必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.134.150.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39863
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.134.150.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:12:11 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 221.150.134.6.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 6.134.150.221.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.193.143.55 attackspambots
2019-09-26T06:02:10.930342suse-nuc sshd[26008]: Invalid user mysql from 187.193.143.55 port 43184
...
2020-01-21 06:51:13
187.84.191.235 attack
2019-11-03T07:34:10.206022suse-nuc sshd[30285]: Invalid user es from 187.84.191.235 port 55316
...
2020-01-21 06:37:15
187.111.217.58 attackspam
2019-06-28T17:40:00.295758suse-nuc sshd[21999]: error: maximum authentication attempts exceeded for root from 187.111.217.58 port 35137 ssh2 [preauth]
2019-06-28T17:40:08.603885suse-nuc sshd[22006]: error: maximum authentication attempts exceeded for root from 187.111.217.58 port 35141 ssh2 [preauth]
2019-06-28T17:40:23.820599suse-nuc sshd[22010]: Invalid user admin from 187.111.217.58 port 35151
2019-06-28T17:40:23.820599suse-nuc sshd[22010]: Invalid user admin from 187.111.217.58 port 35151
2019-06-28T17:40:24.774506suse-nuc sshd[22010]: error: maximum authentication attempts exceeded for invalid user admin from 187.111.217.58 port 35151 ssh2 [preauth]
2019-06-28T17:40:32.957392suse-nuc sshd[22012]: Invalid user admin from 187.111.217.58 port 35154
...
2020-01-21 07:07:24
187.189.93.10 attackbotsspam
2019-10-29T21:53:38.044364suse-nuc sshd[20977]: Invalid user pi from 187.189.93.10 port 37525
2019-10-29T21:53:38.072090suse-nuc sshd[20976]: Invalid user pi from 187.189.93.10 port 37524
...
2020-01-21 06:52:16
222.186.3.249 attackbotsspam
Jan 20 23:58:19 vps691689 sshd[29582]: Failed password for root from 222.186.3.249 port 13362 ssh2
Jan 20 23:59:21 vps691689 sshd[29593]: Failed password for root from 222.186.3.249 port 34493 ssh2
...
2020-01-21 07:11:13
185.176.27.38 attackbots
firewall-block, port(s): 6000/tcp
2020-01-21 07:13:08
112.85.42.182 attackbots
2020-01-18 17:48:44 -> 2020-01-20 15:52:14 : 24 login attempts (112.85.42.182)
2020-01-21 06:45:19
187.162.137.19 attackspam
2019-11-09T14:48:50.748218suse-nuc sshd[12980]: Invalid user nia from 187.162.137.19 port 50700
...
2020-01-21 07:00:11
178.128.54.233 attackbotsspam
Unauthorized connection attempt detected from IP address 178.128.54.233 to port 2220 [J]
2020-01-21 07:08:20
185.232.67.5 attackbotsspam
Invalid user admin from 185.232.67.5 port 53898
2020-01-21 07:12:51
222.186.31.166 attackspambots
Unauthorized connection attempt detected from IP address 222.186.31.166 to port 22 [J]
2020-01-21 06:38:03
187.188.120.115 attack
2019-11-06T23:11:42.173657suse-nuc sshd[9289]: Invalid user user from 187.188.120.115 port 41198
...
2020-01-21 06:58:17
187.141.135.181 attackspambots
2020-01-06T07:42:18.831768suse-nuc sshd[14671]: Invalid user tec from 187.141.135.181 port 38232
...
2020-01-21 07:03:20
62.210.28.57 attack
[2020-01-20 17:45:46] NOTICE[1148][C-00000488] chan_sip.c: Call from '' (62.210.28.57:52207) to extension '993011972592277524' rejected because extension not found in context 'public'.
[2020-01-20 17:45:46] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-20T17:45:46.780-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="993011972592277524",SessionID="0x7fd82c1014f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.28.57/52207",ACLName="no_extension_match"
[2020-01-20 17:49:55] NOTICE[1148][C-00000489] chan_sip.c: Call from '' (62.210.28.57:58926) to extension '991011972592277524' rejected because extension not found in context 'public'.
[2020-01-20 17:49:55] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-20T17:49:55.586-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="991011972592277524",SessionID="0x7fd82c144298",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="
...
2020-01-21 06:51:39
185.176.27.18 attackspam
01/20/2020-23:55:48.481786 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-21 07:04:05

最近上报的IP列表

183.75.83.36 91.104.206.217 22.249.175.157 237.3.172.91
141.240.27.249 22.184.194.93 116.186.188.178 120.65.152.248
175.160.130.219 237.27.84.35 149.59.72.39 199.134.48.214
99.84.73.138 115.64.125.191 230.148.166.81 29.226.157.237
94.185.92.132 222.149.67.140 37.116.91.43 205.167.254.244