必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 96.132.134.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;96.132.134.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 21:39:48 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 82.134.132.96.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.134.132.96.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.197.162.28 attackspam
Apr 15 19:14:13 124388 sshd[1218]: Invalid user password123 from 138.197.162.28 port 41384
Apr 15 19:14:13 124388 sshd[1218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.28
Apr 15 19:14:13 124388 sshd[1218]: Invalid user password123 from 138.197.162.28 port 41384
Apr 15 19:14:16 124388 sshd[1218]: Failed password for invalid user password123 from 138.197.162.28 port 41384 ssh2
Apr 15 19:17:30 124388 sshd[1344]: Invalid user kriss from 138.197.162.28 port 48588
2020-04-16 03:20:24
183.221.88.142 attack
Apr 15 21:11:42 * sshd[10440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.221.88.142
Apr 15 21:11:44 * sshd[10440]: Failed password for invalid user ec2-user from 183.221.88.142 port 38610 ssh2
2020-04-16 03:14:47
74.56.156.23 attackbotsspam
Apr 14 19:06:09 mx01 sshd[16694]: Did not receive identification string from 74.56.156.23
Apr 14 20:50:12 mx01 sshd[28326]: Invalid user amber from 74.56.156.23
Apr 14 20:50:13 mx01 sshd[28326]: Failed password for invalid user amber from 74.56.156.23 port 54964 ssh2
Apr 14 20:50:13 mx01 sshd[28326]: Received disconnect from 74.56.156.23: 11: Bye Bye [preauth]
Apr 14 20:50:14 mx01 sshd[28328]: Invalid user amorphous from 74.56.156.23
Apr 14 20:50:16 mx01 sshd[28328]: Failed password for invalid user amorphous from 74.56.156.23 port 55200 ssh2
Apr 14 20:50:16 mx01 sshd[28328]: Received disconnect from 74.56.156.23: 11: Bye Bye [preauth]
Apr 14 20:50:17 mx01 sshd[28330]: Invalid user amorphous from 74.56.156.23
Apr 14 20:50:19 mx01 sshd[28330]: Failed password for invalid user amorphous from 74.56.156.23 port 55470 ssh2
Apr 14 20:50:19 mx01 sshd[28330]: Received disconnect from 74.56.156.23: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip
2020-04-16 02:58:07
138.128.219.71 attackbotsspam
Apr 15 19:33:30 tuxlinux sshd[33160]: Invalid user superstar from 138.128.219.71 port 20906
Apr 15 19:33:30 tuxlinux sshd[33160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.128.219.71 
Apr 15 19:33:30 tuxlinux sshd[33160]: Invalid user superstar from 138.128.219.71 port 20906
Apr 15 19:33:30 tuxlinux sshd[33160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.128.219.71 
Apr 15 19:33:30 tuxlinux sshd[33160]: Invalid user superstar from 138.128.219.71 port 20906
Apr 15 19:33:30 tuxlinux sshd[33160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.128.219.71 
Apr 15 19:33:32 tuxlinux sshd[33160]: Failed password for invalid user superstar from 138.128.219.71 port 20906 ssh2
...
2020-04-16 03:20:43
182.151.60.73 attackbots
Apr 15 09:28:40 debian sshd[32465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.60.73 
Apr 15 09:28:42 debian sshd[32465]: Failed password for invalid user syslog from 182.151.60.73 port 44090 ssh2
Apr 15 09:37:09 debian sshd[32504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.60.73
2020-04-16 02:56:59
138.94.44.245 attackbots
Unauthorized connection attempt from IP address 138.94.44.245 on Port 445(SMB)
2020-04-16 03:21:01
181.48.28.13 attackbotsspam
Apr 15 10:17:56 ws19vmsma01 sshd[25451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13
Apr 15 10:17:59 ws19vmsma01 sshd[25451]: Failed password for invalid user alex from 181.48.28.13 port 59498 ssh2
...
2020-04-16 02:59:33
195.3.146.113 attackbotsspam
Port scan on 15 port(s): 2222 3300 3310 3340 3381 3385 5050 5389 5589 6389 7789 8389 11000 33898 60000
2020-04-16 02:45:35
2.228.151.115 attack
Apr 15 20:38:02 * sshd[4904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.228.151.115
Apr 15 20:38:04 * sshd[4904]: Failed password for invalid user linuxacademy from 2.228.151.115 port 45462 ssh2
2020-04-16 02:49:05
159.89.123.177 attackspam
Apr 15 20:31:14 server sshd[4381]: Failed password for invalid user bot from 159.89.123.177 port 53770 ssh2
Apr 15 20:36:03 server sshd[8111]: Failed password for invalid user steamcmd from 159.89.123.177 port 32922 ssh2
Apr 15 20:41:04 server sshd[12213]: Failed password for invalid user admin from 159.89.123.177 port 40306 ssh2
2020-04-16 03:10:09
138.68.106.62 attack
Invalid user ubuntu from 138.68.106.62 port 48834
2020-04-16 03:21:16
37.228.132.126 attackbotsspam
Apr 15 19:05:23 ncomp sshd[511]: Invalid user recepcion from 37.228.132.126
Apr 15 19:05:23 ncomp sshd[511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.132.126
Apr 15 19:05:23 ncomp sshd[511]: Invalid user recepcion from 37.228.132.126
Apr 15 19:05:25 ncomp sshd[511]: Failed password for invalid user recepcion from 37.228.132.126 port 36396 ssh2
2020-04-16 03:08:39
182.61.32.8 attackspambots
Apr 15 01:09:33 debian sshd[30891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.32.8 
Apr 15 01:09:35 debian sshd[30891]: Failed password for invalid user redis1 from 182.61.32.8 port 58888 ssh2
Apr 15 01:14:12 debian sshd[30900]: Failed password for root from 182.61.32.8 port 44708 ssh2
2020-04-16 02:55:31
119.188.210.127 attackbotsspam
Apr 14 21:40:16 vh1 sshd[2726]: Invalid user user from 119.188.210.127
Apr 14 21:40:16 vh1 sshd[2726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.188.210.127 
Apr 14 21:40:18 vh1 sshd[2726]: Failed password for invalid user user from 119.188.210.127 port 48603 ssh2
Apr 14 21:40:18 vh1 sshd[2728]: Received disconnect from 119.188.210.127: 11: Bye Bye
Apr 14 21:52:02 vh1 sshd[5313]: Connection closed by 119.188.210.127
Apr 14 21:54:38 vh1 sshd[5864]: Invalid user t3rr0r from 119.188.210.127
Apr 14 21:54:38 vh1 sshd[5864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.188.210.127 
Apr 14 21:54:39 vh1 sshd[5864]: Failed password for invalid user t3rr0r from 119.188.210.127 port 64609 ssh2
Apr 14 21:54:40 vh1 sshd[5866]: Received disconnect from 119.188.210.127: 11: Bye Bye
Apr 14 21:57:04 vh1 sshd[6387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ru........
-------------------------------
2020-04-16 03:14:07
152.32.185.30 attackspambots
$f2bV_matches
2020-04-16 03:12:07

最近上报的IP列表

129.50.231.144 225.245.40.120 129.224.245.163 38.123.31.139
245.115.28.242 197.32.14.194 222.99.75.18 239.238.237.72
168.78.34.158 141.184.252.109 132.22.95.133 163.169.47.212
145.4.102.214 166.95.38.161 166.6.218.143 239.195.84.120
151.145.247.10 27.161.20.132 246.180.95.164 150.99.4.176