必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.54.29.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.54.29.16.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102700 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 27 15:06:16 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 16.29.54.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.29.54.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.228.50.49 attack
Sep  8 21:00:02 ny01 sshd[23274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.50.49
Sep  8 21:00:04 ny01 sshd[23274]: Failed password for invalid user system from 194.228.50.49 port 57258 ssh2
Sep  8 21:05:29 ny01 sshd[24218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.228.50.49
2019-09-09 09:06:00
89.248.160.150 attackspam
757/tcp 537/tcp 631/tcp...
[2019-07-08/09-08]17854pkt,5994pt.(tcp)
2019-09-09 09:00:41
188.128.81.98 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-08-08/09-08]8pkt,1pt.(tcp)
2019-09-09 09:36:53
210.120.112.18 attackspambots
Sep  9 03:25:31 ArkNodeAT sshd\[22167\]: Invalid user test6 from 210.120.112.18
Sep  9 03:25:31 ArkNodeAT sshd\[22167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.120.112.18
Sep  9 03:25:33 ArkNodeAT sshd\[22167\]: Failed password for invalid user test6 from 210.120.112.18 port 43430 ssh2
2019-09-09 09:35:59
202.149.70.53 attackbotsspam
2019-09-09T00:40:17.142497abusebot-3.cloudsearch.cf sshd\[9249\]: Invalid user test from 202.149.70.53 port 36280
2019-09-09 09:15:32
89.19.180.249 attackbotsspam
23/tcp 23/tcp
[2019-07-10/09-08]2pkt
2019-09-09 09:20:18
117.93.16.233 attackspambots
Sep  9 00:28:24 ncomp sshd[718]: Invalid user admin from 117.93.16.233
Sep  9 00:28:24 ncomp sshd[718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.93.16.233
Sep  9 00:28:24 ncomp sshd[718]: Invalid user admin from 117.93.16.233
Sep  9 00:28:26 ncomp sshd[718]: Failed password for invalid user admin from 117.93.16.233 port 52389 ssh2
2019-09-09 09:12:07
190.147.110.246 attackspambots
port scan/probe/communication attempt
2019-09-09 09:39:21
37.252.78.38 attack
23/tcp 23/tcp 23/tcp
[2019-06-30/08-27]3pkt
2019-09-09 09:25:04
119.145.165.122 attackspambots
Sep  9 03:29:10 core sshd[26298]: Invalid user oracle from 119.145.165.122 port 56876
Sep  9 03:29:12 core sshd[26298]: Failed password for invalid user oracle from 119.145.165.122 port 56876 ssh2
...
2019-09-09 09:35:25
216.218.206.87 attackbotsspam
firewall-block, port(s): 111/udp
2019-09-09 09:31:15
77.247.108.204 attackspambots
09/08/2019-17:35:24.915498 77.247.108.204 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)
2019-09-09 09:51:15
68.183.234.12 attack
Sep  8 15:16:51 friendsofhawaii sshd\[3861\]: Invalid user teamspeak3 from 68.183.234.12
Sep  8 15:16:51 friendsofhawaii sshd\[3861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12
Sep  8 15:16:53 friendsofhawaii sshd\[3861\]: Failed password for invalid user teamspeak3 from 68.183.234.12 port 53220 ssh2
Sep  8 15:23:00 friendsofhawaii sshd\[4342\]: Invalid user test1 from 68.183.234.12
Sep  8 15:23:00 friendsofhawaii sshd\[4342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12
2019-09-09 09:37:29
45.136.109.34 attackbots
09/08/2019-19:39:50.909025 45.136.109.34 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-09 09:07:51
61.238.109.121 attack
Sep  8 22:20:51 pkdns2 sshd\[58436\]: Invalid user amsftp from 61.238.109.121Sep  8 22:20:53 pkdns2 sshd\[58436\]: Failed password for invalid user amsftp from 61.238.109.121 port 52550 ssh2Sep  8 22:24:47 pkdns2 sshd\[58596\]: Invalid user guest from 61.238.109.121Sep  8 22:24:49 pkdns2 sshd\[58596\]: Failed password for invalid user guest from 61.238.109.121 port 38310 ssh2Sep  8 22:28:54 pkdns2 sshd\[58791\]: Invalid user sysadmin from 61.238.109.121Sep  8 22:28:56 pkdns2 sshd\[58791\]: Failed password for invalid user sysadmin from 61.238.109.121 port 52308 ssh2
...
2019-09-09 09:16:33

最近上报的IP列表

37.6.220.213 221.57.46.197 138.160.37.71 217.97.115.43
46.170.195.227 5.173.249.10 150.217.82.208 122.242.27.0
156.154.252.119 149.184.162.0 128.199.182.204 241.139.69.114
46.169.213.148 196.167.81.179 184.78.194.68 9.205.225.77
83.102.24.213 225.62.75.222 133.118.175.95 192.71.95.224