必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.199.191.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.199.191.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 15:54:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 134.191.199.94.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.191.199.94.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
154.127.120.18 attackbots
Aug 26 04:37:22 shivevps sshd[18605]: Bad protocol version identification '\024' from 154.127.120.18 port 38115
Aug 26 04:39:42 shivevps sshd[23067]: Bad protocol version identification '\024' from 154.127.120.18 port 44953
Aug 26 04:42:48 shivevps sshd[28002]: Bad protocol version identification '\024' from 154.127.120.18 port 54944
...
2020-08-26 15:32:20
51.178.40.97 attack
Aug 26 05:53:27 jane sshd[15529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.40.97 
Aug 26 05:53:29 jane sshd[15529]: Failed password for invalid user bitrix from 51.178.40.97 port 34250 ssh2
...
2020-08-26 15:33:24
222.186.30.167 attackbots
Aug 26 09:29:22 * sshd[2719]: Failed password for root from 222.186.30.167 port 58487 ssh2
2020-08-26 15:31:04
36.66.242.146 attackbotsspam
Aug 26 04:39:16 shivevps sshd[22324]: Bad protocol version identification '\024' from 36.66.242.146 port 34095
Aug 26 04:42:45 shivevps sshd[27809]: Bad protocol version identification '\024' from 36.66.242.146 port 40161
Aug 26 04:43:40 shivevps sshd[29668]: Bad protocol version identification '\024' from 36.66.242.146 port 41477
...
2020-08-26 15:21:35
78.109.0.231 attack
Aug 26 07:26:37 marvibiene sshd[3944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.109.0.231 
Aug 26 07:26:39 marvibiene sshd[3944]: Failed password for invalid user asus from 78.109.0.231 port 51748 ssh2
2020-08-26 14:53:29
176.236.85.246 attackspam
Aug 26 04:38:08 shivevps sshd[20108]: Bad protocol version identification '\024' from 176.236.85.246 port 45841
Aug 26 04:40:26 shivevps sshd[24143]: Bad protocol version identification '\024' from 176.236.85.246 port 50128
Aug 26 04:43:32 shivevps sshd[29293]: Bad protocol version identification '\024' from 176.236.85.246 port 53281
Aug 26 04:44:15 shivevps sshd[30792]: Bad protocol version identification '\024' from 176.236.85.246 port 53701
...
2020-08-26 14:56:35
41.224.59.242 attack
2020-08-26T06:58:52.133903ionos.janbro.de sshd[73409]: Invalid user tsbot from 41.224.59.242 port 52570
2020-08-26T06:58:54.108225ionos.janbro.de sshd[73409]: Failed password for invalid user tsbot from 41.224.59.242 port 52570 ssh2
2020-08-26T07:02:52.216727ionos.janbro.de sshd[73452]: Invalid user yum from 41.224.59.242 port 56437
2020-08-26T07:02:52.511805ionos.janbro.de sshd[73452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.224.59.242
2020-08-26T07:02:52.216727ionos.janbro.de sshd[73452]: Invalid user yum from 41.224.59.242 port 56437
2020-08-26T07:02:54.323342ionos.janbro.de sshd[73452]: Failed password for invalid user yum from 41.224.59.242 port 56437 ssh2
2020-08-26T07:06:40.144751ionos.janbro.de sshd[73456]: Invalid user m1 from 41.224.59.242 port 60299
2020-08-26T07:06:40.308717ionos.janbro.de sshd[73456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.224.59.242
2020-08-26T07:06:40.1
...
2020-08-26 15:07:48
94.141.235.180 attack
Aug 26 04:42:39 shivevps sshd[27591]: Bad protocol version identification '\024' from 94.141.235.180 port 46323
Aug 26 04:44:15 shivevps sshd[30795]: Bad protocol version identification '\024' from 94.141.235.180 port 47736
Aug 26 04:44:20 shivevps sshd[31082]: Bad protocol version identification '\024' from 94.141.235.180 port 47914
Aug 26 04:44:22 shivevps sshd[31169]: Bad protocol version identification '\024' from 94.141.235.180 port 47971
...
2020-08-26 14:53:16
202.5.48.135 attack
Aug 26 04:40:40 shivevps sshd[24405]: Bad protocol version identification '\024' from 202.5.48.135 port 33287
Aug 26 04:43:48 shivevps sshd[29936]: Bad protocol version identification '\024' from 202.5.48.135 port 38531
Aug 26 04:43:49 shivevps sshd[29969]: Bad protocol version identification '\024' from 202.5.48.135 port 38585
Aug 26 04:43:53 shivevps sshd[30119]: Bad protocol version identification '\024' from 202.5.48.135 port 38752
...
2020-08-26 14:58:00
222.186.15.62 attackbotsspam
Unauthorized connection attempt detected from IP address 222.186.15.62 to port 22 [T]
2020-08-26 15:27:29
195.154.46.252 attackspam
Aug 26 04:42:23 shivevps sshd[26797]: Bad protocol version identification '\024' from 195.154.46.252 port 38440
Aug 26 04:43:32 shivevps sshd[29313]: Bad protocol version identification '\024' from 195.154.46.252 port 56473
Aug 26 04:44:01 shivevps sshd[30493]: Bad protocol version identification '\024' from 195.154.46.252 port 37974
Aug 26 04:44:46 shivevps sshd[31792]: Bad protocol version identification '\024' from 195.154.46.252 port 36648
...
2020-08-26 15:02:24
185.220.103.7 attackspam
Aug 26 04:44:48 shivevps sshd[31811]: Bad protocol version identification '\024' from 185.220.103.7 port 39798
Aug 26 04:44:48 shivevps sshd[31820]: Bad protocol version identification '\024' from 185.220.103.7 port 39930
Aug 26 04:44:49 shivevps sshd[31823]: Bad protocol version identification '\024' from 185.220.103.7 port 39976
Aug 26 04:44:50 shivevps sshd[31839]: Bad protocol version identification '\024' from 185.220.103.7 port 40162
...
2020-08-26 15:11:21
14.166.244.232 attack
Aug 26 05:53:30 ns381471 sshd[16648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.166.244.232
Aug 26 05:53:32 ns381471 sshd[16648]: Failed password for invalid user 888888 from 14.166.244.232 port 56057 ssh2
2020-08-26 15:22:01
45.55.189.252 attackbotsspam
<6 unauthorized SSH connections
2020-08-26 15:10:24
107.189.10.101 attack
Aug 25 18:50:36 hanapaa sshd\[14848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.10.101  user=root
Aug 25 18:50:38 hanapaa sshd\[14848\]: Failed password for root from 107.189.10.101 port 54560 ssh2
Aug 25 18:50:40 hanapaa sshd\[14848\]: Failed password for root from 107.189.10.101 port 54560 ssh2
Aug 25 18:50:42 hanapaa sshd\[14848\]: Failed password for root from 107.189.10.101 port 54560 ssh2
Aug 25 18:50:44 hanapaa sshd\[14848\]: Failed password for root from 107.189.10.101 port 54560 ssh2
2020-08-26 15:13:16

最近上报的IP列表

191.111.189.113 199.120.173.56 218.174.42.220 96.39.246.28
25.52.215.232 148.5.110.98 159.74.101.154 150.21.95.55
93.199.99.16 59.241.139.122 178.123.219.231 171.245.100.243
74.156.246.163 196.206.16.77 84.182.24.240 55.5.102.55
81.0.210.70 154.56.180.215 211.86.72.115 67.11.98.195