必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Morgantown

省份(region): West Virginia

国家(country): United States

运营商(isp): PACE

主机名(hostname): unknown

机构(organization): National Aeronautics and Space Administration

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.164.29.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5125
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.164.29.4.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 16 21:04:35 CST 2019
;; MSG SIZE  rcvd: 116

HOST信息:
4.29.164.129.in-addr.arpa domain name pointer workstation4.ivv.nasa.gov.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
4.29.164.129.in-addr.arpa	name = workstation4.ivv.nasa.gov.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.209.0.33 attackbots
Port scan on 15 port(s): 5176 5181 5185 5192 5193 5196 6136 6137 6140 6145 6151 6156 6157 6160 6162
2019-09-11 10:35:36
27.44.183.211 attackbots
/var/log/messages:Sep 10 21:44:42 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1568151882.080:136871): pid=10381 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aexxxxxxx28-ctr ksize=128 mac=hmac-sha1 pfs=diffie-hellman-group14-sha1 spid=10382 suid=74 rport=59434 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=27.44.183.211 terminal=? res=success'
/var/log/messages:Sep 10 21:44:42 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1568151882.083:136872): pid=10381 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aexxxxxxx28-ctr ksize=128 mac=hmac-sha1 pfs=diffie-hellman-group14-sha1 spid=10382 suid=74 rport=59434 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=27.44.183.211 terminal=? res=success'
/var/log/messages:Sep 10 21:44:43 sanyalnet-cloud-vps fail2ban.f........
-------------------------------
2019-09-11 10:52:41
5.45.6.66 attackspam
Sep 11 00:11:05 vmd17057 sshd\[23822\]: Invalid user dev from 5.45.6.66 port 45238
Sep 11 00:11:05 vmd17057 sshd\[23822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.45.6.66
Sep 11 00:11:07 vmd17057 sshd\[23822\]: Failed password for invalid user dev from 5.45.6.66 port 45238 ssh2
...
2019-09-11 10:38:37
103.197.242.220 attackbots
Sep 11 00:00:09 mxgate1 postfix/postscreen[22092]: CONNECT from [103.197.242.220]:42608 to [176.31.12.44]:25
Sep 11 00:00:09 mxgate1 postfix/dnsblog[22093]: addr 103.197.242.220 listed by domain zen.spamhaus.org as 127.0.0.9
Sep 11 00:00:09 mxgate1 postfix/dnsblog[22093]: addr 103.197.242.220 listed by domain zen.spamhaus.org as 127.0.0.3
Sep 11 00:00:09 mxgate1 postfix/dnsblog[22093]: addr 103.197.242.220 listed by domain zen.spamhaus.org as 127.0.0.2
Sep 11 00:00:09 mxgate1 postfix/dnsblog[22097]: addr 103.197.242.220 listed by domain b.barracudacentral.org as 127.0.0.2
Sep 11 00:00:15 mxgate1 postfix/postscreen[22092]: DNSBL rank 3 for [103.197.242.220]:42608
Sep x@x
Sep 11 00:00:15 mxgate1 postfix/postscreen[22092]: DISCONNECT [103.197.242.220]:42608


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.197.242.220
2019-09-11 10:59:31
68.183.234.12 attack
Sep 11 03:42:23 yabzik sshd[7092]: Failed password for www-data from 68.183.234.12 port 57088 ssh2
Sep 11 03:48:55 yabzik sshd[9132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.234.12
Sep 11 03:48:57 yabzik sshd[9132]: Failed password for invalid user odoo2017 from 68.183.234.12 port 44456 ssh2
2019-09-11 10:24:51
101.205.76.26 attack
Sep 10 21:46:26 euve59663 sshd[12697]: Invalid user user from 101.205.7=
6.26
Sep 10 21:46:26 euve59663 sshd[12697]: pam_unix(sshd:auth): authenticat=
ion failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D101=
.205.76.26=20
Sep 10 21:46:28 euve59663 sshd[12697]: Failed password for invalid user=
 user from 101.205.76.26 port 39445 ssh2
Sep 10 21:46:29 euve59663 sshd[12697]: Failed password for invalid user=
 user from 101.205.76.26 port 39445 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=101.205.76.26
2019-09-11 10:56:25
103.21.148.51 attack
Sep 10 16:07:34 php2 sshd\[8672\]: Invalid user server from 103.21.148.51
Sep 10 16:07:34 php2 sshd\[8672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.148.51
Sep 10 16:07:36 php2 sshd\[8672\]: Failed password for invalid user server from 103.21.148.51 port 50950 ssh2
Sep 10 16:15:09 php2 sshd\[9451\]: Invalid user developer from 103.21.148.51
Sep 10 16:15:09 php2 sshd\[9451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.148.51
2019-09-11 10:31:49
139.199.183.185 attackspambots
Sep 10 13:59:16 eddieflores sshd\[22019\]: Invalid user teamspeak from 139.199.183.185
Sep 10 13:59:16 eddieflores sshd\[22019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.183.185
Sep 10 13:59:17 eddieflores sshd\[22019\]: Failed password for invalid user teamspeak from 139.199.183.185 port 33508 ssh2
Sep 10 14:02:45 eddieflores sshd\[22340\]: Invalid user temp from 139.199.183.185
Sep 10 14:02:45 eddieflores sshd\[22340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.183.185
2019-09-11 10:44:09
104.236.63.99 attackbotsspam
Sep 10 23:49:10 hb sshd\[1392\]: Invalid user csserver from 104.236.63.99
Sep 10 23:49:10 hb sshd\[1392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.63.99
Sep 10 23:49:12 hb sshd\[1392\]: Failed password for invalid user csserver from 104.236.63.99 port 40732 ssh2
Sep 10 23:54:41 hb sshd\[1950\]: Invalid user postgres from 104.236.63.99
Sep 10 23:54:41 hb sshd\[1950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.63.99
2019-09-11 10:58:45
180.76.119.77 attackspambots
Sep 10 22:21:46 ny01 sshd[23289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.77
Sep 10 22:21:48 ny01 sshd[23289]: Failed password for invalid user pass123 from 180.76.119.77 port 59402 ssh2
Sep 10 22:26:59 ny01 sshd[24598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.77
2019-09-11 10:28:21
95.53.192.44 attackbotsspam
IMAP brute force
...
2019-09-11 10:19:52
193.169.255.131 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 01:22:25,418 INFO [amun_request_handler] PortScan Detected on Port: 25 (193.169.255.131)
2019-09-11 11:08:40
85.111.77.167 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-10 12:13:50,473 INFO [shellcode_manager] (85.111.77.167) no match, writing hexdump (ca94f478cc88eb3720cdfdd6e9055da8 :2291128) - MS17010 (EternalBlue)
2019-09-11 10:42:56
111.226.201.88 attack
Automatic report - Port Scan Attack
2019-09-11 10:57:51
211.55.231.189 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-11 11:04:22

最近上报的IP列表

213.45.163.213 204.229.230.173 188.156.29.80 199.117.213.174
49.135.117.107 106.189.171.253 74.40.254.195 70.223.173.81
105.166.223.228 166.141.204.67 217.10.10.42 126.23.136.47
101.196.9.190 2.203.228.9 221.247.4.60 156.241.184.145
116.80.145.42 35.185.78.244 73.79.100.216 194.61.84.201