必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): Seacom Western Cape (Pty) Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
unauthorized connection attempt
2020-02-04 17:35:02
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.205.136.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40681
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.205.136.30.			IN	A

;; AUTHORITY SECTION:
.			501	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020400 1800 900 604800 86400

;; Query time: 133 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 17:34:53 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
30.136.205.129.in-addr.arpa domain name pointer 129-205-136-30.dynamic.macrolan.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.136.205.129.in-addr.arpa	name = 129-205-136-30.dynamic.macrolan.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.39.208.66 attackspam
[Aegis] @ 2019-11-07 08:42:55  0000 -> SSH insecure connection attempt (scan).
2019-11-07 16:51:49
79.42.25.82 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/79.42.25.82/ 
 
 IT - 1H : (115)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IT 
 NAME ASN : ASN3269 
 
 IP : 79.42.25.82 
 
 CIDR : 79.42.0.0/15 
 
 PREFIX COUNT : 550 
 
 UNIQUE IP COUNT : 19507712 
 
 
 ATTACKS DETECTED ASN3269 :  
  1H - 4 
  3H - 12 
  6H - 22 
 12H - 38 
 24H - 73 
 
 DateTime : 2019-11-07 07:28:26 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-07 16:20:07
41.89.160.13 attackspambots
Nov  7 13:39:44 areeb-Workstation sshd[21471]: Failed password for root from 41.89.160.13 port 48146 ssh2
...
2019-11-07 16:30:02
46.101.151.51 attackbotsspam
Nov  6 22:08:41 tdfoods sshd\[6611\]: Invalid user passw0rd06 from 46.101.151.51
Nov  6 22:08:41 tdfoods sshd\[6611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.151.51
Nov  6 22:08:43 tdfoods sshd\[6611\]: Failed password for invalid user passw0rd06 from 46.101.151.51 port 33378 ssh2
Nov  6 22:12:22 tdfoods sshd\[7008\]: Invalid user dexmond from 46.101.151.51
Nov  6 22:12:22 tdfoods sshd\[7008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.151.51
2019-11-07 16:35:20
182.73.245.70 attackspam
Nov  7 09:31:13 dedicated sshd[8463]: Invalid user z from 182.73.245.70 port 41736
2019-11-07 16:45:50
132.232.33.161 attack
SSH Brute-Force reported by Fail2Ban
2019-11-07 16:46:58
115.77.114.226 attackbotsspam
invalid login attempt
2019-11-07 16:44:49
185.85.191.196 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-11-07 16:54:57
46.219.3.139 attackspam
Nov  7 09:06:44 sticky sshd\[819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.3.139  user=root
Nov  7 09:06:47 sticky sshd\[819\]: Failed password for root from 46.219.3.139 port 51376 ssh2
Nov  7 09:10:44 sticky sshd\[898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.3.139  user=root
Nov  7 09:10:46 sticky sshd\[898\]: Failed password for root from 46.219.3.139 port 32870 ssh2
Nov  7 09:14:44 sticky sshd\[952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.219.3.139  user=root
...
2019-11-07 17:01:24
88.174.4.30 attack
Nov  7 09:11:45 markkoudstaal sshd[3967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.174.4.30
Nov  7 09:11:45 markkoudstaal sshd[3968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.174.4.30
Nov  7 09:11:47 markkoudstaal sshd[3967]: Failed password for invalid user pi from 88.174.4.30 port 50116 ssh2
Nov  7 09:11:47 markkoudstaal sshd[3968]: Failed password for invalid user pi from 88.174.4.30 port 50118 ssh2
2019-11-07 16:58:03
185.88.196.30 attack
Automatic report - SSH Brute-Force Attack
2019-11-07 16:51:17
113.0.17.190 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/113.0.17.190/ 
 
 CN - 1H : (644)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 113.0.17.190 
 
 CIDR : 113.0.0.0/13 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 13 
  3H - 37 
  6H - 75 
 12H - 124 
 24H - 226 
 
 DateTime : 2019-11-07 07:27:55 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 16:40:01
177.221.197.194 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-07 16:46:09
37.120.146.38 attack
Nov  7 09:13:09 relay postfix/smtpd\[703\]: warning: unknown\[37.120.146.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  7 09:13:31 relay postfix/smtpd\[688\]: warning: unknown\[37.120.146.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  7 09:13:37 relay postfix/smtpd\[32627\]: warning: unknown\[37.120.146.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  7 09:13:47 relay postfix/smtpd\[32614\]: warning: unknown\[37.120.146.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  7 09:14:09 relay postfix/smtpd\[32614\]: warning: unknown\[37.120.146.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-07 16:21:30
92.222.34.211 attack
Nov  7 09:27:35 localhost sshd\[11587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.34.211  user=root
Nov  7 09:27:37 localhost sshd\[11587\]: Failed password for root from 92.222.34.211 port 54888 ssh2
Nov  7 09:31:38 localhost sshd\[11984\]: Invalid user zs from 92.222.34.211 port 37230
Nov  7 09:31:38 localhost sshd\[11984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.34.211
2019-11-07 16:48:15

最近上报的IP列表

159.135.16.173 112.246.168.202 36.110.139.45 22.70.163.74
200.111.243.19 199.152.109.17 206.189.140.215 243.246.11.20
81.23.49.239 72.115.123.182 85.99.246.150 82.146.43.93
66.96.237.91 62.171.135.227 122.106.232.141 1.2.129.252
86.141.29.227 101.210.132.14 195.254.12.57 223.155.34.76