必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.105.136.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26865
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.105.136.48.			IN	A

;; AUTHORITY SECTION:
.			369	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:53:54 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
48.136.105.129.in-addr.arpa domain name pointer evcommon-caesar-vip.northwestern.edu.
48.136.105.129.in-addr.arpa domain name pointer cnair.northwestern.edu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.136.105.129.in-addr.arpa	name = evcommon-caesar-vip.northwestern.edu.
48.136.105.129.in-addr.arpa	name = cnair.northwestern.edu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.89.177.46 attackspam
Automatic report - Banned IP Access
2019-07-23 02:03:31
195.38.102.33 attackbots
SSH bruteforce (Triggered fail2ban)
2019-07-23 01:15:47
200.109.183.212 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 15:42:11,069 INFO [shellcode_manager] (200.109.183.212) no match, writing hexdump (b9ac446637975af6c4263c64628b68a8 :2201050) - MS17010 (EternalBlue)
2019-07-23 02:05:01
51.154.49.129 attack
Jul 22 19:24:14 rpi sshd[2717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.154.49.129 
Jul 22 19:24:17 rpi sshd[2717]: Failed password for invalid user bh from 51.154.49.129 port 36772 ssh2
2019-07-23 01:25:15
121.12.87.83 attack
Jul  7 17:02:52 sanyalnet-cloud-vps4 sshd[28816]: Connection from 121.12.87.83 port 26945 on 64.137.160.124 port 23
Jul  7 17:02:54 sanyalnet-cloud-vps4 sshd[28816]: Invalid user cstrike from 121.12.87.83
Jul  7 17:02:54 sanyalnet-cloud-vps4 sshd[28816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.12.87.83 
Jul  7 17:02:56 sanyalnet-cloud-vps4 sshd[28816]: Failed password for invalid user cstrike from 121.12.87.83 port 26945 ssh2
Jul  7 17:02:56 sanyalnet-cloud-vps4 sshd[28816]: Received disconnect from 121.12.87.83: 11: Bye Bye [preauth]
Jul  7 17:08:20 sanyalnet-cloud-vps4 sshd[28854]: Connection from 121.12.87.83 port 56779 on 64.137.160.124 port 23
Jul  7 17:08:22 sanyalnet-cloud-vps4 sshd[28854]: Invalid user pork from 121.12.87.83
Jul  7 17:08:22 sanyalnet-cloud-vps4 sshd[28854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.12.87.83 
Jul  7 17:08:24 sanyalnet-cloud-vps4 ........
-------------------------------
2019-07-23 01:43:15
92.222.90.130 attack
Jul 22 13:52:03 vps200512 sshd\[30430\]: Invalid user central from 92.222.90.130
Jul 22 13:52:04 vps200512 sshd\[30430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.90.130
Jul 22 13:52:05 vps200512 sshd\[30430\]: Failed password for invalid user central from 92.222.90.130 port 53328 ssh2
Jul 22 13:56:53 vps200512 sshd\[30515\]: Invalid user sshusr from 92.222.90.130
Jul 22 13:56:53 vps200512 sshd\[30515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.90.130
2019-07-23 02:08:24
68.183.48.172 attackspambots
Jul 22 11:05:41 plusreed sshd[31561]: Invalid user stefan from 68.183.48.172
...
2019-07-23 02:08:52
190.54.140.114 attackbotsspam
" "
2019-07-23 02:06:14
109.198.111.54 attackspam
[portscan] Port scan
2019-07-23 01:28:09
155.4.252.250 attackspambots
Jul 22 15:17:00 localhost sshd\[28921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.4.252.250  user=root
Jul 22 15:17:02 localhost sshd\[28921\]: Failed password for root from 155.4.252.250 port 47777 ssh2
Jul 22 15:17:04 localhost sshd\[28921\]: Failed password for root from 155.4.252.250 port 47777 ssh2
Jul 22 15:17:06 localhost sshd\[28921\]: Failed password for root from 155.4.252.250 port 47777 ssh2
Jul 22 15:17:08 localhost sshd\[28921\]: Failed password for root from 155.4.252.250 port 47777 ssh2
...
2019-07-23 02:09:13
152.168.211.200 attack
Jul 22 16:34:59 ns37 sshd[12297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.211.200
2019-07-23 02:07:05
206.189.88.75 attack
Unauthorized SSH login attempts
2019-07-23 01:52:34
103.72.163.150 attackbotsspam
Dictionary attack on login resource.
2019-07-23 01:09:43
91.221.176.13 attackbotsspam
Jul 22 12:45:41 host sshd[5494]: Invalid user tomcat2 from 91.221.176.13
Jul 22 12:45:43 host sshd[5494]: Failed password for invalid user tomcat2 from 91.221.176.13 port 47864 ssh2
Jul 22 12:50:32 host sshd[5589]: Invalid user client from 91.221.176.13
Jul 22 12:50:35 host sshd[5589]: Failed password for invalid user client from 91.221.176.13 port 44100 ssh2
Jul 22 12:55:31 host sshd[5656]: Invalid user jboss from 91.221.176.13


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.221.176.13
2019-07-23 01:58:50
193.169.39.254 attackbotsspam
SSH Brute Force, server-1 sshd[32069]: Failed password for invalid user vmail from 193.169.39.254 port 50826 ssh2
2019-07-23 01:58:29

最近上报的IP列表

129.102.240.227 129.106.32.54 129.108.0.145 129.109.15.30
129.11.26.47 129.111.12.11 129.118.241.15 129.118.241.45
129.12.10.249 129.120.231.230 129.121.16.226 129.121.17.202
129.121.17.219 129.121.176.10 129.121.19.251 129.121.4.182
9.46.126.27 129.121.5.191 129.127.149.1 210.181.21.29