必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.134.21.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.134.21.159.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 09:36:19 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
159.21.134.74.in-addr.arpa domain name pointer syn-074-134-021-159.res.spectrum.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.21.134.74.in-addr.arpa	name = syn-074-134-021-159.res.spectrum.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
165.227.210.71 attackspam
$f2bV_matches
2019-09-16 20:43:23
101.206.211.157 attackspambots
2019-09-16T12:26:13.215018abusebot-7.cloudsearch.cf sshd\[12702\]: Invalid user cafe from 101.206.211.157 port 41956
2019-09-16 20:43:04
118.170.64.162 attackspam
Honeypot attack, port: 23, PTR: 118-170-64-162.dynamic-ip.hinet.net.
2019-09-16 20:27:52
1.193.160.164 attackspam
Sep 16 10:41:14 core sshd[9671]: Invalid user git from 1.193.160.164 port 52646
Sep 16 10:41:16 core sshd[9671]: Failed password for invalid user git from 1.193.160.164 port 52646 ssh2
...
2019-09-16 20:37:45
92.52.23.241 attack
[portscan] Port scan
2019-09-16 20:36:58
62.48.150.175 attack
Sep 16 12:31:25 lnxded63 sshd[29058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.48.150.175
2019-09-16 20:17:34
142.44.139.90 attackspambots
3389BruteforceFW21
2019-09-16 20:04:24
195.33.240.222 attack
Sep 16 02:25:23 mail postfix/postscreen[53196]: PREGREET 17 after 0.39 from [195.33.240.222]:42648: EHLO looneys.it

...
2019-09-16 20:16:28
85.248.42.101 attackbots
Sep 16 14:20:16 jane sshd[23234]: Failed password for root from 85.248.42.101 port 35121 ssh2
...
2019-09-16 20:34:57
49.83.139.112 attack
Sep 16 10:20:47 reporting5 sshd[2925]: Invalid user admin from 49.83.139.112
Sep 16 10:20:47 reporting5 sshd[2925]: Failed password for invalid user admin from 49.83.139.112 port 25557 ssh2
Sep 16 10:20:49 reporting5 sshd[2925]: Failed password for invalid user admin from 49.83.139.112 port 25557 ssh2
Sep 16 10:20:51 reporting5 sshd[2925]: Failed password for invalid user admin from 49.83.139.112 port 25557 ssh2
Sep 16 10:20:53 reporting5 sshd[2925]: Failed password for invalid user admin from 49.83.139.112 port 25557 ssh2
Sep 16 10:20:55 reporting5 sshd[2925]: Failed password for invalid user admin from 49.83.139.112 port 25557 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.83.139.112
2019-09-16 20:09:21
183.13.123.223 attack
Sep 16 11:36:44 mail sshd\[28670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.123.223  user=mysql
Sep 16 11:36:46 mail sshd\[28670\]: Failed password for mysql from 183.13.123.223 port 41488 ssh2
Sep 16 11:44:51 mail sshd\[28949\]: Invalid user user from 183.13.123.223
Sep 16 11:44:51 mail sshd\[28949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.123.223
...
2019-09-16 20:25:10
5.135.181.11 attackbots
Sep 16 07:55:08 vps200512 sshd\[2188\]: Invalid user mvts from 5.135.181.11
Sep 16 07:55:08 vps200512 sshd\[2188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.11
Sep 16 07:55:10 vps200512 sshd\[2188\]: Failed password for invalid user mvts from 5.135.181.11 port 37594 ssh2
Sep 16 07:59:37 vps200512 sshd\[2293\]: Invalid user Administrator from 5.135.181.11
Sep 16 07:59:37 vps200512 sshd\[2293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.11
2019-09-16 20:05:50
49.88.112.78 attackspambots
SSH Brute Force, server-1 sshd[26904]: Failed password for root from 49.88.112.78 port 51451 ssh2
2019-09-16 20:23:33
46.39.224.200 attackspam
$f2bV_matches
2019-09-16 20:12:55
104.248.121.67 attackbotsspam
Sep 16 10:25:20 vmd17057 sshd\[19096\]: Invalid user newscng from 104.248.121.67 port 54388
Sep 16 10:25:20 vmd17057 sshd\[19096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67
Sep 16 10:25:23 vmd17057 sshd\[19096\]: Failed password for invalid user newscng from 104.248.121.67 port 54388 ssh2
...
2019-09-16 20:40:32

最近上报的IP列表

171.198.186.171 187.211.117.141 46.63.94.124 207.100.181.9
51.67.136.94 22.159.185.225 239.255.222.23 78.148.0.123
93.19.57.13 178.176.219.255 57.131.237.181 16.41.255.238
33.14.176.42 118.114.53.65 73.41.239.71 169.39.143.177
229.182.13.28 199.126.82.170 98.55.51.127 159.176.71.21