必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.108.0.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.108.0.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:11:37 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
80.0.108.129.in-addr.arpa domain name pointer listserv.utep.edu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.0.108.129.in-addr.arpa	name = listserv.utep.edu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.104.21.137 attackspambots
Email rejected due to spam filtering
2020-03-09 20:39:48
185.175.93.78 attack
Mar  9 13:33:26 debian-2gb-nbg1-2 kernel: \[6016358.053496\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.78 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=61086 PROTO=TCP SPT=57499 DPT=2666 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-09 20:45:46
5.202.104.45 attack
Port probing on unauthorized port 5555
2020-03-09 20:03:37
181.143.214.202 attack
Unauthorized connection attempt from IP address 181.143.214.202 on Port 445(SMB)
2020-03-09 20:40:42
185.94.111.1 attackspam
03/09/2020-08:24:31.694742 185.94.111.1 Protocol: 17 GPL RPC portmap listing UDP 111
2020-03-09 20:29:28
197.54.55.234 attackbots
IMAP/SMTP Authentication Failure
2020-03-09 20:13:06
101.71.51.192 attackbotsspam
Mar  9 08:15:31 server sshd\[4368\]: Failed password for root from 101.71.51.192 port 43109 ssh2
Mar  9 14:37:02 server sshd\[11643\]: Invalid user vsftpd from 101.71.51.192
Mar  9 14:37:02 server sshd\[11643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.51.192 
Mar  9 14:37:04 server sshd\[11643\]: Failed password for invalid user vsftpd from 101.71.51.192 port 46208 ssh2
Mar  9 14:51:37 server sshd\[14850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.51.192  user=root
...
2020-03-09 20:19:37
66.249.73.130 attack
Automatic report - Banned IP Access
2020-03-09 20:23:00
176.24.247.218 attackspambots
Honeypot attack, port: 81, PTR: b018f7da.bb.sky.com.
2020-03-09 20:26:57
167.56.140.237 attackspambots
Scan detected and blocked 2020.03.09 13:31:47
2020-03-09 20:42:56
125.162.85.115 attack
Unauthorised access (Mar  9) SRC=125.162.85.115 LEN=52 TTL=118 ID=179 DF TCP DPT=445 WINDOW=8192 SYN
2020-03-09 20:03:15
112.80.26.82 attackbots
Mar  9 09:04:39 gw1 sshd[3769]: Failed password for root from 112.80.26.82 port 47822 ssh2
...
2020-03-09 20:35:33
36.85.221.233 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-09 20:02:56
106.111.94.49 attackbots
Automatic report - Port Scan Attack
2020-03-09 20:08:09
120.132.124.237 attackbots
Mar  9 05:05:00 vps647732 sshd[9379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.124.237
Mar  9 05:05:02 vps647732 sshd[9379]: Failed password for invalid user user from 120.132.124.237 port 56998 ssh2
...
2020-03-09 20:06:27

最近上报的IP列表

92.224.244.74 6.1.107.97 132.250.138.144 155.231.94.171
221.91.160.148 71.144.29.115 223.68.143.120 65.53.50.141
141.140.149.191 23.5.114.183 200.230.252.137 203.60.216.60
38.146.22.10 88.51.142.212 20.134.215.21 48.1.129.183
56.3.116.79 85.219.55.195 129.194.113.238 246.198.166.154