必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.100.55.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.100.55.139.			IN	A

;; AUTHORITY SECTION:
.			324	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:56:38 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 139.55.100.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.55.100.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
168.187.75.4 attackbotsspam
SSH Invalid Login
2020-09-25 06:02:06
209.244.77.241 attackbotsspam
Invalid user test2 from 209.244.77.241 port 21815
2020-09-25 05:48:10
145.255.27.194 attackspambots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-25 06:06:55
149.129.32.42 attackspam
Invalid user ubuntu from 149.129.32.42 port 46696
2020-09-25 06:06:25
62.234.135.100 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=mysql
2020-09-25 05:36:50
119.84.138.205 attackspambots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 06:11:15
103.130.109.9 attackspam
Invalid user john from 103.130.109.9 port 35951
2020-09-25 06:16:41
206.189.151.151 attack
Sep 24 22:48:17 master sshd[8870]: Failed password for invalid user helen from 206.189.151.151 port 43036 ssh2
Sep 24 22:59:57 master sshd[9001]: Failed password for invalid user john from 206.189.151.151 port 40804 ssh2
Sep 24 23:03:13 master sshd[9450]: Failed password for invalid user minecraft from 206.189.151.151 port 36008 ssh2
Sep 24 23:06:25 master sshd[9496]: Failed password for invalid user p from 206.189.151.151 port 59446 ssh2
Sep 24 23:09:31 master sshd[9541]: Failed password for invalid user testuser from 206.189.151.151 port 54656 ssh2
Sep 24 23:12:42 master sshd[9628]: Failed password for invalid user test3 from 206.189.151.151 port 49950 ssh2
Sep 24 23:15:57 master sshd[9680]: Failed password for root from 206.189.151.151 port 45202 ssh2
Sep 24 23:19:21 master sshd[9705]: Failed password for invalid user sandbox from 206.189.151.151 port 40410 ssh2
Sep 24 23:22:45 master sshd[9810]: Failed password for invalid user steam from 206.189.151.151 port 35618 ssh2
2020-09-25 05:48:26
180.97.182.226 attack
5x Failed Password
2020-09-25 06:00:18
103.45.102.170 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-25 06:17:05
145.239.19.186 attack
SSH Invalid Login
2020-09-25 06:07:18
199.96.132.25 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:51:15
68.183.120.37 attackbotsspam
Invalid user steam from 68.183.120.37 port 46346
2020-09-25 05:35:53
103.36.102.244 attack
Sep 24 23:04:02 [host] sshd[9943]: Invalid user an
Sep 24 23:04:02 [host] sshd[9943]: pam_unix(sshd:a
Sep 24 23:04:03 [host] sshd[9943]: Failed password
2020-09-25 06:17:32
185.79.114.240 attackbotsspam
SSH Invalid Login
2020-09-25 05:57:52

最近上报的IP列表

197.182.165.36 105.96.237.213 128.40.94.160 153.30.128.23
219.117.11.75 134.142.114.248 165.229.196.204 125.190.135.126
116.9.34.217 249.40.61.245 229.71.167.134 115.130.130.181
154.72.216.160 75.241.41.104 12.246.190.105 191.220.194.63
153.27.127.99 170.177.158.44 197.243.16.50 4.24.171.123