必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): Tencent Cloud Computing (Beijing) Co. Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspambots
Jun 17 18:29:39 srv sshd[22374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
2020-06-18 00:32:54
attack
Jun  9 13:26:35 localhost sshd[53949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6  user=root
Jun  9 13:26:37 localhost sshd[53949]: Failed password for root from 129.211.55.6 port 54728 ssh2
Jun  9 13:32:01 localhost sshd[54430]: Invalid user mjkang from 129.211.55.6 port 57610
Jun  9 13:32:01 localhost sshd[54430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
Jun  9 13:32:01 localhost sshd[54430]: Invalid user mjkang from 129.211.55.6 port 57610
Jun  9 13:32:03 localhost sshd[54430]: Failed password for invalid user mjkang from 129.211.55.6 port 57610 ssh2
...
2020-06-09 21:52:49
attack
Invalid user mv from 129.211.55.6 port 39540
2020-05-30 12:23:08
attack
May 26 17:51:27 icinga sshd[28795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6 
May 26 17:51:30 icinga sshd[28795]: Failed password for invalid user hadoop from 129.211.55.6 port 60594 ssh2
May 26 18:04:04 icinga sshd[48560]: Failed password for root from 129.211.55.6 port 38580 ssh2
...
2020-05-27 00:56:55
attackbots
May 25 06:14:36 web1 sshd[16964]: Invalid user neriishi from 129.211.55.6 port 60360
May 25 06:14:36 web1 sshd[16964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
May 25 06:14:36 web1 sshd[16964]: Invalid user neriishi from 129.211.55.6 port 60360
May 25 06:14:38 web1 sshd[16964]: Failed password for invalid user neriishi from 129.211.55.6 port 60360 ssh2
May 25 06:26:20 web1 sshd[20156]: Invalid user usuario from 129.211.55.6 port 55972
May 25 06:26:20 web1 sshd[20156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
May 25 06:26:20 web1 sshd[20156]: Invalid user usuario from 129.211.55.6 port 55972
May 25 06:26:22 web1 sshd[20156]: Failed password for invalid user usuario from 129.211.55.6 port 55972 ssh2
May 25 06:31:59 web1 sshd[21554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6  user=root
May 25 06:32:01 web1 sshd[2
...
2020-05-25 04:54:04
attackspambots
Observed on multiple hosts.
2020-05-05 10:44:12
attack
Apr 28 15:33:30 PorscheCustomer sshd[15511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
Apr 28 15:33:32 PorscheCustomer sshd[15511]: Failed password for invalid user terry from 129.211.55.6 port 46516 ssh2
Apr 28 15:36:39 PorscheCustomer sshd[15704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
...
2020-04-28 22:30:50
attack
$f2bV_matches
2020-04-20 13:30:01
attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-04-13 16:26:47
attack
Apr  5 12:31:10 dev0-dcde-rnet sshd[1423]: Failed password for root from 129.211.55.6 port 59980 ssh2
Apr  5 12:35:29 dev0-dcde-rnet sshd[1447]: Failed password for root from 129.211.55.6 port 52648 ssh2
2020-04-05 20:32:01
attack
Apr  4 11:28:35 minden010 sshd[11475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
Apr  4 11:28:37 minden010 sshd[11475]: Failed password for invalid user caizekun from 129.211.55.6 port 56950 ssh2
Apr  4 11:34:54 minden010 sshd[14532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
...
2020-04-04 19:38:21
attackbots
Mar 29 09:44:47 ws19vmsma01 sshd[106542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
Mar 29 09:44:49 ws19vmsma01 sshd[106542]: Failed password for invalid user dgm from 129.211.55.6 port 52466 ssh2
...
2020-03-30 02:01:53
attackbotsspam
$f2bV_matches
2020-03-29 10:03:36
attackspambots
Mar 28 17:54:18 legacy sshd[319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
Mar 28 17:54:20 legacy sshd[319]: Failed password for invalid user ybe from 129.211.55.6 port 34018 ssh2
Mar 28 17:59:12 legacy sshd[480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.6
...
2020-03-29 01:05:35
attackspambots
(sshd) Failed SSH login from 129.211.55.6 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 25 09:56:34 amsweb01 sshd[19645]: Invalid user shanna from 129.211.55.6 port 37426
Mar 25 09:56:35 amsweb01 sshd[19645]: Failed password for invalid user shanna from 129.211.55.6 port 37426 ssh2
Mar 25 10:02:26 amsweb01 sshd[20461]: Invalid user postgres from 129.211.55.6 port 56700
Mar 25 10:02:28 amsweb01 sshd[20461]: Failed password for invalid user postgres from 129.211.55.6 port 56700 ssh2
Mar 25 10:08:05 amsweb01 sshd[21355]: Invalid user zq from 129.211.55.6 port 39832
2020-03-25 17:21:51
attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-02-16 18:16:30
attackspam
Feb  8 10:54:27 plusreed sshd[9916]: Invalid user smm from 129.211.55.6
...
2020-02-09 02:11:11
相同子网IP讨论:
IP 类型 评论内容 时间
129.211.55.22 attack
Jul 22 13:28:53 dignus sshd[25452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
Jul 22 13:28:55 dignus sshd[25452]: Failed password for invalid user nelson from 129.211.55.22 port 55362 ssh2
Jul 22 13:35:36 dignus sshd[26351]: Invalid user sshvpn from 129.211.55.22 port 43584
Jul 22 13:35:36 dignus sshd[26351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
Jul 22 13:35:38 dignus sshd[26351]: Failed password for invalid user sshvpn from 129.211.55.22 port 43584 ssh2
...
2020-07-23 04:49:58
129.211.55.22 attackspambots
Jul 20 05:50:04 h2779839 sshd[11125]: Invalid user admin from 129.211.55.22 port 45274
Jul 20 05:50:04 h2779839 sshd[11125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
Jul 20 05:50:04 h2779839 sshd[11125]: Invalid user admin from 129.211.55.22 port 45274
Jul 20 05:50:07 h2779839 sshd[11125]: Failed password for invalid user admin from 129.211.55.22 port 45274 ssh2
Jul 20 05:53:53 h2779839 sshd[12679]: Invalid user zxx from 129.211.55.22 port 56264
Jul 20 05:53:53 h2779839 sshd[12679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
Jul 20 05:53:53 h2779839 sshd[12679]: Invalid user zxx from 129.211.55.22 port 56264
Jul 20 05:53:55 h2779839 sshd[12679]: Failed password for invalid user zxx from 129.211.55.22 port 56264 ssh2
Jul 20 05:55:08 h2779839 sshd[12828]: Invalid user dekait from 129.211.55.22 port 41328
...
2020-07-20 14:25:58
129.211.55.22 attack
SSH brute force
2020-07-08 09:37:40
129.211.55.22 attack
2020-06-24T03:25:07.571936billing sshd[7465]: Failed password for invalid user cacti from 129.211.55.22 port 59016 ssh2
2020-06-24T03:32:50.749825billing sshd[24598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22  user=root
2020-06-24T03:32:52.295782billing sshd[24598]: Failed password for root from 129.211.55.22 port 57948 ssh2
...
2020-06-24 06:48:19
129.211.55.22 attack
Jun 13 06:24:00 dignus sshd[11402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22  user=root
Jun 13 06:24:02 dignus sshd[11402]: Failed password for root from 129.211.55.22 port 37314 ssh2
Jun 13 06:29:07 dignus sshd[11852]: Invalid user ts3bot1 from 129.211.55.22 port 34474
Jun 13 06:29:07 dignus sshd[11852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
Jun 13 06:29:09 dignus sshd[11852]: Failed password for invalid user ts3bot1 from 129.211.55.22 port 34474 ssh2
...
2020-06-13 21:33:24
129.211.55.22 attackbots
Jun  9 19:10:30 itv-usvr-01 sshd[485]: Invalid user ekologia from 129.211.55.22
Jun  9 19:10:30 itv-usvr-01 sshd[485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
Jun  9 19:10:30 itv-usvr-01 sshd[485]: Invalid user ekologia from 129.211.55.22
Jun  9 19:10:32 itv-usvr-01 sshd[485]: Failed password for invalid user ekologia from 129.211.55.22 port 41942 ssh2
Jun  9 19:17:30 itv-usvr-01 sshd[813]: Invalid user cuisine from 129.211.55.22
2020-06-09 21:06:43
129.211.55.22 attackspam
$f2bV_matches
2020-06-04 02:13:43
129.211.55.22 attackspambots
May 28 14:42:13 vps sshd[1027481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22  user=root
May 28 14:42:16 vps sshd[1027481]: Failed password for root from 129.211.55.22 port 39276 ssh2
May 28 14:48:09 vps sshd[4279]: Invalid user qwert from 129.211.55.22 port 45696
May 28 14:48:09 vps sshd[4279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
May 28 14:48:11 vps sshd[4279]: Failed password for invalid user qwert from 129.211.55.22 port 45696 ssh2
...
2020-05-29 00:14:17
129.211.55.22 attackbots
May 25 06:07:17 vps sshd[753365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
May 25 06:07:19 vps sshd[753365]: Failed password for invalid user webadmin from 129.211.55.22 port 60366 ssh2
May 25 06:12:52 vps sshd[781210]: Invalid user william from 129.211.55.22 port 37204
May 25 06:12:52 vps sshd[781210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
May 25 06:12:54 vps sshd[781210]: Failed password for invalid user william from 129.211.55.22 port 37204 ssh2
...
2020-05-25 16:13:12
129.211.55.22 attackbots
Invalid user bpp from 129.211.55.22 port 41414
2020-05-24 06:43:24
129.211.55.22 attackspambots
May 22 20:50:01 home sshd[27425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
May 22 20:50:03 home sshd[27425]: Failed password for invalid user nkb from 129.211.55.22 port 55342 ssh2
May 22 20:51:28 home sshd[27648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
...
2020-05-23 03:16:29
129.211.55.22 attackbotsspam
$f2bV_matches
2020-05-22 07:16:40
129.211.55.22 attackspam
May 19 11:49:59 ns37 sshd[22449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
May 19 11:49:59 ns37 sshd[22449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.55.22
2020-05-20 01:10:17
129.211.55.22 attackspam
Invalid user scarab from 129.211.55.22 port 45788
2020-05-12 06:56:58
129.211.55.124 attackbotsspam
SSH bruteforce
2020-04-21 05:16:31
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.211.55.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.211.55.6.			IN	A

;; AUTHORITY SECTION:
.			240	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020800 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 02:11:06 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
Host 6.55.211.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.55.211.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.32.129.115 attackspambots
Nov  6 23:18:31 ovpn sshd\[30962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.129.115  user=root
Nov  6 23:18:33 ovpn sshd\[30962\]: Failed password for root from 178.32.129.115 port 54668 ssh2
Nov  6 23:36:39 ovpn sshd\[2369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.129.115  user=root
Nov  6 23:36:40 ovpn sshd\[2369\]: Failed password for root from 178.32.129.115 port 49834 ssh2
Nov  6 23:40:09 ovpn sshd\[3151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.129.115  user=root
2019-11-07 09:07:31
45.80.64.246 attackbotsspam
5x Failed Password
2019-11-07 08:59:26
181.40.122.2 attackspambots
2019-11-06T23:13:28.399996abusebot-4.cloudsearch.cf sshd\[2411\]: Invalid user Losenord321 from 181.40.122.2 port 28726
2019-11-07 09:15:49
49.234.179.127 attackbotsspam
Nov  6 23:37:43 sd-53420 sshd\[2379\]: Invalid user msql from 49.234.179.127
Nov  6 23:37:43 sd-53420 sshd\[2379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.179.127
Nov  6 23:37:45 sd-53420 sshd\[2379\]: Failed password for invalid user msql from 49.234.179.127 port 54174 ssh2
Nov  6 23:41:02 sd-53420 sshd\[3383\]: Invalid user password123 from 49.234.179.127
Nov  6 23:41:02 sd-53420 sshd\[3383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.179.127
...
2019-11-07 08:47:11
220.130.190.13 attackbotsspam
Nov  7 01:06:49 www sshd\[19706\]: Invalid user hadoop from 220.130.190.13 port 28801
...
2019-11-07 08:40:17
157.245.223.181 attackspambots
From CCTV User Interface Log
...::ffff:157.245.223.181 - - [06/Nov/2019:17:41:03 +0000] "-" 400 0
...
2019-11-07 08:47:38
167.71.187.187 attack
Nov  7 03:31:44 hosting sshd[26540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.187.187  user=root
Nov  7 03:31:46 hosting sshd[26540]: Failed password for root from 167.71.187.187 port 59364 ssh2
...
2019-11-07 09:06:18
211.114.176.34 attack
2019-11-06T23:41:55.145105abusebot-5.cloudsearch.cf sshd\[12537\]: Invalid user robert from 211.114.176.34 port 37798
2019-11-07 09:00:37
129.204.38.202 attack
Nov  7 04:57:30 thevastnessof sshd[15958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.38.202
...
2019-11-07 13:00:08
139.99.5.223 attackspam
2019-11-07T01:45:37.353071mail01 postfix/smtpd[28225]: warning: ip223.ip-139-99-5.net[139.99.5.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T01:46:25.332841mail01 postfix/smtpd[8569]: warning: ip223.ip-139-99-5.net[139.99.5.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T01:46:50.180077mail01 postfix/smtpd[28225]: warning: ip223.ip-139-99-5.net[139.99.5.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07 08:54:08
203.195.149.55 attackbotsspam
Triggered by Fail2Ban at Ares web server
2019-11-07 09:11:42
182.61.179.75 attackspam
Nov  7 11:53:23 itv-usvr-02 sshd[18956]: Invalid user support from 182.61.179.75 port 30888
Nov  7 11:53:23 itv-usvr-02 sshd[18956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75
Nov  7 11:53:23 itv-usvr-02 sshd[18956]: Invalid user support from 182.61.179.75 port 30888
Nov  7 11:53:25 itv-usvr-02 sshd[18956]: Failed password for invalid user support from 182.61.179.75 port 30888 ssh2
Nov  7 11:57:26 itv-usvr-02 sshd[18982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.179.75  user=root
Nov  7 11:57:29 itv-usvr-02 sshd[18982]: Failed password for root from 182.61.179.75 port 13769 ssh2
2019-11-07 13:01:35
45.95.33.228 attackspambots
Postfix DNSBL listed. Trying to send SPAM.
2019-11-07 09:05:56
121.142.111.106 attack
Nov  6 16:31:04 mockhub sshd[32203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.111.106
Nov  6 16:31:06 mockhub sshd[32203]: Failed password for invalid user helpdesk from 121.142.111.106 port 50136 ssh2
...
2019-11-07 09:01:55
50.193.109.165 attackbots
Automatic report - Banned IP Access
2019-11-07 09:04:16

最近上报的IP列表

103.215.202.177 195.154.220.67 49.235.12.159 89.208.210.11
54.37.157.88 39.22.176.10 69.26.159.176 203.114.211.199
183.62.170.245 102.132.252.65 45.95.33.153 142.4.212.119
14.47.184.146 89.248.168.157 14.243.103.190 182.48.80.68
125.124.174.127 84.92.113.168 192.241.239.30 27.129.244.26