必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.0.7.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;126.0.7.129.			IN	A

;; AUTHORITY SECTION:
.			473	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071501 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 16 08:27:12 CST 2020
;; MSG SIZE  rcvd: 115
HOST信息:
129.7.0.126.in-addr.arpa domain name pointer softbank126000007129.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.7.0.126.in-addr.arpa	name = softbank126000007129.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
65.49.38.144 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 541348107fdaeb25 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: US | CF_IPClass: badHost | Protocol: HTTP/2 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.131 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:57:52
59.173.155.103 attack
The IP has triggered Cloudflare WAF. CF-Ray: 541103eda9c0e4cc | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.066704189 Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:58:23
188.166.109.87 attackspambots
Dec  7 23:50:40 sd-53420 sshd\[31612\]: Invalid user checinski from 188.166.109.87
Dec  7 23:50:40 sd-53420 sshd\[31612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.109.87
Dec  7 23:50:43 sd-53420 sshd\[31612\]: Failed password for invalid user checinski from 188.166.109.87 port 52100 ssh2
Dec  7 23:55:40 sd-53420 sshd\[32555\]: Invalid user NASA from 188.166.109.87
Dec  7 23:55:40 sd-53420 sshd\[32555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.109.87
...
2019-12-08 07:05:00
188.131.142.199 attack
Dec  8 00:30:57 nextcloud sshd\[26101\]: Invalid user dovecot from 188.131.142.199
Dec  8 00:30:57 nextcloud sshd\[26101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.142.199
Dec  8 00:30:59 nextcloud sshd\[26101\]: Failed password for invalid user dovecot from 188.131.142.199 port 33474 ssh2
...
2019-12-08 07:34:31
59.173.152.246 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 5416f51c485ae4d4 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.062334851 Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 07:20:26
219.140.116.108 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5413990029bed386 | WAF_Rule_ID: 1112825 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 07:03:48
185.156.73.49 attackspam
12/07/2019-18:31:01.004559 185.156.73.49 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-08 07:33:23
111.224.248.132 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 54141aa52809e4ea | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/4.047745454 Mozilla/4.0 (compatible; MSIE 5.00; Windows 98) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 07:13:18
222.186.3.249 attackbotsspam
Dec  8 00:18:40 rotator sshd\[16216\]: Failed password for root from 222.186.3.249 port 41500 ssh2Dec  8 00:18:42 rotator sshd\[16216\]: Failed password for root from 222.186.3.249 port 41500 ssh2Dec  8 00:18:47 rotator sshd\[16216\]: Failed password for root from 222.186.3.249 port 41500 ssh2Dec  8 00:19:39 rotator sshd\[16239\]: Failed password for root from 222.186.3.249 port 32124 ssh2Dec  8 00:19:41 rotator sshd\[16239\]: Failed password for root from 222.186.3.249 port 32124 ssh2Dec  8 00:19:44 rotator sshd\[16239\]: Failed password for root from 222.186.3.249 port 32124 ssh2
...
2019-12-08 07:28:15
92.222.34.211 attackspambots
[ssh] SSH attack
2019-12-08 07:19:56
221.213.75.96 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 54128f402eefed17 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: theme-suka.skk.moe | User-Agent: Mozilla/5.067805899 Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 07:29:50
112.224.17.73 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 5416d75bff0f788a | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 13_2_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.0.3 Mobile/15E148 Safari/604.1 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:55:34
106.45.0.36 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 541267e66e56983f | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/4.049897920 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 07:18:28
27.224.136.150 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5415db5fcd49eb45 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ping.skk.moe | User-Agent: Mozilla/5.062334851 Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 07:23:52
188.138.125.111 attackbotsspam
" "
2019-12-08 07:33:11

最近上报的IP列表

195.93.143.58 76.127.1.117 134.29.139.119 80.51.163.254
96.95.214.140 60.255.53.23 94.74.159.69 130.164.51.118
94.74.134.224 93.126.28.220 35.245.154.46 222.225.36.26
69.26.17.187 91.245.30.75 213.127.196.85 162.238.140.6
91.237.239.41 103.82.145.201 121.24.19.129 83.159.28.118