必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.21.133.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.21.133.111.			IN	A

;; AUTHORITY SECTION:
.			103	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:48:29 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 111.133.21.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.133.21.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
34.214.138.245 attackspambots
Nov  3 06:53:55 icinga sshd[8193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.214.138.245
Nov  3 06:53:57 icinga sshd[8193]: Failed password for invalid user ranger from 34.214.138.245 port 58056 ssh2
...
2019-11-03 15:36:32
106.13.60.155 attack
Nov  3 04:05:50 server sshd\[18150\]: Failed password for root from 106.13.60.155 port 33046 ssh2
Nov  3 10:10:29 server sshd\[17911\]: Invalid user webmail from 106.13.60.155
Nov  3 10:10:29 server sshd\[17911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.155 
Nov  3 10:10:31 server sshd\[17911\]: Failed password for invalid user webmail from 106.13.60.155 port 46704 ssh2
Nov  3 10:18:32 server sshd\[19621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.155  user=root
...
2019-11-03 15:48:40
218.69.91.84 attackbots
Repeated brute force against a port
2019-11-03 15:42:01
197.248.16.118 attackbotsspam
Invalid user raspberry from 197.248.16.118 port 47750
2019-11-03 15:31:35
92.118.161.13 attack
16010/tcp 3000/tcp 5061/tcp...
[2019-10-30/11-02]4pkt,4pt.(tcp)
2019-11-03 15:49:25
190.181.190.30 attack
Unauthorized IMAP connection attempt
2019-11-03 15:23:44
198.108.66.218 attackspam
6379/tcp 161/udp 102/tcp...
[2019-09-03/11-03]13pkt,10pt.(tcp),1pt.(udp)
2019-11-03 15:49:00
222.186.42.4 attackspambots
2019-11-03T07:17:09.610204abusebot-8.cloudsearch.cf sshd\[11075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
2019-11-03 15:22:21
60.173.35.240 attack
Nov  3 01:40:00 eola postfix/smtpd[27967]: connect from unknown[60.173.35.240]
Nov  3 01:40:00 eola postfix/smtpd[27967]: NOQUEUE: reject: RCPT from unknown[60.173.35.240]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Nov  3 01:40:01 eola postfix/smtpd[27967]: disconnect from unknown[60.173.35.240] ehlo=1 mail=1 rcpt=0/1 quhostname=1 commands=3/4
Nov  3 01:40:01 eola postfix/smtpd[27967]: connect from unknown[60.173.35.240]
Nov  3 01:40:03 eola postfix/smtpd[27967]: lost connection after AUTH from unknown[60.173.35.240]
Nov  3 01:40:03 eola postfix/smtpd[27967]: disconnect from unknown[60.173.35.240] ehlo=1 auth=0/1 commands=1/2
Nov  3 01:40:03 eola postfix/smtpd[27967]: connect from unknown[60.173.35.240]
Nov  3 01:40:04 eola postfix/smtpd[27967]: lost connection after AUTH from unknown[60.173.35.240]
Nov  3 01:40:04 eola postfix/smtpd[27967]: disconnect from unknown[60.173.35.240] ehlo=1 auth=0/1 commands=1/2
Nov  3 01........
-------------------------------
2019-11-03 15:21:41
49.88.112.112 attack
Nov  3 05:52:41 ip-172-31-1-72 sshd\[18884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112  user=root
Nov  3 05:52:43 ip-172-31-1-72 sshd\[18884\]: Failed password for root from 49.88.112.112 port 15296 ssh2
Nov  3 05:53:34 ip-172-31-1-72 sshd\[19139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112  user=root
Nov  3 05:53:36 ip-172-31-1-72 sshd\[19139\]: Failed password for root from 49.88.112.112 port 51011 ssh2
Nov  3 05:53:59 ip-172-31-1-72 sshd\[19285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112  user=root
2019-11-03 15:31:04
60.181.66.54 attack
2× attempts to log on to WP. However, we do not use WP. Last visit 2019-11-02 01:24:24
2019-11-03 15:43:49
129.204.123.216 attackspam
Nov  3 05:48:11 localhost sshd[14719]: Failed password for root from 129.204.123.216 port 55388 ssh2
Nov  3 05:52:53 localhost sshd[14925]: Invalid user teresawinkymak from 129.204.123.216 port 36240
Nov  3 05:52:53 localhost sshd[14925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.123.216 
Nov  3 05:52:53 localhost sshd[14925]: Invalid user teresawinkymak from 129.204.123.216 port 36240
Nov  3 05:52:55 localhost sshd[14925]: Failed password for invalid user teresawinkymak from 129.204.123.216 port 36240 ssh2
2019-11-03 15:38:22
95.24.3.159 attackbots
Chat Spam
2019-11-03 15:55:53
202.225.165.26 attackbotsspam
6× attempts to log on to WP. However, we do not use WP. Last visit 2019-11-02 23:43:33
2019-11-03 15:42:19
83.7.55.225 attackspambots
6× attempts to log on to WP. However, we do not use WP. Last visit 2019-11-02 20:23:07
2019-11-03 15:43:30

最近上报的IP列表

118.171.162.125 129.21.132.44 129.21.125.94 129.21.105.46
129.21.117.212 129.21.106.19 129.21.105.65 129.21.126.207
129.21.132.176 129.21.121.125 129.21.132.204 118.171.165.151
129.21.116.162 129.21.135.156 129.21.156.25 129.21.158.30
129.21.143.76 129.21.171.47 129.21.146.20 129.21.146.253