.170 - - \[05/Aug/2020:14:19:22 +0200\] "POST /wp-login.php HTTP/1.0" 200 2797 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
167.114.152.170 - - \[05/Aug/2020:14:19:24 +0200\] "POST /wp-login.php HTTP/1.0" 200 2724 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
167.114.152.170 - - \[05/Aug/2020:14:19:26 +0200\] "POST /wp-login.php HTTP/1.0" 200 2762 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-05 21:30:54
148.235.57.184 attackspam
Aug  5 15:02:38 vmd36147 sshd[15534]: Failed password for root from 148.235.57.184 port 59020 ssh2
Aug  5 15:06:20 vmd36147 sshd[23505]: Failed password for root from 148.235.57.184 port 49120 ssh2
...
2020-08-05 21:36:31
212.124.22.190 attack
Aug  5 14:18:24 clarabelen sshd[7647]: Did not receive identification string from 212.124.22.190
Aug  5 14:18:24 clarabelen sshd[7649]: Connection closed by 212.124.22.190 [preauth]
Aug  5 14:18:25 clarabelen sshd[7651]: Address 212.124.22.190 maps to isg-212-124-22-190.ivnet.ru, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug  5 14:18:25 clarabelen sshd[7651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.124.22.190  user=r.r
Aug  5 14:18:27 clarabelen sshd[7651]: Failed password for r.r from 212.124.22.190 port 59487 ssh2
Aug  5 14:18:27 clarabelen sshd[7651]: Connection closed by 212.124.22.190 [preauth]
Aug  5 14:18:27 clarabelen sshd[7657]: Address 212.124.22.190 maps to isg-212-124-22-190.ivnet.ru, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug  5 14:18:27 clarabelen sshd[7657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost........
-------------------------------
2020-08-05 21:19:53
106.52.133.87 attackspam
2020-08-05 07:19:44.575438-0500  localhost sshd[75210]: Failed password for root from 106.52.133.87 port 56288 ssh2
2020-08-05 20:58:58
164.132.46.14 attackspam
2020-08-05T12:52:46.159902shield sshd\[20674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.ip-164-132-46.eu  user=root
2020-08-05T12:52:48.081726shield sshd\[20674\]: Failed password for root from 164.132.46.14 port 39630 ssh2
2020-08-05T12:57:12.872237shield sshd\[21061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.ip-164-132-46.eu  user=root
2020-08-05T12:57:15.315392shield sshd\[21061\]: Failed password for root from 164.132.46.14 port 51322 ssh2
2020-08-05T13:01:42.062714shield sshd\[21358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.ip-164-132-46.eu  user=root
2020-08-05 21:15:19
111.229.110.107 attackspambots
Aug  5 15:13:00 srv-ubuntu-dev3 sshd[42582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.110.107  user=root
Aug  5 15:13:02 srv-ubuntu-dev3 sshd[42582]: Failed password for root from 111.229.110.107 port 55322 ssh2
Aug  5 15:13:55 srv-ubuntu-dev3 sshd[42695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.110.107  user=root
Aug  5 15:13:56 srv-ubuntu-dev3 sshd[42695]: Failed password for root from 111.229.110.107 port 35388 ssh2
Aug  5 15:14:48 srv-ubuntu-dev3 sshd[42799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.110.107  user=root
Aug  5 15:14:50 srv-ubuntu-dev3 sshd[42799]: Failed password for root from 111.229.110.107 port 43684 ssh2
Aug  5 15:15:41 srv-ubuntu-dev3 sshd[42986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.110.107  user=root
Aug  5 15:15:42 srv-ubuntu-dev3 sshd[42
...
2020-08-05 21:18:06
54.37.71.203 attack
Aug  5 14:52:41 [host] sshd[4842]: pam_unix(sshd:a
Aug  5 14:52:43 [host] sshd[4842]: Failed password
Aug  5 14:57:20 [host] sshd[4955]: pam_unix(sshd:a
2020-08-05 21:24:31
139.99.8.3 attack
joshuajohannes.de 139.99.8.3 [05/Aug/2020:14:47:52 +0200] "POST /wp-login.php HTTP/1.1" 200 5961 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
joshuajohannes.de 139.99.8.3 [05/Aug/2020:14:47:53 +0200] "POST /wp-login.php HTTP/1.1" 200 5926 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-05 20:58:32
51.254.22.172 attackbots
SSH invalid-user multiple login try
2020-08-05 21:02:24

最近上报的IP列表

239.25.148.206 211.164.226.206 38.144.19.219 3.155.4.23
18.241.237.60 204.162.198.141 157.69.134.183 42.67.79.133
146.199.72.173 118.141.199.37 153.31.223.23 80.213.98.92
94.76.217.11 219.224.79.148 58.149.243.209 251.53.201.101
40.109.101.74 6.107.90.250 109.237.196.12 164.134.196.179