必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.113.142.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.113.142.204.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 234 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:31:51 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
204.142.113.129.in-addr.arpa domain name pointer doesnotexist.utpa.edu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.142.113.129.in-addr.arpa	name = doesnotexist.utpa.edu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.171.124.30 attackbots
Port Scan
2019-12-12 16:03:18
40.68.153.124 attackbots
Dec 11 21:53:02 auw2 sshd\[6800\]: Invalid user 19v8y from 40.68.153.124
Dec 11 21:53:02 auw2 sshd\[6800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.68.153.124
Dec 11 21:53:05 auw2 sshd\[6800\]: Failed password for invalid user 19v8y from 40.68.153.124 port 53349 ssh2
Dec 11 21:58:55 auw2 sshd\[7320\]: Invalid user gabriel from 40.68.153.124
Dec 11 21:58:55 auw2 sshd\[7320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.68.153.124
2019-12-12 16:00:13
46.101.11.213 attackspambots
Dec 12 08:29:35 cvbnet sshd[6267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.11.213 
Dec 12 08:29:37 cvbnet sshd[6267]: Failed password for invalid user calomiti from 46.101.11.213 port 59852 ssh2
...
2019-12-12 15:54:30
119.183.195.120 attackbotsspam
Automatic report - Port Scan Attack
2019-12-12 15:50:39
188.131.187.152 attack
Invalid user adachi from 188.131.187.152 port 55966
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.187.152
Failed password for invalid user adachi from 188.131.187.152 port 55966 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.187.152  user=root
Failed password for root from 188.131.187.152 port 52380 ssh2
2019-12-12 15:53:39
206.189.204.63 attack
Dec 12 08:39:21 localhost sshd\[20181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.204.63  user=root
Dec 12 08:39:23 localhost sshd\[20181\]: Failed password for root from 206.189.204.63 port 58318 ssh2
Dec 12 08:45:01 localhost sshd\[20807\]: Invalid user ispconfig from 206.189.204.63 port 37792
2019-12-12 16:05:45
210.212.78.34 attack
Scanning random ports - tries to find possible vulnerable services
2019-12-12 16:14:51
36.70.178.19 attack
1576132103 - 12/12/2019 07:28:23 Host: 36.70.178.19/36.70.178.19 Port: 445 TCP Blocked
2019-12-12 16:19:18
159.192.67.100 attackspambots
Port Scan
2019-12-12 16:08:39
49.248.3.10 attackbots
1576132153 - 12/12/2019 07:29:13 Host: 49.248.3.10/49.248.3.10 Port: 445 TCP Blocked
2019-12-12 15:55:06
45.93.20.189 attack
firewall-block, port(s): 14848/tcp
2019-12-12 15:59:44
177.36.8.226 attack
12/12/2019-07:29:05.067146 177.36.8.226 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-12-12 16:02:30
40.73.29.153 attackspambots
Dec 12 08:31:39 nextcloud sshd\[22543\]: Invalid user dhr from 40.73.29.153
Dec 12 08:31:39 nextcloud sshd\[22543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.29.153
Dec 12 08:31:41 nextcloud sshd\[22543\]: Failed password for invalid user dhr from 40.73.29.153 port 38034 ssh2
...
2019-12-12 15:49:43
140.143.90.154 attackspambots
Dec 12 08:29:53 MK-Soft-VM4 sshd[3855]: Failed password for sync from 140.143.90.154 port 32830 ssh2
...
2019-12-12 15:59:01
84.255.152.10 attackspambots
Dec 12 07:40:24 thevastnessof sshd[10347]: Failed password for invalid user ackaret from 84.255.152.10 port 60706 ssh2
...
2019-12-12 16:04:52

最近上报的IP列表

44.95.185.230 193.95.10.196 46.51.115.67 124.197.231.84
248.110.199.130 128.124.221.118 173.123.128.19 107.154.32.230
101.53.98.33 212.243.47.159 236.78.82.164 27.150.170.60
66.236.60.49 19.150.174.125 233.10.85.211 39.39.168.203
150.215.91.76 203.38.111.179 98.81.84.52 252.70.49.36