必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.206.218.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.206.218.92.			IN	A

;; AUTHORITY SECTION:
.			187	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 07:16:30 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
92.218.206.129.in-addr.arpa domain name pointer z214aza-1.urz.uni-heidelberg.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
92.218.206.129.in-addr.arpa	name = z214aza-1.urz.uni-heidelberg.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.131.37.34 attackbots
2019-10-20T10:46:03.7879101495-001 sshd\[28582\]: Failed password for invalid user pecheurs from 104.131.37.34 port 55372 ssh2
2019-10-20T11:47:33.9768201495-001 sshd\[31059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=virgo.accion-sa.cl  user=root
2019-10-20T11:47:36.1702151495-001 sshd\[31059\]: Failed password for root from 104.131.37.34 port 54797 ssh2
2019-10-20T11:52:18.6212051495-001 sshd\[31237\]: Invalid user ubnt from 104.131.37.34 port 46057
2019-10-20T11:52:18.6241441495-001 sshd\[31237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=virgo.accion-sa.cl
2019-10-20T11:52:21.2780061495-001 sshd\[31237\]: Failed password for invalid user ubnt from 104.131.37.34 port 46057 ssh2
...
2019-10-21 01:00:07
66.240.205.34 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 61 - port: 1177 proto: TCP cat: Misc Attack
2019-10-21 01:03:07
185.40.14.59 attack
" "
2019-10-21 01:02:51
218.150.220.214 attackbots
Oct 20 13:44:02 XXX sshd[47236]: Invalid user ofsaa from 218.150.220.214 port 44862
2019-10-21 00:49:34
45.148.233.229 attackspam
45.148.233.229 - - [20/Oct/2019:08:00:03 -0400] "GET /?page=..%2f..%2f..%2fetc%2fpasswd%00&action=view&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 16398 "https://newportbrassfaucets.com/?page=..%2f..%2f..%2fetc%2fpasswd%00&action=view&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
...
2019-10-21 01:01:57
123.206.13.46 attackspambots
2019-10-20T12:00:07.913845abusebot-3.cloudsearch.cf sshd\[17481\]: Invalid user rtorrent from 123.206.13.46 port 47850
2019-10-21 00:59:31
159.89.91.20 attackspambots
port scan and connect, tcp 23 (telnet)
2019-10-21 00:09:40
145.102.6.57 attackspam
Port scan on 1 port(s): 53
2019-10-21 00:46:19
109.63.228.84 attackspambots
Unauthorized connection attempt from IP address 109.63.228.84 on Port 445(SMB)
2019-10-21 00:03:46
212.119.47.244 attack
212.119.47.244 - - [20/Oct/2019:08:00:52 -0400] "GET /?page=../../../../../../../etc/passwd%00&action=view&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 16396 "https://newportbrassfaucets.com/?page=../../../../../../../etc/passwd%00&action=view&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
...
2019-10-21 00:19:32
183.65.30.2 attackspam
" "
2019-10-21 00:41:31
58.221.204.114 attack
Oct 20 19:47:25 sauna sshd[92601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.204.114
Oct 20 19:47:27 sauna sshd[92601]: Failed password for invalid user Mark2017 from 58.221.204.114 port 51166 ssh2
...
2019-10-21 01:01:20
59.124.152.54 attackspambots
Unauthorized connection attempt from IP address 59.124.152.54 on Port 445(SMB)
2019-10-21 00:27:25
83.20.155.114 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/83.20.155.114/ 
 
 PL - 1H : (84)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 83.20.155.114 
 
 CIDR : 83.20.0.0/14 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 1 
  3H - 4 
  6H - 6 
 12H - 14 
 24H - 30 
 
 DateTime : 2019-10-20 14:00:12 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-21 01:01:01
106.12.215.130 attackspambots
Oct 20 12:54:30 venus sshd\[21242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.130  user=root
Oct 20 12:54:31 venus sshd\[21242\]: Failed password for root from 106.12.215.130 port 35300 ssh2
Oct 20 12:59:44 venus sshd\[21340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.130  user=root
...
2019-10-21 00:25:54

最近上报的IP列表

82.132.178.56 220.170.56.44 78.2.147.82 175.247.41.16
185.161.167.75 184.15.179.115 185.4.189.121 124.164.24.198
190.245.35.144 193.118.235.111 130.68.198.130 131.1.176.75
104.35.85.26 153.73.181.28 64.180.101.87 217.21.63.230
102.245.77.200 16.113.14.239 230.174.10.74 91.216.38.205