必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.97.209.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.97.209.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 03:04:30 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 29.209.97.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.209.97.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.102.196.162 attackspambots
37215/tcp 23/tcp...
[2019-11-06/2020-01-05]11pkt,2pt.(tcp)
2020-01-06 08:11:44
36.26.85.60 attackspam
Unauthorized connection attempt detected from IP address 36.26.85.60 to port 2220 [J]
2020-01-06 08:24:03
122.175.13.99 attackspam
Honeypot attack, port: 445, PTR: telemedia-ap-static-099.13.175.122.airtelbroadband.in.
2020-01-06 08:11:32
27.128.224.5 attack
Unauthorized connection attempt detected from IP address 27.128.224.5 to port 2220 [J]
2020-01-06 08:47:42
122.233.154.120 attack
Unauthorized connection attempt detected from IP address 122.233.154.120 to port 23 [J]
2020-01-06 08:35:00
186.24.6.35 attack
2020-01-05T22:48:22.244524MailD postfix/smtpd[10151]: NOQUEUE: reject: RCPT from 186-24-6-35.static.telcel.net.ve[186.24.6.35]: 554 5.7.1 Service unavailable; Client host [186.24.6.35] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?186.24.6.35; from= to= proto=ESMTP helo=<186-24-6-35.static.telcel.net.ve>
2020-01-05T22:48:22.645264MailD postfix/smtpd[10151]: NOQUEUE: reject: RCPT from 186-24-6-35.static.telcel.net.ve[186.24.6.35]: 554 5.7.1 Service unavailable; Client host [186.24.6.35] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?186.24.6.35; from= to= proto=ESMTP helo=<186-24-6-35.static.telcel.net.ve>
2020-01-05T22:48:23.053573MailD postfix/smtpd[10151]: NOQUEUE: reject: RCPT from 186-24-6-35.static.telcel.net.ve[186.24.6.35]: 554 5.7.1 Service unavailable; Client host [186.24.6.35] blocked using bl.spamcop.net; Blocked - see https://www.
2020-01-06 08:26:00
110.72.251.22 attackspambots
B: f2b 404 5x
2020-01-06 08:08:28
186.1.141.199 attackspam
Honeypot attack, port: 445, PTR: natpool-186-1-141-199.hnremote.net.
2020-01-06 08:13:03
139.199.159.77 attackspambots
Unauthorized connection attempt detected from IP address 139.199.159.77 to port 2220 [J]
2020-01-06 08:22:10
185.176.27.246 attackbots
Jan  6 01:06:27 h2177944 kernel: \[1467754.138230\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=52360 PROTO=TCP SPT=54312 DPT=3590 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  6 01:06:27 h2177944 kernel: \[1467754.138244\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=52360 PROTO=TCP SPT=54312 DPT=3590 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  6 01:37:03 h2177944 kernel: \[1469590.205537\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=32941 PROTO=TCP SPT=54312 DPT=4390 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  6 01:37:03 h2177944 kernel: \[1469590.205552\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=32941 PROTO=TCP SPT=54312 DPT=4390 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  6 01:38:42 h2177944 kernel: \[1469688.450873\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.246 DST=85.214.
2020-01-06 08:48:16
1.34.107.92 attackspambots
Jan  5 13:10:12 hanapaa sshd\[29970\]: Invalid user ymo from 1.34.107.92
Jan  5 13:10:12 hanapaa sshd\[29970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1-34-107-92.hinet-ip.hinet.net
Jan  5 13:10:14 hanapaa sshd\[29970\]: Failed password for invalid user ymo from 1.34.107.92 port 55399 ssh2
Jan  5 13:15:37 hanapaa sshd\[30515\]: Invalid user cj from 1.34.107.92
Jan  5 13:15:37 hanapaa sshd\[30515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1-34-107-92.hinet-ip.hinet.net
2020-01-06 08:15:25
167.99.75.174 attack
ssh bruteforce or scan
...
2020-01-06 08:23:41
162.243.99.164 attackbotsspam
Unauthorized connection attempt detected from IP address 162.243.99.164 to port 2220 [J]
2020-01-06 08:21:48
145.239.83.89 attackbotsspam
Unauthorized connection attempt detected from IP address 145.239.83.89 to port 2220 [J]
2020-01-06 08:47:18
59.126.206.88 attack
Unauthorized connection attempt detected from IP address 59.126.206.88 to port 23 [J]
2020-01-06 08:22:30

最近上报的IP列表

129.228.245.181 232.158.191.146 103.60.102.54 119.226.77.196
7.8.181.27 203.227.70.76 109.231.204.128 74.68.117.228
142.25.203.101 210.198.60.117 90.118.50.201 143.136.186.8
15.178.229.180 67.115.192.184 178.175.73.111 38.247.45.56
246.173.58.106 228.228.133.9 190.18.245.112 204.160.181.36