必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.130.182.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.130.182.132.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 05:19:00 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 132.182.130.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.182.130.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.31.105.250 attack
Aug 13 23:12:22 abendstille sshd\[553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.105.250  user=root
Aug 13 23:12:24 abendstille sshd\[553\]: Failed password for root from 113.31.105.250 port 37154 ssh2
Aug 13 23:15:06 abendstille sshd\[3462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.105.250  user=root
Aug 13 23:15:07 abendstille sshd\[3462\]: Failed password for root from 113.31.105.250 port 37342 ssh2
Aug 13 23:17:49 abendstille sshd\[5750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.105.250  user=root
...
2020-08-14 06:15:10
91.201.247.94 attackspambots
Unauthorized connection attempt from IP address 91.201.247.94 on Port 445(SMB)
2020-08-14 06:12:10
181.63.248.149 attackbotsspam
Aug 13 15:30:28 askasleikir sshd[60661]: Failed password for root from 181.63.248.149 port 55730 ssh2
2020-08-14 06:29:14
121.48.164.31 attack
20 attempts against mh-ssh on cloud
2020-08-14 06:31:22
41.228.161.240 attack
Aug 10 13:16:40 mxgate1 postfix/postscreen[5070]: CONNECT from [41.228.161.240]:12737 to [176.31.12.44]:25
Aug 10 13:16:40 mxgate1 postfix/dnsblog[5071]: addr 41.228.161.240 listed by domain bl.spamcop.net as 127.0.0.2
Aug 10 13:16:40 mxgate1 postfix/dnsblog[5073]: addr 41.228.161.240 listed by domain cbl.abuseat.org as 127.0.0.2
Aug 10 13:16:40 mxgate1 postfix/dnsblog[5072]: addr 41.228.161.240 listed by domain zen.spamhaus.org as 127.0.0.4
Aug 10 13:16:40 mxgate1 postfix/dnsblog[5072]: addr 41.228.161.240 listed by domain zen.spamhaus.org as 127.0.0.11
Aug 10 13:16:40 mxgate1 postfix/dnsblog[5074]: addr 41.228.161.240 listed by domain b.barracudacentral.org as 127.0.0.2
Aug 10 13:16:46 mxgate1 postfix/postscreen[5070]: DNSBL rank 5 for [41.228.161.240]:12737
Aug x@x
Aug 10 13:16:48 mxgate1 postfix/postscreen[5070]: HANGUP after 1.7 from [41.228.161.240]:12737 in tests after SMTP handshake
Aug 10 13:16:48 mxgate1 postfix/postscreen[5070]: DISCONNECT [41.228.161.240]:12........
-------------------------------
2020-08-14 06:33:40
118.97.119.130 attackbots
Aug 14 00:01:36 jane sshd[3246]: Failed password for root from 118.97.119.130 port 60634 ssh2
...
2020-08-14 06:40:54
1.47.68.8 attackbots
Unauthorized connection attempt from IP address 1.47.68.8 on Port 445(SMB)
2020-08-14 06:18:22
179.43.167.227 attack
Automatic report - Banned IP Access
2020-08-14 06:47:57
86.25.9.2 attack
Attempts against non-existent wp-login
2020-08-14 06:16:15
46.45.210.169 attackbots
Unauthorized connection attempt from IP address 46.45.210.169 on Port 445(SMB)
2020-08-14 06:21:48
94.74.190.33 attackbots
$f2bV_matches
2020-08-14 06:45:42
121.227.246.42 attackbotsspam
Aug 10 06:25:32 host sshd[2834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.227.246.42  user=r.r
Aug 10 06:25:34 host sshd[2834]: Failed password for r.r from 121.227.246.42 port 41733 ssh2
Aug 10 06:25:34 host sshd[2834]: Received disconnect from 121.227.246.42: 11: Bye Bye [preauth]
Aug 10 06:34:17 host sshd[2508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.227.246.42  user=r.r
Aug 10 06:34:19 host sshd[2508]: Failed password for r.r from 121.227.246.42 port 38554 ssh2
Aug 10 06:34:20 host sshd[2508]: Received disconnect from 121.227.246.42: 11: Bye Bye [preauth]
Aug 10 06:37:11 host sshd[12504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.227.246.42  user=r.r
Aug 10 06:37:12 host sshd[12504]: Failed password for r.r from 121.227.246.42 port 59101 ssh2
Aug 10 06:37:12 host sshd[12504]: Received disconnect from 121.227.246.42........
-------------------------------
2020-08-14 06:38:18
218.92.0.250 attack
prod6
...
2020-08-14 06:46:48
106.13.228.33 attack
Aug 13 15:39:00 askasleikir sshd[60687]: Failed password for root from 106.13.228.33 port 41060 ssh2
2020-08-14 06:33:08
41.41.0.187 attack
2020-08-13T20:35:13.506960abusebot.cloudsearch.cf sshd[14630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.41.0.187  user=root
2020-08-13T20:35:15.326812abusebot.cloudsearch.cf sshd[14630]: Failed password for root from 41.41.0.187 port 47526 ssh2
2020-08-13T20:37:45.422903abusebot.cloudsearch.cf sshd[14692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.41.0.187  user=root
2020-08-13T20:37:47.443371abusebot.cloudsearch.cf sshd[14692]: Failed password for root from 41.41.0.187 port 56176 ssh2
2020-08-13T20:42:45.560228abusebot.cloudsearch.cf sshd[14842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.41.0.187  user=root
2020-08-13T20:42:47.098730abusebot.cloudsearch.cf sshd[14842]: Failed password for root from 41.41.0.187 port 45248 ssh2
2020-08-13T20:45:10.158995abusebot.cloudsearch.cf sshd[14880]: pam_unix(sshd:auth): authentication failure; logname
...
2020-08-14 06:16:40

最近上报的IP列表

166.94.154.218 173.187.160.206 144.118.240.13 218.113.174.96
194.201.62.33 146.160.102.99 8.7.47.157 43.175.34.57
118.70.42.167 121.161.11.116 189.240.63.19 231.243.16.204
18.10.180.73 98.132.169.80 25.113.166.1 218.67.169.1
146.198.68.29 227.36.71.143 252.9.106.30 154.79.237.105