必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.111.55.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62478
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.111.55.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 13:59:26 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 109.55.111.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.55.111.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.17.94.55 attackspam
web-1 [ssh] SSH Attack
2020-04-10 03:09:40
14.78.109.175 attackspam
KR_MNT-KRNIC-AP_<177>1586437156 [1:2403316:56586] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 9 [Classification: Misc Attack] [Priority: 2]:  {TCP} 14.78.109.175:1282
2020-04-10 03:10:52
190.146.184.215 attackspam
$f2bV_matches
2020-04-10 02:58:00
36.72.189.15 attackspam
1586437199 - 04/09/2020 14:59:59 Host: 36.72.189.15/36.72.189.15 Port: 445 TCP Blocked
2020-04-10 02:35:31
222.186.30.76 attackbots
Apr  9 20:49:29 localhost sshd[22557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Apr  9 20:49:30 localhost sshd[22557]: Failed password for root from 222.186.30.76 port 23559 ssh2
...
2020-04-10 02:49:54
180.250.247.45 attackspambots
$f2bV_matches
2020-04-10 03:02:00
134.175.32.95 attackspam
Apr  9 18:22:44 ns382633 sshd\[4448\]: Invalid user licongcong from 134.175.32.95 port 55714
Apr  9 18:22:44 ns382633 sshd\[4448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.32.95
Apr  9 18:22:46 ns382633 sshd\[4448\]: Failed password for invalid user licongcong from 134.175.32.95 port 55714 ssh2
Apr  9 18:29:39 ns382633 sshd\[5775\]: Invalid user postgres from 134.175.32.95 port 41438
Apr  9 18:29:39 ns382633 sshd\[5775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.32.95
2020-04-10 02:58:57
125.160.114.240 attackspam
1586437190 - 04/09/2020 14:59:50 Host: 125.160.114.240/125.160.114.240 Port: 445 TCP Blocked
2020-04-10 02:43:33
190.156.231.134 attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-10 03:13:52
64.225.124.68 attack
Apr  9 19:02:50 * sshd[6241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.124.68
Apr  9 19:02:53 * sshd[6241]: Failed password for invalid user admin from 64.225.124.68 port 53012 ssh2
2020-04-10 02:37:11
159.89.196.75 attack
Apr  9 16:28:46 host sshd[59994]: Invalid user postgres from 159.89.196.75 port 34368
...
2020-04-10 02:46:03
51.154.18.140 attackbotsspam
Apr  9 11:31:50 lanister sshd[14729]: Invalid user ftpadmin from 51.154.18.140
Apr  9 11:31:50 lanister sshd[14729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.154.18.140
Apr  9 11:31:50 lanister sshd[14729]: Invalid user ftpadmin from 51.154.18.140
Apr  9 11:31:51 lanister sshd[14729]: Failed password for invalid user ftpadmin from 51.154.18.140 port 55071 ssh2
2020-04-10 02:49:13
104.250.52.130 attackbotsspam
Apr  9 14:46:49 icinga sshd[28312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.52.130 
Apr  9 14:46:52 icinga sshd[28312]: Failed password for invalid user test from 104.250.52.130 port 55236 ssh2
Apr  9 14:59:54 icinga sshd[49972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.52.130 
...
2020-04-10 02:39:36
148.70.166.93 attackbots
Apr  9 14:59:45 sxvn sshd[49093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.166.93
2020-04-10 02:48:47
45.235.86.21 attackbots
Apr  9 18:19:46 ns382633 sshd\[3559\]: Invalid user test from 45.235.86.21 port 46494
Apr  9 18:19:46 ns382633 sshd\[3559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.235.86.21
Apr  9 18:19:48 ns382633 sshd\[3559\]: Failed password for invalid user test from 45.235.86.21 port 46494 ssh2
Apr  9 18:32:38 ns382633 sshd\[6680\]: Invalid user test from 45.235.86.21 port 58868
Apr  9 18:32:38 ns382633 sshd\[6680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.235.86.21
2020-04-10 02:52:57

最近上报的IP列表

28.158.151.173 85.106.20.138 146.18.100.184 39.166.225.153
71.245.87.22 107.7.88.162 146.181.167.223 221.96.43.229
187.42.172.9 47.234.17.148 151.214.234.241 82.221.129.20
148.210.43.219 19.216.183.184 61.30.102.50 87.185.79.43
178.108.67.241 18.231.234.132 139.20.59.159 149.114.179.144