必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.157.129.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.157.129.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 16:09:00 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
134.129.157.61.in-addr.arpa domain name pointer 134.129.157.61.dial.dy.sc.dynamic.163data.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.129.157.61.in-addr.arpa	name = 134.129.157.61.dial.dy.sc.dynamic.163data.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.241.175.250 attack
Apr 13 19:14:06 vps sshd[10365]: Failed password for root from 192.241.175.250 port 48579 ssh2
Apr 13 19:22:21 vps sshd[10851]: Failed password for root from 192.241.175.250 port 58545 ssh2
...
2020-04-14 01:34:51
34.246.37.66 attackspambots
2020-04-13T17:32:21.213381shield sshd\[24452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-246-37-66.eu-west-1.compute.amazonaws.com  user=root
2020-04-13T17:32:23.188503shield sshd\[24452\]: Failed password for root from 34.246.37.66 port 58398 ssh2
2020-04-13T17:36:14.398154shield sshd\[25308\]: Invalid user test from 34.246.37.66 port 38458
2020-04-13T17:36:14.401935shield sshd\[25308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-246-37-66.eu-west-1.compute.amazonaws.com
2020-04-13T17:36:16.031278shield sshd\[25308\]: Failed password for invalid user test from 34.246.37.66 port 38458 ssh2
2020-04-14 01:41:14
190.40.157.78 attack
Apr 13 13:13:21 ny01 sshd[12637]: Failed password for root from 190.40.157.78 port 48598 ssh2
Apr 13 13:17:22 ny01 sshd[13153]: Failed password for root from 190.40.157.78 port 42068 ssh2
2020-04-14 01:42:38
107.175.150.83 attackspam
2020-04-13T17:52:26.536099shield sshd\[29010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.150.83  user=root
2020-04-13T17:52:28.263629shield sshd\[29010\]: Failed password for root from 107.175.150.83 port 57427 ssh2
2020-04-13T17:56:19.025167shield sshd\[29943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.150.83  user=root
2020-04-13T17:56:21.405079shield sshd\[29943\]: Failed password for root from 107.175.150.83 port 33067 ssh2
2020-04-13T18:00:09.044101shield sshd\[30820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.150.83  user=root
2020-04-14 02:00:20
104.47.32.33 attack
Sextortion spam emails being sent from this IP
2020-04-14 01:25:54
181.55.127.245 attackbots
Apr 13 19:16:42 eventyay sshd[744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.55.127.245
Apr 13 19:16:45 eventyay sshd[744]: Failed password for invalid user su from 181.55.127.245 port 59928 ssh2
Apr 13 19:20:59 eventyay sshd[1001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.55.127.245
...
2020-04-14 01:35:07
121.168.8.229 attack
$f2bV_matches
2020-04-14 02:05:42
14.225.17.9 attackbots
Apr 13 19:17:04 OPSO sshd\[18404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.17.9  user=root
Apr 13 19:17:06 OPSO sshd\[18404\]: Failed password for root from 14.225.17.9 port 56600 ssh2
Apr 13 19:20:58 OPSO sshd\[19511\]: Invalid user perschke from 14.225.17.9 port 56326
Apr 13 19:20:58 OPSO sshd\[19511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.17.9
Apr 13 19:21:00 OPSO sshd\[19511\]: Failed password for invalid user perschke from 14.225.17.9 port 56326 ssh2
2020-04-14 01:34:32
183.60.149.21 attack
Email rejected due to spam filtering
2020-04-14 01:27:42
138.68.26.48 attackspam
Brute force attempt
2020-04-14 01:54:15
140.143.189.177 attackbotsspam
Apr 13 13:34:52 ny01 sshd[15913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.189.177
Apr 13 13:34:54 ny01 sshd[15913]: Failed password for invalid user admin from 140.143.189.177 port 53384 ssh2
Apr 13 13:39:29 ny01 sshd[16485]: Failed password for root from 140.143.189.177 port 48496 ssh2
2020-04-14 01:44:06
61.160.107.66 attackbotsspam
Apr 13 11:35:01 server1 sshd\[22751\]: Invalid user nancy from 61.160.107.66
Apr 13 11:35:01 server1 sshd\[22751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.107.66 
Apr 13 11:35:03 server1 sshd\[22751\]: Failed password for invalid user nancy from 61.160.107.66 port 18008 ssh2
Apr 13 11:39:41 server1 sshd\[24090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.107.66  user=root
Apr 13 11:39:43 server1 sshd\[24090\]: Failed password for root from 61.160.107.66 port 45970 ssh2
...
2020-04-14 01:50:12
220.81.13.91 attackspam
Apr 13 19:34:24 vps647732 sshd[10059]: Failed password for root from 220.81.13.91 port 44923 ssh2
Apr 13 19:39:09 vps647732 sshd[10120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.81.13.91
...
2020-04-14 01:51:53
66.70.160.187 attack
66.70.160.187 - - [13/Apr/2020:19:20:17 +0200] "GET /wp-login.php HTTP/1.1" 200 5879 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.70.160.187 - - [13/Apr/2020:19:20:19 +0200] "POST /wp-login.php HTTP/1.1" 200 6778 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.70.160.187 - - [13/Apr/2020:19:20:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-14 02:06:04
117.69.203.100 attackbots
Email rejected due to spam filtering
2020-04-14 01:31:22

最近上报的IP列表

7.201.120.11 124.232.53.240 157.207.131.106 208.114.124.159
190.13.1.238 79.240.93.154 15.53.127.127 20.138.0.192
215.84.69.72 120.143.97.187 7.72.247.102 94.163.23.74
138.202.236.31 127.227.67.61 245.218.195.113 100.85.10.211
231.171.14.128 187.227.130.148 128.211.206.230 5.76.192.221