必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): Tencent Cloud Computing (Beijing) Co. Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
Aug  6 11:05:47 vpn01 sshd[4176]: Failed password for root from 129.204.7.21 port 56314 ssh2
...
2020-08-06 17:25:12
attackbots
Aug  4 15:20:51 gw1 sshd[9201]: Failed password for root from 129.204.7.21 port 37680 ssh2
...
2020-08-04 18:34:18
attackbotsspam
Aug  2 13:50:42 ns382633 sshd\[3831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.7.21  user=root
Aug  2 13:50:44 ns382633 sshd\[3831\]: Failed password for root from 129.204.7.21 port 36854 ssh2
Aug  2 14:06:58 ns382633 sshd\[6519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.7.21  user=root
Aug  2 14:07:00 ns382633 sshd\[6519\]: Failed password for root from 129.204.7.21 port 43406 ssh2
Aug  2 14:12:31 ns382633 sshd\[7492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.7.21  user=root
2020-08-02 21:54:25
attackspambots
Invalid user valerio from 129.204.7.21 port 51670
2020-07-25 12:03:17
attackspam
SSH bruteforce
2020-07-09 23:49:50
attackspambots
Invalid user admin from 129.204.7.21 port 54832
2020-07-04 15:03:13
attack
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-06-28 23:28:37
attackbotsspam
2020-06-16T04:41:42.938155mail.csmailer.org sshd[31870]: Failed password for invalid user johan from 129.204.7.21 port 46712 ssh2
2020-06-16T04:44:13.407375mail.csmailer.org sshd[32066]: Invalid user admin from 129.204.7.21 port 52480
2020-06-16T04:44:13.411732mail.csmailer.org sshd[32066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.7.21
2020-06-16T04:44:13.407375mail.csmailer.org sshd[32066]: Invalid user admin from 129.204.7.21 port 52480
2020-06-16T04:44:15.074413mail.csmailer.org sshd[32066]: Failed password for invalid user admin from 129.204.7.21 port 52480 ssh2
...
2020-06-16 13:22:52
attackbotsspam
Failed password for invalid user tomcat from 129.204.7.21 port 57282 ssh2
2020-06-15 21:20:06
相同子网IP讨论:
IP 类型 评论内容 时间
129.204.79.44 attack
6379/tcp 6379/tcp 6379/tcp
[2020-08-22/28]3pkt
2020-08-29 15:56:25
129.204.74.158 attackspambots
2020-08-05T06:53:15.271547snf-827550 sshd[22780]: Failed password for root from 129.204.74.158 port 33848 ssh2
2020-08-05T06:57:09.400796snf-827550 sshd[23412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.74.158  user=root
2020-08-05T06:57:11.137550snf-827550 sshd[23412]: Failed password for root from 129.204.74.158 port 46886 ssh2
...
2020-08-05 12:02:11
129.204.78.234 attack
Aug  2 09:14:14 ip-172-31-61-156 sshd[21658]: Failed password for root from 129.204.78.234 port 35016 ssh2
Aug  2 09:18:41 ip-172-31-61-156 sshd[22568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.78.234  user=root
Aug  2 09:18:43 ip-172-31-61-156 sshd[22568]: Failed password for root from 129.204.78.234 port 59528 ssh2
Aug  2 09:18:41 ip-172-31-61-156 sshd[22568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.78.234  user=root
Aug  2 09:18:43 ip-172-31-61-156 sshd[22568]: Failed password for root from 129.204.78.234 port 59528 ssh2
...
2020-08-02 18:43:05
129.204.74.158 attackbots
sshd
2020-08-02 02:01:24
129.204.74.158 attackbots
Jul 30 10:40:22 dhoomketu sshd[2021689]: Invalid user jingyu from 129.204.74.158 port 57050
Jul 30 10:40:22 dhoomketu sshd[2021689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.74.158 
Jul 30 10:40:22 dhoomketu sshd[2021689]: Invalid user jingyu from 129.204.74.158 port 57050
Jul 30 10:40:23 dhoomketu sshd[2021689]: Failed password for invalid user jingyu from 129.204.74.158 port 57050 ssh2
Jul 30 10:44:47 dhoomketu sshd[2021732]: Invalid user kunyu from 129.204.74.158 port 46444
...
2020-07-30 13:23:12
129.204.78.234 attack
Jul 28 00:41:52 cumulus sshd[23976]: Invalid user cdonahue from 129.204.78.234 port 41492
Jul 28 00:41:52 cumulus sshd[23976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.78.234
Jul 28 00:41:54 cumulus sshd[23976]: Failed password for invalid user cdonahue from 129.204.78.234 port 41492 ssh2
Jul 28 00:41:54 cumulus sshd[23976]: Received disconnect from 129.204.78.234 port 41492:11: Bye Bye [preauth]
Jul 28 00:41:54 cumulus sshd[23976]: Disconnected from 129.204.78.234 port 41492 [preauth]
Jul 28 01:05:52 cumulus sshd[26047]: Invalid user scp from 129.204.78.234 port 59554
Jul 28 01:05:52 cumulus sshd[26047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.78.234
Jul 28 01:05:54 cumulus sshd[26047]: Failed password for invalid user scp from 129.204.78.234 port 59554 ssh2
Jul 28 01:05:55 cumulus sshd[26047]: Received disconnect from 129.204.78.234 port 59554:11: Bye Bye [pr........
-------------------------------
2020-07-30 07:41:16
129.204.74.158 attack
$f2bV_matches
2020-07-26 04:03:34
129.204.75.107 attackbots
Jul  8 02:30:25 vps639187 sshd\[22396\]: Invalid user d from 129.204.75.107 port 60958
Jul  8 02:30:25 vps639187 sshd\[22396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.75.107
Jul  8 02:30:27 vps639187 sshd\[22396\]: Failed password for invalid user d from 129.204.75.107 port 60958 ssh2
...
2020-07-08 08:40:53
129.204.77.124 attack
Lines containing failures of 129.204.77.124
Jul  6 05:15:45 kmh-mb-001 sshd[18062]: Invalid user admin from 129.204.77.124 port 43532
Jul  6 05:15:45 kmh-mb-001 sshd[18062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.124 
Jul  6 05:15:47 kmh-mb-001 sshd[18062]: Failed password for invalid user admin from 129.204.77.124 port 43532 ssh2
Jul  6 05:15:49 kmh-mb-001 sshd[18062]: Received disconnect from 129.204.77.124 port 43532:11: Bye Bye [preauth]
Jul  6 05:15:49 kmh-mb-001 sshd[18062]: Disconnected from invalid user admin 129.204.77.124 port 43532 [preauth]
Jul  6 05:31:05 kmh-mb-001 sshd[18543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.124  user=r.r
Jul  6 05:31:06 kmh-mb-001 sshd[18543]: Failed password for r.r from 129.204.77.124 port 42504 ssh2
Jul  6 05:31:07 kmh-mb-001 sshd[18543]: Received disconnect from 129.204.77.124 port 42504:11: Bye Bye [preauth]
........
------------------------------
2020-07-06 15:13:07
129.204.74.158 attack
Jul  3 14:03:48 dignus sshd[7534]: Failed password for invalid user kjj from 129.204.74.158 port 38984 ssh2
Jul  3 14:08:28 dignus sshd[8018]: Invalid user zf from 129.204.74.158 port 37876
Jul  3 14:08:28 dignus sshd[8018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.74.158
Jul  3 14:08:30 dignus sshd[8018]: Failed password for invalid user zf from 129.204.74.158 port 37876 ssh2
Jul  3 14:13:09 dignus sshd[8499]: Invalid user style from 129.204.74.158 port 36766
...
2020-07-04 05:42:22
129.204.74.158 attack
2020-06-30T16:24:36.002476sd-86998 sshd[38345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.74.158  user=root
2020-06-30T16:24:38.265886sd-86998 sshd[38345]: Failed password for root from 129.204.74.158 port 44334 ssh2
2020-06-30T16:27:17.388663sd-86998 sshd[38703]: Invalid user server01 from 129.204.74.158 port 46238
2020-06-30T16:27:17.391075sd-86998 sshd[38703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.74.158
2020-06-30T16:27:17.388663sd-86998 sshd[38703]: Invalid user server01 from 129.204.74.158 port 46238
2020-06-30T16:27:19.092018sd-86998 sshd[38703]: Failed password for invalid user server01 from 129.204.74.158 port 46238 ssh2
...
2020-06-30 23:09:18
129.204.77.124 attack
2020-06-17T17:53:30.373857abusebot-3.cloudsearch.cf sshd[10978]: Invalid user admin from 129.204.77.124 port 39262
2020-06-17T17:53:30.381361abusebot-3.cloudsearch.cf sshd[10978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.124
2020-06-17T17:53:30.373857abusebot-3.cloudsearch.cf sshd[10978]: Invalid user admin from 129.204.77.124 port 39262
2020-06-17T17:53:32.549578abusebot-3.cloudsearch.cf sshd[10978]: Failed password for invalid user admin from 129.204.77.124 port 39262 ssh2
2020-06-17T17:58:28.759173abusebot-3.cloudsearch.cf sshd[11258]: Invalid user tommy from 129.204.77.124 port 33026
2020-06-17T17:58:28.769720abusebot-3.cloudsearch.cf sshd[11258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.124
2020-06-17T17:58:28.759173abusebot-3.cloudsearch.cf sshd[11258]: Invalid user tommy from 129.204.77.124 port 33026
2020-06-17T17:58:30.180340abusebot-3.cloudsearch.cf sshd[11258]:
...
2020-06-18 02:13:37
129.204.77.124 attackbotsspam
Jun 15 22:41:13 vmd17057 sshd[1130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.124 
Jun 15 22:41:15 vmd17057 sshd[1130]: Failed password for invalid user wangzhe from 129.204.77.124 port 36988 ssh2
...
2020-06-16 08:11:16
129.204.75.107 attackspam
Failed password for invalid user rqh from 129.204.75.107 port 42130 ssh2
2020-06-15 08:05:39
129.204.77.124 attackspambots
Jun 12 07:16:43 srv-ubuntu-dev3 sshd[78046]: Invalid user zc from 129.204.77.124
Jun 12 07:16:43 srv-ubuntu-dev3 sshd[78046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.124
Jun 12 07:16:43 srv-ubuntu-dev3 sshd[78046]: Invalid user zc from 129.204.77.124
Jun 12 07:16:46 srv-ubuntu-dev3 sshd[78046]: Failed password for invalid user zc from 129.204.77.124 port 51356 ssh2
Jun 12 07:20:50 srv-ubuntu-dev3 sshd[78631]: Invalid user eby from 129.204.77.124
Jun 12 07:20:50 srv-ubuntu-dev3 sshd[78631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.124
Jun 12 07:20:50 srv-ubuntu-dev3 sshd[78631]: Invalid user eby from 129.204.77.124
Jun 12 07:20:51 srv-ubuntu-dev3 sshd[78631]: Failed password for invalid user eby from 129.204.77.124 port 39800 ssh2
Jun 12 07:24:49 srv-ubuntu-dev3 sshd[79294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77
...
2020-06-12 17:27:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.204.7.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10745
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.204.7.21.			IN	A

;; AUTHORITY SECTION:
.			246	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061500 1800 900 604800 86400

;; Query time: 141 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 15 21:19:59 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
Host 21.7.204.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.7.204.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.134.104.173 attackspambots
Unauthorized connection attempt from IP address 183.134.104.173 on Port 3306(MYSQL)
2019-12-28 00:43:32
122.117.219.228 attackspam
SIP/5060 Probe, BF, Hack -
2019-12-28 00:51:47
181.123.177.204 attackbotsspam
Dec 27 11:07:12 ny01 sshd[4064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.177.204
Dec 27 11:07:13 ny01 sshd[4064]: Failed password for invalid user bilzer from 181.123.177.204 port 49706 ssh2
Dec 27 11:13:08 ny01 sshd[4562]: Failed password for root from 181.123.177.204 port 55618 ssh2
2019-12-28 00:56:51
121.27.44.109 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 01:20:08
112.118.189.7 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 01:03:58
100.1.248.44 attackbotsspam
tcp 9000
2019-12-28 01:21:09
221.195.46.100 attack
3389BruteforceFW23
2019-12-28 01:19:17
187.167.69.151 attack
Automatic report - Port Scan Attack
2019-12-28 00:42:14
93.39.116.254 attackbotsspam
Dec 27 12:42:31 ws12vmsma01 sshd[12356]: Failed password for invalid user fairless from 93.39.116.254 port 47413 ssh2
Dec 27 12:50:49 ws12vmsma01 sshd[13601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-39-116-254.ip75.fastwebnet.it  user=uucp
Dec 27 12:50:51 ws12vmsma01 sshd[13601]: Failed password for uucp from 93.39.116.254 port 45378 ssh2
...
2019-12-28 00:53:34
51.254.37.192 attackbotsspam
Dec 27 17:11:17 dev0-dcde-rnet sshd[30826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192
Dec 27 17:11:19 dev0-dcde-rnet sshd[30826]: Failed password for invalid user oracle1 from 51.254.37.192 port 56942 ssh2
Dec 27 17:21:48 dev0-dcde-rnet sshd[30865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.37.192
2019-12-28 00:46:54
78.128.112.114 attackspam
12/27/2019-11:12:43.824302 78.128.112.114 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-28 00:55:50
41.78.83.32 attackspambots
Dec 26 18:14:11 server sshd\[9664\]: Failed password for invalid user ardent from 41.78.83.32 port 50252 ssh2
Dec 27 17:29:48 server sshd\[9460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.83.32  user=root
Dec 27 17:29:50 server sshd\[9460\]: Failed password for root from 41.78.83.32 port 60974 ssh2
Dec 27 17:50:38 server sshd\[15521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.83.32  user=mail
Dec 27 17:50:39 server sshd\[15521\]: Failed password for mail from 41.78.83.32 port 57964 ssh2
...
2019-12-28 01:13:08
153.37.97.183 attackspam
Dec 27 13:52:47 vps46666688 sshd[3451]: Failed password for root from 153.37.97.183 port 60465 ssh2
...
2019-12-28 01:05:19
178.62.79.227 attack
$f2bV_matches
2019-12-28 00:58:27
218.89.241.68 attackspambots
Dec 27 15:50:46 51-15-180-239 sshd[27807]: Invalid user command from 218.89.241.68 port 48165
...
2019-12-28 01:04:51

最近上报的IP列表

68.71.131.5 5.183.92.128 192.3.1.22 187.115.5.235
106.54.127.61 27.22.9.173 209.107.210.172 161.189.144.43
103.145.12.170 183.136.132.14 139.215.208.125 116.110.220.55
222.87.198.95 183.195.35.170 159.137.109.98 20.105.49.238
112.65.182.86 209.107.210.218 85.234.189.79 42.233.249.64