必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.129.205.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64338
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.129.205.6.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 15:59:50 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 6.205.129.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.205.129.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.75.21.242 attack
Dec  2 23:06:43 sd-53420 sshd\[3927\]: Invalid user alex from 106.75.21.242
Dec  2 23:06:43 sd-53420 sshd\[3927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.21.242
Dec  2 23:06:45 sd-53420 sshd\[3927\]: Failed password for invalid user alex from 106.75.21.242 port 42170 ssh2
Dec  2 23:12:52 sd-53420 sshd\[5000\]: Invalid user guest from 106.75.21.242
Dec  2 23:12:52 sd-53420 sshd\[5000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.21.242
...
2019-12-03 06:13:20
50.207.12.103 attackspam
Dec  2 12:01:38 hanapaa sshd\[21565\]: Invalid user slager from 50.207.12.103
Dec  2 12:01:38 hanapaa sshd\[21565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50-207-12-103-static.hfc.comcastbusiness.net
Dec  2 12:01:39 hanapaa sshd\[21565\]: Failed password for invalid user slager from 50.207.12.103 port 49352 ssh2
Dec  2 12:07:03 hanapaa sshd\[22094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50-207-12-103-static.hfc.comcastbusiness.net  user=root
Dec  2 12:07:05 hanapaa sshd\[22094\]: Failed password for root from 50.207.12.103 port 60640 ssh2
2019-12-03 06:21:44
222.186.175.220 attack
Dec  3 03:08:25 gw1 sshd[14066]: Failed password for root from 222.186.175.220 port 45436 ssh2
Dec  3 03:08:35 gw1 sshd[14066]: Failed password for root from 222.186.175.220 port 45436 ssh2
...
2019-12-03 06:09:55
200.68.91.233 attack
$f2bV_matches
2019-12-03 06:17:30
206.189.135.192 attackbots
2019-12-02T22:06:10.613523abusebot-2.cloudsearch.cf sshd\[30912\]: Invalid user pierre from 206.189.135.192 port 56736
2019-12-03 06:08:35
106.51.3.214 attackspambots
Dec  2 21:54:31 goofy sshd\[28451\]: Invalid user broadway from 106.51.3.214
Dec  2 21:54:31 goofy sshd\[28451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.3.214
Dec  2 21:54:33 goofy sshd\[28451\]: Failed password for invalid user broadway from 106.51.3.214 port 43575 ssh2
Dec  2 22:01:10 goofy sshd\[29158\]: Invalid user phoen from 106.51.3.214
Dec  2 22:01:10 goofy sshd\[29158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.3.214
2019-12-03 06:06:27
119.27.170.64 attackbots
F2B jail: sshd. Time: 2019-12-02 23:20:05, Reported by: VKReport
2019-12-03 06:23:17
139.155.21.46 attackbots
Dec  2 22:28:45 h2177944 sshd\[29891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.21.46  user=root
Dec  2 22:28:46 h2177944 sshd\[29891\]: Failed password for root from 139.155.21.46 port 40642 ssh2
Dec  2 22:35:11 h2177944 sshd\[30282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.21.46  user=root
Dec  2 22:35:13 h2177944 sshd\[30282\]: Failed password for root from 139.155.21.46 port 47666 ssh2
...
2019-12-03 06:05:58
191.5.123.135 attack
Automatic report - Port Scan Attack
2019-12-03 06:24:05
211.104.171.239 attackbotsspam
Dec  2 23:06:08 [host] sshd[23643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239  user=root
Dec  2 23:06:10 [host] sshd[23643]: Failed password for root from 211.104.171.239 port 46280 ssh2
Dec  2 23:12:25 [host] sshd[24169]: Invalid user adrianus from 211.104.171.239
Dec  2 23:12:25 [host] sshd[24169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.104.171.239
2019-12-03 06:35:34
210.212.237.67 attackspam
Dec  2 23:19:08 mail sshd[18075]: Failed password for root from 210.212.237.67 port 43344 ssh2
Dec  2 23:25:44 mail sshd[19723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.237.67 
Dec  2 23:25:46 mail sshd[19723]: Failed password for invalid user webmaster from 210.212.237.67 port 55012 ssh2
2019-12-03 06:37:31
27.105.103.3 attackbotsspam
Dec  2 22:35:15 lnxded63 sshd[28044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.105.103.3
Dec  2 22:35:15 lnxded63 sshd[28044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.105.103.3
2019-12-03 06:04:05
188.99.166.18 attackbots
Automatic report - Port Scan Attack
2019-12-03 06:28:19
78.132.172.29 attack
TCP Port Scanning
2019-12-03 06:35:10
139.59.238.14 attackbotsspam
Dec  2 12:09:23 php1 sshd\[20578\]: Invalid user donatas from 139.59.238.14
Dec  2 12:09:23 php1 sshd\[20578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.238.14
Dec  2 12:09:24 php1 sshd\[20578\]: Failed password for invalid user donatas from 139.59.238.14 port 55012 ssh2
Dec  2 12:15:39 php1 sshd\[21250\]: Invalid user unzip from 139.59.238.14
Dec  2 12:15:39 php1 sshd\[21250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.238.14
2019-12-03 06:31:25

最近上报的IP列表

104.129.206.165 104.129.206.122 104.129.206.116 104.129.206.195
104.129.205.46 58.222.12.199 104.129.206.79 104.129.206.93
104.129.29.164 104.129.24.250 104.129.3.133 104.129.3.58
104.129.206.72 104.129.36.123 104.129.27.36 104.129.255.172
104.129.36.181 104.129.41.14 104.129.41.21 104.129.41.110