必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Chicago

省份(region): Illinois

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.149.127.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43021
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.149.127.140.		IN	A

;; AUTHORITY SECTION:
.			549	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112401 1800 900 604800 86400

;; Query time: 515 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 25 03:13:18 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
140.127.149.129.in-addr.arpa domain name pointer oc-129-149-127-140.compute.oraclecloud.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.127.149.129.in-addr.arpa	name = oc-129-149-127-140.compute.oraclecloud.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.2.104.191 attackbotsspam
Unauthorized connection attempt from IP address 117.2.104.191 on Port 445(SMB)
2019-12-11 07:54:35
200.2.101.252 attackbots
Unauthorized connection attempt from IP address 200.2.101.252 on Port 445(SMB)
2019-12-11 07:43:57
179.178.83.31 attack
Automatic report - Port Scan Attack
2019-12-11 07:32:08
69.229.6.31 attack
Dec  6 22:08:31 mail sshd[21908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.31  user=www-data
Dec  6 22:08:33 mail sshd[21908]: Failed password for www-data from 69.229.6.31 port 33884 ssh2
Dec  6 22:08:34 mail sshd[21908]: Received disconnect from 69.229.6.31: 11: Bye Bye [preauth]
Dec  6 22:28:32 mail sshd[22377]: Failed password for invalid user lcruz from 69.229.6.31 port 40508 ssh2
Dec  6 22:28:32 mail sshd[22377]: Received disconnect from 69.229.6.31: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=69.229.6.31
2019-12-11 07:42:06
220.167.166.25 attack
Unauthorized connection attempt from IP address 220.167.166.25 on Port 445(SMB)
2019-12-11 08:02:21
62.234.156.66 attack
Dec 10 20:21:16 loxhost sshd\[11527\]: Invalid user alcayde from 62.234.156.66 port 56408
Dec 10 20:21:16 loxhost sshd\[11527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.66
Dec 10 20:21:18 loxhost sshd\[11527\]: Failed password for invalid user alcayde from 62.234.156.66 port 56408 ssh2
Dec 10 20:25:36 loxhost sshd\[11658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.66  user=root
Dec 10 20:25:38 loxhost sshd\[11658\]: Failed password for root from 62.234.156.66 port 46098 ssh2
...
2019-12-11 07:29:19
190.252.21.43 attackbotsspam
Automatic report - Port Scan Attack
2019-12-11 07:58:11
171.84.6.86 attackspambots
Dec 11 01:08:38 itv-usvr-02 sshd[17615]: Invalid user scp from 171.84.6.86 port 34377
Dec 11 01:08:38 itv-usvr-02 sshd[17615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.84.6.86
Dec 11 01:08:38 itv-usvr-02 sshd[17615]: Invalid user scp from 171.84.6.86 port 34377
Dec 11 01:08:41 itv-usvr-02 sshd[17615]: Failed password for invalid user scp from 171.84.6.86 port 34377 ssh2
Dec 11 01:15:32 itv-usvr-02 sshd[17733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.84.6.86  user=root
Dec 11 01:15:35 itv-usvr-02 sshd[17733]: Failed password for root from 171.84.6.86 port 58067 ssh2
2019-12-11 07:45:52
190.115.1.49 attackspambots
Dec 10 23:35:18 hcbbdb sshd\[3693\]: Invalid user server from 190.115.1.49
Dec 10 23:35:18 hcbbdb sshd\[3693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.115.1.49
Dec 10 23:35:19 hcbbdb sshd\[3693\]: Failed password for invalid user server from 190.115.1.49 port 59316 ssh2
Dec 10 23:41:11 hcbbdb sshd\[4360\]: Invalid user www from 190.115.1.49
Dec 10 23:41:11 hcbbdb sshd\[4360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.115.1.49
2019-12-11 07:53:51
117.119.83.56 attackspambots
fail2ban
2019-12-11 07:34:02
185.184.79.31 attack
Dec 11 02:40:07 debian-2gb-vpn-nbg1-1 kernel: [399591.262573] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=185.184.79.31 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=43235 PROTO=TCP SPT=60000 DPT=3333 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-11 07:47:47
193.70.81.201 attackbotsspam
Unauthorized SSH login attempts
2019-12-11 08:03:14
145.239.42.107 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-11 07:36:59
180.251.35.16 attackspam
Unauthorized connection attempt from IP address 180.251.35.16 on Port 445(SMB)
2019-12-11 07:29:56
75.98.144.15 attackbots
SSH bruteforce
2019-12-11 08:06:25

最近上报的IP列表

143.89.26.15 153.40.234.77 60.116.130.109 119.120.106.3
137.216.54.109 86.234.86.243 211.245.252.134 186.54.131.105
219.79.132.86 24.85.146.222 199.167.193.170 107.124.178.44
175.119.235.105 138.236.211.91 87.172.167.107 24.116.234.20
113.23.120.195 218.75.229.24 178.253.146.173 82.207.114.64