必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Denmark

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.142.221.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.142.221.100.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022702 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 05:17:19 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
100.221.142.129.in-addr.arpa domain name pointer 129142221100.mbb.telenor.dk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
100.221.142.129.in-addr.arpa	name = 129142221100.mbb.telenor.dk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.29.107.20 attack
Invalid user monitor from 119.29.107.20 port 14338
2020-06-12 17:01:59
125.212.203.113 attack
Jun 12 08:10:02 ns382633 sshd\[16262\]: Invalid user wkp from 125.212.203.113 port 54426
Jun 12 08:10:02 ns382633 sshd\[16262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113
Jun 12 08:10:04 ns382633 sshd\[16262\]: Failed password for invalid user wkp from 125.212.203.113 port 54426 ssh2
Jun 12 08:13:32 ns382633 sshd\[17060\]: Invalid user sites from 125.212.203.113 port 48224
Jun 12 08:13:32 ns382633 sshd\[17060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113
2020-06-12 17:07:11
42.81.122.86 attack
Unauthorized connection attempt detected from IP address 42.81.122.86 to port 23
2020-06-12 17:14:29
141.211.240.249 attackbots
Jun 12 05:42:13 ws26vmsma01 sshd[244452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.211.240.249
Jun 12 05:42:15 ws26vmsma01 sshd[244452]: Failed password for invalid user mandi from 141.211.240.249 port 56392 ssh2
...
2020-06-12 17:08:22
2.136.198.12 attackbots
Invalid user hayden from 2.136.198.12 port 53036
2020-06-12 17:16:55
35.226.50.138 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-06-12 17:12:29
195.144.21.56 attack
f2b trigger Multiple SASL failures
2020-06-12 17:14:48
174.223.4.30 attack
Brute forcing email accounts
2020-06-12 17:25:18
201.235.19.122 attackbotsspam
Jun 12 07:08:18 meumeu sshd[299248]: Invalid user xdzhang from 201.235.19.122 port 34631
Jun 12 07:08:18 meumeu sshd[299248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.235.19.122 
Jun 12 07:08:18 meumeu sshd[299248]: Invalid user xdzhang from 201.235.19.122 port 34631
Jun 12 07:08:20 meumeu sshd[299248]: Failed password for invalid user xdzhang from 201.235.19.122 port 34631 ssh2
Jun 12 07:12:51 meumeu sshd[299576]: Invalid user frxu from 201.235.19.122 port 36270
Jun 12 07:12:51 meumeu sshd[299576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.235.19.122 
Jun 12 07:12:51 meumeu sshd[299576]: Invalid user frxu from 201.235.19.122 port 36270
Jun 12 07:12:53 meumeu sshd[299576]: Failed password for invalid user frxu from 201.235.19.122 port 36270 ssh2
Jun 12 07:17:31 meumeu sshd[299807]: Invalid user oracle from 201.235.19.122 port 37910
...
2020-06-12 17:29:49
115.29.39.194 attack
php vulnerability probing
2020-06-12 17:16:14
51.77.135.89 attackspam
<6 unauthorized SSH connections
2020-06-12 17:18:07
39.115.113.146 attackspam
Jun 12 06:27:39 vps sshd[644866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.115.113.146  user=root
Jun 12 06:27:41 vps sshd[644866]: Failed password for root from 39.115.113.146 port 44908 ssh2
Jun 12 06:30:52 vps sshd[659938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.115.113.146  user=root
Jun 12 06:30:54 vps sshd[659938]: Failed password for root from 39.115.113.146 port 38093 ssh2
Jun 12 06:34:05 vps sshd[671129]: Invalid user admin from 39.115.113.146 port 31280
...
2020-06-12 17:09:37
211.103.222.34 attackspambots
$f2bV_matches
2020-06-12 17:28:17
130.185.123.154 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-06-12 16:55:09
112.198.115.36 attackbots
my internet becomes so slow
2020-06-12 17:10:04

最近上报的IP列表

6.197.97.211 47.27.231.135 144.157.8.95 249.9.100.222
49.237.77.244 63.244.85.198 21.2.154.168 61.140.246.53
141.217.44.227 201.234.134.41 254.140.61.69 197.25.204.175
231.36.228.92 116.41.127.222 24.230.140.246 30.164.97.144
51.231.181.199 17.247.153.15 36.69.46.107 241.193.154.73