必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.1.124.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.1.124.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:09:48 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 214.124.1.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.124.1.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.54.200.22 attack
Bruteforce detected by fail2ban
2020-05-21 22:20:09
52.163.228.12 attack
leo_www
2020-05-21 21:54:53
175.24.36.114 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-21 22:02:51
83.151.14.181 attackbotsspam
May 21 01:57:50 web9 sshd\[24091\]: Invalid user jky from 83.151.14.181
May 21 01:57:50 web9 sshd\[24091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.151.14.181
May 21 01:57:52 web9 sshd\[24091\]: Failed password for invalid user jky from 83.151.14.181 port 48446 ssh2
May 21 02:02:18 web9 sshd\[24688\]: Invalid user miy from 83.151.14.181
May 21 02:02:18 web9 sshd\[24688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.151.14.181
2020-05-21 22:17:38
139.199.80.67 attackspam
May 21 19:12:13 dhoomketu sshd[86720]: Invalid user iiq from 139.199.80.67 port 60764
May 21 19:12:13 dhoomketu sshd[86720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.80.67 
May 21 19:12:13 dhoomketu sshd[86720]: Invalid user iiq from 139.199.80.67 port 60764
May 21 19:12:15 dhoomketu sshd[86720]: Failed password for invalid user iiq from 139.199.80.67 port 60764 ssh2
May 21 19:14:05 dhoomketu sshd[86747]: Invalid user bga from 139.199.80.67 port 52546
...
2020-05-21 21:54:29
91.205.120.149 attackbots
Automatic report - Banned IP Access
2020-05-21 22:27:39
31.220.2.100 attackbotsspam
2020-05-21T13:56:14.174519wiz-ks3 sshd[20978]: Invalid user Admin from 31.220.2.100 port 44317
2020-05-21T13:56:14.344729wiz-ks3 sshd[20978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.2.100
2020-05-21T13:56:14.174519wiz-ks3 sshd[20978]: Invalid user Admin from 31.220.2.100 port 44317
2020-05-21T13:56:16.244767wiz-ks3 sshd[20978]: Failed password for invalid user Admin from 31.220.2.100 port 44317 ssh2
2020-05-21T13:59:18.964988wiz-ks3 sshd[21119]: Invalid user admin from 31.220.2.100 port 36823
2020-05-21T13:59:19.202566wiz-ks3 sshd[21119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.2.100
2020-05-21T13:59:18.964988wiz-ks3 sshd[21119]: Invalid user admin from 31.220.2.100 port 36823
2020-05-21T13:59:21.167631wiz-ks3 sshd[21119]: Failed password for invalid user admin from 31.220.2.100 port 36823 ssh2
2020-05-21T14:02:24.972783wiz-ks3 sshd[21245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e
2020-05-21 22:07:50
197.48.121.204 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-05-21 21:59:45
117.86.13.101 attackbots
Brute force attempt
2020-05-21 22:02:00
156.96.119.148 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-05-21 22:05:44
1.196.223.50 attackspambots
May 21 13:58:45 MainVPS sshd[21800]: Invalid user oxz from 1.196.223.50 port 25736
May 21 13:58:45 MainVPS sshd[21800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.196.223.50
May 21 13:58:45 MainVPS sshd[21800]: Invalid user oxz from 1.196.223.50 port 25736
May 21 13:58:47 MainVPS sshd[21800]: Failed password for invalid user oxz from 1.196.223.50 port 25736 ssh2
May 21 14:01:59 MainVPS sshd[24291]: Invalid user khd from 1.196.223.50 port 41908
...
2020-05-21 22:33:27
115.134.81.191 attackbotsspam
Connection by 115.134.81.191 on port: 23 got caught by honeypot at 5/21/2020 1:02:07 PM
2020-05-21 22:26:02
95.85.12.122 attack
May 21 14:13:51 server sshd[4779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.12.122
May 21 14:13:53 server sshd[4779]: Failed password for invalid user fsp from 95.85.12.122 port 58870 ssh2
May 21 14:17:41 server sshd[5031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.12.122
...
2020-05-21 21:57:02
222.186.15.158 attack
2020-05-21T16:14:52.016050mail.broermann.family sshd[7831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
2020-05-21T16:14:53.694531mail.broermann.family sshd[7831]: Failed password for root from 222.186.15.158 port 57173 ssh2
2020-05-21T16:14:52.016050mail.broermann.family sshd[7831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
2020-05-21T16:14:53.694531mail.broermann.family sshd[7831]: Failed password for root from 222.186.15.158 port 57173 ssh2
2020-05-21T16:14:56.199693mail.broermann.family sshd[7831]: Failed password for root from 222.186.15.158 port 57173 ssh2
...
2020-05-21 22:19:19
104.161.77.86 attackspambots
Brute forcing email accounts
2020-05-21 21:56:46

最近上报的IP列表

24.73.236.117 128.19.241.67 25.82.240.114 61.74.85.173
164.176.138.29 178.56.21.158 123.156.19.70 200.39.218.25
208.93.236.207 233.30.150.79 56.94.201.50 245.153.29.188
216.162.19.56 187.78.67.155 175.175.9.183 72.177.6.255
144.255.194.223 106.87.227.84 223.221.218.176 190.94.223.52