必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.177.242.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.177.242.221.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:06:01 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 221.242.177.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.242.177.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.14.73.71 attackspambots
(From Poppen34195@gmail.com) Good afternoon, I was just checking out your site and submitted this message via your contact form. The "contact us" page on your site sends you these messages via email which is the reason you are reading my message right now right? That's the most important accomplishment with any type of online ad, getting people to actually READ your message and this is exactly what you're doing now! If you have an ad message you would like to blast out to tons of websites via their contact forms in the U.S. or to any country worldwide send me a quick note now, I can even target particular niches and my pricing is very reasonable. Shoot me an email here: jessiesamir81@gmail.com
2020-07-31 04:50:03
103.92.24.240 attack
Jul 30 22:19:13 OPSO sshd\[11571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.24.240  user=root
Jul 30 22:19:15 OPSO sshd\[11571\]: Failed password for root from 103.92.24.240 port 48380 ssh2
Jul 30 22:21:26 OPSO sshd\[12383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.24.240  user=root
Jul 30 22:21:27 OPSO sshd\[12383\]: Failed password for root from 103.92.24.240 port 51742 ssh2
Jul 30 22:23:41 OPSO sshd\[12881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.24.240  user=root
2020-07-31 04:26:52
67.205.57.152 attackbots
67.205.57.152 - - [30/Jul/2020:21:30:19 +0100] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
67.205.57.152 - - [30/Jul/2020:21:30:21 +0100] "POST /wp-login.php HTTP/1.1" 200 2092 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
67.205.57.152 - - [30/Jul/2020:21:30:21 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 04:49:29
119.45.137.244 attack
Jul 30 22:17:10 inter-technics sshd[31129]: Invalid user art from 119.45.137.244 port 43772
Jul 30 22:17:10 inter-technics sshd[31129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.137.244
Jul 30 22:17:10 inter-technics sshd[31129]: Invalid user art from 119.45.137.244 port 43772
Jul 30 22:17:12 inter-technics sshd[31129]: Failed password for invalid user art from 119.45.137.244 port 43772 ssh2
Jul 30 22:23:21 inter-technics sshd[31490]: Invalid user siding from 119.45.137.244 port 53000
...
2020-07-31 04:45:56
165.227.7.5 attackspambots
Jul 30 22:19:39 dev0-dcde-rnet sshd[26660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.7.5
Jul 30 22:19:41 dev0-dcde-rnet sshd[26660]: Failed password for invalid user RCadmin from 165.227.7.5 port 51056 ssh2
Jul 30 22:23:37 dev0-dcde-rnet sshd[26714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.7.5
2020-07-31 04:29:51
218.92.0.224 attack
Jul 30 13:23:31 dignus sshd[11757]: Failed password for root from 218.92.0.224 port 44293 ssh2
Jul 30 13:23:35 dignus sshd[11757]: Failed password for root from 218.92.0.224 port 44293 ssh2
Jul 30 13:23:38 dignus sshd[11757]: Failed password for root from 218.92.0.224 port 44293 ssh2
Jul 30 13:23:41 dignus sshd[11757]: Failed password for root from 218.92.0.224 port 44293 ssh2
Jul 30 13:23:44 dignus sshd[11757]: Failed password for root from 218.92.0.224 port 44293 ssh2
...
2020-07-31 04:24:44
111.229.189.98 attackspambots
Jul 30 22:34:50 vmd36147 sshd[15125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.189.98
Jul 30 22:34:52 vmd36147 sshd[15125]: Failed password for invalid user varnish from 111.229.189.98 port 46670 ssh2
Jul 30 22:40:57 vmd36147 sshd[28374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.189.98
...
2020-07-31 04:48:44
193.112.19.133 attackspam
Jul 30 21:36:39 rocket sshd[10111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.19.133
Jul 30 21:36:42 rocket sshd[10111]: Failed password for invalid user shiyao from 193.112.19.133 port 38300 ssh2
Jul 30 21:40:58 rocket sshd[10878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.19.133
...
2020-07-31 04:44:59
222.186.175.215 attackspambots
2020-07-30T22:33:49.145465vps773228.ovh.net sshd[18804]: Failed password for root from 222.186.175.215 port 14102 ssh2
2020-07-30T22:33:52.456492vps773228.ovh.net sshd[18804]: Failed password for root from 222.186.175.215 port 14102 ssh2
2020-07-30T22:33:55.512574vps773228.ovh.net sshd[18804]: Failed password for root from 222.186.175.215 port 14102 ssh2
2020-07-30T22:33:58.648728vps773228.ovh.net sshd[18804]: Failed password for root from 222.186.175.215 port 14102 ssh2
2020-07-30T22:34:01.531326vps773228.ovh.net sshd[18804]: Failed password for root from 222.186.175.215 port 14102 ssh2
...
2020-07-31 04:34:47
106.54.3.80 attackbotsspam
Jul 30 22:23:37 vps639187 sshd\[18896\]: Invalid user remote from 106.54.3.80 port 60930
Jul 30 22:23:37 vps639187 sshd\[18896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.3.80
Jul 30 22:23:39 vps639187 sshd\[18896\]: Failed password for invalid user remote from 106.54.3.80 port 60930 ssh2
...
2020-07-31 04:29:34
165.22.215.192 attackbots
Jul 30 22:25:44 dev0-dcde-rnet sshd[26744]: Failed password for root from 165.22.215.192 port 36326 ssh2
Jul 30 22:33:48 dev0-dcde-rnet sshd[26798]: Failed password for root from 165.22.215.192 port 57300 ssh2
2020-07-31 04:42:49
202.83.18.81 attack
1596140605 - 07/30/2020 22:23:25 Host: 202.83.18.81/202.83.18.81 Port: 445 TCP Blocked
2020-07-31 04:39:23
42.240.130.103 attackspam
Jul 30 00:27:37 ahost sshd[10953]: Invalid user devstaff from 42.240.130.103
Jul 30 00:27:37 ahost sshd[10953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.240.130.103 
Jul 30 00:27:39 ahost sshd[10953]: Failed password for invalid user devstaff from 42.240.130.103 port 52746 ssh2
Jul 30 00:27:39 ahost sshd[10953]: Received disconnect from 42.240.130.103: 11: Bye Bye [preauth]
Jul 30 00:37:57 ahost sshd[11139]: Invalid user xfhou from 42.240.130.103
Jul 30 00:37:57 ahost sshd[11139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.240.130.103 
Jul 30 00:38:00 ahost sshd[11139]: Failed password for invalid user xfhou from 42.240.130.103 port 56808 ssh2
Jul 30 00:38:00 ahost sshd[11139]: Received disconnect from 42.240.130.103: 11: Bye Bye [preauth]
Jul 30 00:44:15 ahost sshd[12013]: Invalid user honghaiyan from 42.240.130.103
Jul 30 00:44:15 ahost sshd[12013]: pam_unix(sshd:auth): au........
------------------------------
2020-07-31 04:31:43
213.149.103.132 attackbotsspam
213.149.103.132 - - [30/Jul/2020:22:23:22 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 04:42:21
51.75.18.212 attack
2020-07-30T20:15:42.975782shield sshd\[24383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.ip-51-75-18.eu  user=root
2020-07-30T20:15:45.028202shield sshd\[24383\]: Failed password for root from 51.75.18.212 port 40526 ssh2
2020-07-30T20:19:27.999058shield sshd\[25608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.ip-51-75-18.eu  user=root
2020-07-30T20:19:29.944313shield sshd\[25608\]: Failed password for root from 51.75.18.212 port 53808 ssh2
2020-07-30T20:23:24.019281shield sshd\[27155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.ip-51-75-18.eu  user=root
2020-07-31 04:41:01

最近上报的IP列表

252.77.196.239 159.212.242.254 29.122.112.70 44.113.164.79
171.158.38.54 133.17.163.91 83.247.58.126 243.74.205.86
162.27.68.45 177.53.199.160 188.246.225.196 14.106.193.77
52.219.147.46 125.18.119.51 138.183.36.197 223.143.115.141
130.179.117.34 44.2.118.222 78.30.212.19 87.171.79.20