必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.29.62.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13655
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.29.62.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:18:36 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 134.62.29.12.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 12.29.62.134.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
207.154.243.255 attack
$f2bV_matches
2019-12-21 20:14:16
42.112.149.142 attackbotsspam
Dec 21 07:04:42 h2421860 postfix/postscreen[18786]: CONNECT from [42.112.149.142]:20028 to [85.214.119.52]:25
Dec 21 07:04:42 h2421860 postfix/dnsblog[18789]: addr 42.112.149.142 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Dec 21 07:04:42 h2421860 postfix/dnsblog[18795]: addr 42.112.149.142 listed by domain zen.spamhaus.org as 127.0.0.11
Dec 21 07:04:42 h2421860 postfix/dnsblog[18795]: addr 42.112.149.142 listed by domain zen.spamhaus.org as 127.0.0.3
Dec 21 07:04:42 h2421860 postfix/dnsblog[18795]: addr 42.112.149.142 listed by domain zen.spamhaus.org as 127.0.0.4
Dec 21 07:04:43 h2421860 postfix/dnsblog[18796]: addr 42.112.149.142 listed by domain Unknown.trblspam.com as 185.53.179.7
Dec 21 07:04:48 h2421860 postfix/postscreen[18786]: DNSBL rank 5 for [42.112.149.142]:20028
Dec x@x
Dec 21 07:04:51 h2421860 postfix/postscreen[18786]: HANGUP after 3.2 from [42.112.149.142]:20028 in tests after SMTP handshake
Dec 21 07:04:51 h2421860 postfix/postscreen[18786]: DISC........
-------------------------------
2019-12-21 20:02:16
201.187.2.151 attackbots
Dec 21 08:00:07 at sshd\[22179\]: Invalid user pi from 201.187.2.151 port 52250
Dec 21 08:00:07 at sshd\[22181\]: Invalid user pi from 201.187.2.151 port 52254
Dec 21 08:00:07 at sshd\[22179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.187.2.151
Dec 21 08:00:07 at sshd\[22181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.187.2.151
Dec 21 08:00:09 at sshd\[22179\]: Failed password for invalid user pi from 201.187.2.151 port 52250 ssh2
Dec 21 08:00:09 at sshd\[22181\]: Failed password for invalid user pi from 201.187.2.151 port 52254 ssh2
...
2019-12-21 20:06:13
106.12.189.89 attackspam
2019-12-21T11:52:21.018783scmdmz1 sshd[25690]: Invalid user lynda from 106.12.189.89 port 50742
2019-12-21T11:52:21.022011scmdmz1 sshd[25690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.189.89
2019-12-21T11:52:21.018783scmdmz1 sshd[25690]: Invalid user lynda from 106.12.189.89 port 50742
2019-12-21T11:52:22.675113scmdmz1 sshd[25690]: Failed password for invalid user lynda from 106.12.189.89 port 50742 ssh2
2019-12-21T11:59:04.662312scmdmz1 sshd[26316]: Invalid user yoyo from 106.12.189.89 port 49428
...
2019-12-21 20:26:35
157.50.36.38 attackspambots
Lines containing failures of 157.50.36.38
Dec 21 07:10:22 shared04 sshd[2578]: Invalid user admin from 157.50.36.38 port 51263
Dec 21 07:10:22 shared04 sshd[2578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.50.36.38
Dec 21 07:10:24 shared04 sshd[2578]: Failed password for invalid user admin from 157.50.36.38 port 51263 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.50.36.38
2019-12-21 20:19:42
211.224.155.66 attackspambots
Unauthorised access (Dec 21) SRC=211.224.155.66 LEN=40 TTL=51 ID=2667 TCP DPT=23 WINDOW=46237 SYN
2019-12-21 20:27:41
77.185.136.31 attackbotsspam
Dec 21 07:12:11 nexus sshd[17709]: Invalid user pi from 77.185.136.31 port 43668
Dec 21 07:12:11 nexus sshd[17709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.185.136.31
Dec 21 07:12:11 nexus sshd[17715]: Invalid user pi from 77.185.136.31 port 43670
Dec 21 07:12:11 nexus sshd[17715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.185.136.31
Dec 21 07:12:12 nexus sshd[17709]: Failed password for invalid user pi from 77.185.136.31 port 43668 ssh2
Dec 21 07:12:12 nexus sshd[17709]: Connection closed by 77.185.136.31 port 43668 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.185.136.31
2019-12-21 20:36:34
187.163.179.35 attackspambots
Honeypot attack, port: 23, PTR: 187-163-179-35.static.axtel.net.
2019-12-21 20:29:17
125.22.98.171 attackspambots
Dec 20 13:52:36 server sshd\[9010\]: Failed password for invalid user neufischer from 125.22.98.171 port 44026 ssh2
Dec 21 11:49:41 server sshd\[1895\]: Invalid user guest from 125.22.98.171
Dec 21 11:49:41 server sshd\[1895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171 
Dec 21 11:49:44 server sshd\[1895\]: Failed password for invalid user guest from 125.22.98.171 port 57132 ssh2
Dec 21 12:03:45 server sshd\[5682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171  user=root
...
2019-12-21 20:34:20
45.146.201.195 attackspam
Dec 21 07:08:07 h2421860 postfix/postscreen[18786]: CONNECT from [45.146.201.195]:57630 to [85.214.119.52]:25
Dec 21 07:08:07 h2421860 postfix/dnsblog[18840]: addr 45.146.201.195 listed by domain b.barracudacentral.org as 127.0.0.2
Dec 21 07:08:07 h2421860 postfix/dnsblog[18866]: addr 45.146.201.195 listed by domain Unknown.trblspam.com as 185.53.179.7
Dec 21 07:08:13 h2421860 postfix/postscreen[18786]: DNSBL rank 3 for [45.146.201.195]:57630
Dec x@x
Dec 21 07:08:13 h2421860 postfix/postscreen[18786]: DISCONNECT [45.146.201.195]:57630


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.146.201.195
2019-12-21 20:15:00
45.136.108.157 attack
firewall-block, port(s): 3005/tcp, 3030/tcp, 3083/tcp, 3318/tcp, 3972/tcp, 4094/tcp, 4186/tcp, 4200/tcp
2019-12-21 20:04:40
118.24.108.205 attack
Invalid user daniel from 118.24.108.205 port 47216
2019-12-21 20:39:45
101.99.33.145 attack
1576909468 - 12/21/2019 07:24:28 Host: 101.99.33.145/101.99.33.145 Port: 445 TCP Blocked
2019-12-21 20:12:02
93.148.209.74 attackspambots
Dec 21 02:59:14 TORMINT sshd\[18963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.148.209.74  user=root
Dec 21 02:59:16 TORMINT sshd\[18963\]: Failed password for root from 93.148.209.74 port 54696 ssh2
Dec 21 03:05:38 TORMINT sshd\[19334\]: Invalid user webmaster from 93.148.209.74
Dec 21 03:05:38 TORMINT sshd\[19334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.148.209.74
...
2019-12-21 20:31:44
106.12.185.54 attackspam
Dec 21 13:19:47 loxhost sshd\[10823\]: Invalid user katia from 106.12.185.54 port 48766
Dec 21 13:19:47 loxhost sshd\[10823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.185.54
Dec 21 13:19:49 loxhost sshd\[10823\]: Failed password for invalid user katia from 106.12.185.54 port 48766 ssh2
Dec 21 13:25:04 loxhost sshd\[11015\]: Invalid user simonton from 106.12.185.54 port 60690
Dec 21 13:25:04 loxhost sshd\[11015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.185.54
...
2019-12-21 20:34:37

最近上报的IP列表

147.193.31.114 229.248.87.5 15.42.72.147 120.222.12.133
22.93.20.144 59.217.221.237 180.216.209.43 175.214.242.232
192.51.64.188 41.121.69.141 166.195.166.154 57.113.226.34
89.131.123.83 23.195.224.168 245.161.75.13 198.13.15.51
50.247.26.95 168.186.252.104 250.151.72.99 56.5.35.13