必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
129.205.136.30 attack
unauthorized connection attempt
2020-02-04 17:35:02
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.205.136.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61128
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.205.136.119.		IN	A

;; AUTHORITY SECTION:
.			543	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:45:58 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
119.136.205.129.in-addr.arpa domain name pointer 129-205-136-119.dynamic.macrolan.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
119.136.205.129.in-addr.arpa	name = 129-205-136-119.dynamic.macrolan.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
3.22.233.130 attackbotsspam
Jun 25 15:23:18 hosting sshd[15086]: Invalid user ts3 from 3.22.233.130 port 40524
Jun 25 15:23:18 hosting sshd[15086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-22-233-130.us-east-2.compute.amazonaws.com
Jun 25 15:23:18 hosting sshd[15086]: Invalid user ts3 from 3.22.233.130 port 40524
Jun 25 15:23:20 hosting sshd[15086]: Failed password for invalid user ts3 from 3.22.233.130 port 40524 ssh2
...
2020-06-26 02:06:56
49.135.36.219 attack
Invalid user wuyan from 49.135.36.219 port 46678
2020-06-26 02:03:45
123.207.175.111 attackspam
2020-06-25T12:22:26.650442mail.csmailer.org sshd[31464]: Invalid user teddy from 123.207.175.111 port 39592
2020-06-25T12:22:26.655635mail.csmailer.org sshd[31464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.175.111
2020-06-25T12:22:26.650442mail.csmailer.org sshd[31464]: Invalid user teddy from 123.207.175.111 port 39592
2020-06-25T12:22:28.565820mail.csmailer.org sshd[31464]: Failed password for invalid user teddy from 123.207.175.111 port 39592 ssh2
2020-06-25T12:25:41.791553mail.csmailer.org sshd[32214]: Invalid user lux from 123.207.175.111 port 49320
...
2020-06-26 01:54:20
49.207.193.249 attack
Port probing on unauthorized port 445
2020-06-26 02:06:09
220.127.148.8 attack
2020-06-25T17:36:26.446227server.espacesoutien.com sshd[7232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.127.148.8  user=root
2020-06-25T17:36:28.756518server.espacesoutien.com sshd[7232]: Failed password for root from 220.127.148.8 port 50067 ssh2
2020-06-25T17:39:58.830204server.espacesoutien.com sshd[7392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.127.148.8  user=root
2020-06-25T17:40:00.914150server.espacesoutien.com sshd[7392]: Failed password for root from 220.127.148.8 port 50162 ssh2
...
2020-06-26 01:53:33
51.75.83.77 attack
Jun 25 18:33:44 master sshd[18846]: Failed password for invalid user oracle from 51.75.83.77 port 47050 ssh2
2020-06-26 01:36:32
128.199.193.106 attackbotsspam
128.199.193.106 - - [25/Jun/2020:13:23:31 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.193.106 - - [25/Jun/2020:13:23:39 +0100] "POST /wp-login.php HTTP/1.1" 200 1860 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.193.106 - - [25/Jun/2020:13:23:40 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-26 01:42:15
111.72.194.151 attackspam
Jun 25 14:18:53 srv01 postfix/smtpd\[8841\]: warning: unknown\[111.72.194.151\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 25 14:22:37 srv01 postfix/smtpd\[14602\]: warning: unknown\[111.72.194.151\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 25 14:22:49 srv01 postfix/smtpd\[14602\]: warning: unknown\[111.72.194.151\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 25 14:23:06 srv01 postfix/smtpd\[14602\]: warning: unknown\[111.72.194.151\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 25 14:23:25 srv01 postfix/smtpd\[14602\]: warning: unknown\[111.72.194.151\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-26 02:00:31
192.241.237.155 attackbots
192.241.237.155 - - \[25/Jun/2020:14:23:29 +0200\] "GET / HTTP/1.1" 502 166 "-" "Mozilla/5.0 zgrab/0.x"
...
2020-06-26 01:52:16
109.167.231.99 attackbots
Failed password for invalid user hardware from 109.167.231.99 port 25195 ssh2
2020-06-26 01:48:45
64.225.25.59 attackbotsspam
Brute-force attempt banned
2020-06-26 02:03:13
95.85.38.127 attackspam
$f2bV_matches
2020-06-26 01:49:39
148.244.143.30 attackspambots
Invalid user test from 148.244.143.30 port 42058
2020-06-26 01:43:49
222.186.180.130 attackspambots
Jun 25 18:39:12 rocket sshd[23290]: Failed password for root from 222.186.180.130 port 21151 ssh2
Jun 25 18:39:14 rocket sshd[23290]: Failed password for root from 222.186.180.130 port 21151 ssh2
Jun 25 18:39:16 rocket sshd[23290]: Failed password for root from 222.186.180.130 port 21151 ssh2
...
2020-06-26 01:45:10
40.113.100.22 attack
Jun 25 12:32:16 mailman sshd[2778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.113.100.22  user=root
Jun 25 12:32:18 mailman sshd[2778]: Failed password for root from 40.113.100.22 port 1600 ssh2
Jun 25 13:03:41 mailman sshd[3544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.113.100.22  user=root
2020-06-26 02:06:36

最近上报的IP列表

129.205.136.146 129.205.136.150 129.205.136.139 129.205.136.121
129.205.136.148 129.205.136.122 129.205.136.140 129.205.136.15
129.205.136.12 118.170.147.79 129.205.136.153 118.170.147.81
129.205.136.154 129.205.136.156 129.205.136.160 129.205.136.182
129.205.136.177 129.205.136.158 129.205.136.168 129.205.136.170