必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.29.66.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.29.66.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:34:59 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
42.66.29.126.in-addr.arpa domain name pointer softbank126029066042.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.66.29.126.in-addr.arpa	name = softbank126029066042.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
216.14.163.172 attack
Sep 20 00:22:52 wbs sshd\[6692\]: Invalid user pass from 216.14.163.172
Sep 20 00:22:52 wbs sshd\[6692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.14.163.172
Sep 20 00:22:54 wbs sshd\[6692\]: Failed password for invalid user pass from 216.14.163.172 port 11008 ssh2
Sep 20 00:29:40 wbs sshd\[7342\]: Invalid user exploit from 216.14.163.172
Sep 20 00:29:40 wbs sshd\[7342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.14.163.172
2019-09-20 18:43:24
186.210.0.143 attackbotsspam
Port Scan: TCP/8080
2019-09-20 19:33:13
213.122.179.130 attackspambots
Port Scan: TCP/445
2019-09-20 19:25:33
194.223.7.159 attackbots
Port Scan: TCP/139
2019-09-20 19:30:14
60.191.167.198 attackbotsspam
Port Scan: UDP/49153
2019-09-20 19:19:25
122.195.200.148 attack
Sep 20 17:41:09 webhost01 sshd[22246]: Failed password for root from 122.195.200.148 port 46923 ssh2
Sep 20 17:41:11 webhost01 sshd[22246]: Failed password for root from 122.195.200.148 port 46923 ssh2
...
2019-09-20 18:44:05
70.182.10.24 attackspambots
Port Scan: UDP/32789
2019-09-20 19:16:46
202.107.200.98 attackspam
Port Scan: UDP/49153
2019-09-20 19:26:56
202.147.193.2 attackspambots
Port Scan: TCP/445
2019-09-20 19:26:41
189.115.52.226 attack
Port Scan: UDP/137
2019-09-20 19:32:21
165.22.118.0 attackspam
Automatic report - Banned IP Access
2019-09-20 18:48:54
113.130.154.109 attackbots
Port Scan: TCP/34567
2019-09-20 19:14:10
177.130.251.50 attack
Port Scan: TCP/8080
2019-09-20 19:34:28
128.92.167.130 attackspam
Port Scan: UDP/53
2019-09-20 19:37:28
37.187.79.117 attack
2019-09-20T12:04:41.906652centos sshd\[12085\]: Invalid user sonar from 37.187.79.117 port 41065
2019-09-20T12:04:41.912383centos sshd\[12085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.117
2019-09-20T12:04:44.139587centos sshd\[12085\]: Failed password for invalid user sonar from 37.187.79.117 port 41065 ssh2
2019-09-20 18:45:06

最近上报的IP列表

221.239.5.140 214.255.240.208 244.164.233.237 150.185.84.217
213.85.249.100 137.99.139.198 245.170.169.177 71.199.216.178
88.176.155.23 206.123.30.190 253.122.230.32 8.64.218.181
30.26.137.185 43.102.84.44 208.252.155.59 96.78.49.171
142.175.220.83 209.194.216.90 224.7.87.133 154.242.89.190