必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Yaoundé

省份(region): Centre Province

国家(country): Cameroon

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.0.252.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36538
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.0.252.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122900 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 29 22:21:22 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
20.252.0.129.in-addr.arpa domain name pointer host-129.0.252.20.mtn.cm.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.252.0.129.in-addr.arpa	name = host-129.0.252.20.mtn.cm.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.156.177.205 attackspambots
Unauthorized connection attempt detected from IP address 185.156.177.205 to port 3415
2019-12-26 13:51:59
112.198.43.130 attack
2019-12-26T05:09:33.365675shield sshd\[32711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.43.130  user=root
2019-12-26T05:09:35.801258shield sshd\[32711\]: Failed password for root from 112.198.43.130 port 53479 ssh2
2019-12-26T05:13:54.934142shield sshd\[1072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.43.130  user=root
2019-12-26T05:13:56.867753shield sshd\[1072\]: Failed password for root from 112.198.43.130 port 46864 ssh2
2019-12-26T05:18:07.268344shield sshd\[2418\]: Invalid user zdziedzic from 112.198.43.130 port 39889
2019-12-26T05:18:07.271627shield sshd\[2418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.43.130
2019-12-26 14:22:23
175.45.1.34 attackbotsspam
Unauthorized connection attempt detected from IP address 175.45.1.34 to port 445
2019-12-26 14:17:33
125.64.94.211 attackbots
Fail2Ban Ban Triggered
2019-12-26 14:06:27
182.68.70.232 attackspam
Honeypot attack, port: 445, PTR: abts-north-dynamic-232.70.68.182.airtelbroadband.in.
2019-12-26 14:42:21
92.118.37.58 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 94 - port: 5715 proto: TCP cat: Misc Attack
2019-12-26 14:28:45
217.138.76.66 attack
Dec 26 05:36:49 localhost sshd\[42072\]: Invalid user tammi from 217.138.76.66 port 34788
Dec 26 05:36:49 localhost sshd\[42072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.138.76.66
Dec 26 05:36:51 localhost sshd\[42072\]: Failed password for invalid user tammi from 217.138.76.66 port 34788 ssh2
Dec 26 05:39:47 localhost sshd\[42192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.138.76.66  user=root
Dec 26 05:39:49 localhost sshd\[42192\]: Failed password for root from 217.138.76.66 port 49415 ssh2
...
2019-12-26 13:58:52
200.50.67.105 attackbotsspam
ssh failed login
2019-12-26 14:20:10
83.97.20.201 attackspambots
" "
2019-12-26 13:59:23
207.46.13.136 attackspambots
[Thu Dec 26 11:58:58.817051 2019] [ssl:info] [pid 30062:tid 140390241507072] [client 207.46.13.136:21516] AH02033: No hostname was provided via SNI for a name based virtual host
...
2019-12-26 14:25:37
188.19.190.28 attackspam
UTC: 2019-12-25 pkts: 2 port: 23/tcp
2019-12-26 14:19:49
80.82.68.60 attackbots
Imap-login try.. disconnected before auth was ready
2019-12-26 14:25:22
106.13.48.20 attackspam
Dec 26 07:19:05 sd-53420 sshd\[11508\]: User root from 106.13.48.20 not allowed because none of user's groups are listed in AllowGroups
Dec 26 07:19:05 sd-53420 sshd\[11508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.20  user=root
Dec 26 07:19:07 sd-53420 sshd\[11508\]: Failed password for invalid user root from 106.13.48.20 port 38392 ssh2
Dec 26 07:22:03 sd-53420 sshd\[12687\]: User root from 106.13.48.20 not allowed because none of user's groups are listed in AllowGroups
Dec 26 07:22:03 sd-53420 sshd\[12687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.20  user=root
...
2019-12-26 14:25:50
118.25.153.204 attackbots
UTC: 2019-12-25 port: 80/tcp
2019-12-26 14:26:20
200.93.149.162 attack
Unauthorized connection attempt from IP address 200.93.149.162 on Port 445(SMB)
2019-12-26 14:04:32

最近上报的IP列表

37.188.175.52 111.90.50.169 172.14.123.149 237.130.50.74
57.130.166.41 10.69.0.1 246.42.109.183 28.42.34.207
36.61.152.240 156.21.4.153 83.209.18.120 163.10.236.240
233.250.207.10 37.207.39.101 115.233.76.244 137.15.93.10
124.229.240.87 100.222.77.94 104.23.221.146 255.27.171.184