必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.241.155.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.241.155.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 15:13:33 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
85.155.241.129.in-addr.arpa domain name pointer nec-10-sh.iot.ntnu.no.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.155.241.129.in-addr.arpa	name = nec-10-sh.iot.ntnu.no.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.92.116 attackspam
Sep 19 10:07:08 ovpn sshd\[22634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.116  user=root
Sep 19 10:07:10 ovpn sshd\[22634\]: Failed password for root from 122.51.92.116 port 52822 ssh2
Sep 19 10:13:06 ovpn sshd\[24077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.116  user=root
Sep 19 10:13:08 ovpn sshd\[24077\]: Failed password for root from 122.51.92.116 port 39424 ssh2
Sep 19 10:15:49 ovpn sshd\[24787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.116  user=root
2020-09-19 17:20:27
35.234.104.185 attackbotsspam
Automatically reported by fail2ban report script (mx1)
2020-09-19 17:54:53
195.123.239.36 attackbotsspam
Sep 19 09:12:58 ns3033917 sshd[11624]: Failed password for invalid user sysadmin from 195.123.239.36 port 54438 ssh2
Sep 19 09:29:28 ns3033917 sshd[11773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.123.239.36  user=root
Sep 19 09:29:30 ns3033917 sshd[11773]: Failed password for root from 195.123.239.36 port 33458 ssh2
...
2020-09-19 17:43:41
128.14.137.180 attack
Unwanted checking 80 or 443 port
...
2020-09-19 17:38:09
188.0.120.53 attackbotsspam
Icarus honeypot on github
2020-09-19 17:51:21
104.244.75.153 attackbots
Sep 19 10:31:04 roki sshd[3005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.75.153  user=root
Sep 19 10:31:07 roki sshd[3005]: Failed password for root from 104.244.75.153 port 58574 ssh2
Sep 19 10:31:13 roki sshd[3005]: Failed password for root from 104.244.75.153 port 58574 ssh2
Sep 19 10:31:16 roki sshd[3005]: Failed password for root from 104.244.75.153 port 58574 ssh2
Sep 19 10:31:18 roki sshd[3005]: Failed password for root from 104.244.75.153 port 58574 ssh2
...
2020-09-19 17:45:56
103.82.24.89 attackspambots
2020-09-19T09:12:52.759204shield sshd\[17298\]: Invalid user ftpuser from 103.82.24.89 port 43780
2020-09-19T09:12:52.768036shield sshd\[17298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.82.24.89
2020-09-19T09:12:55.064203shield sshd\[17298\]: Failed password for invalid user ftpuser from 103.82.24.89 port 43780 ssh2
2020-09-19T09:17:28.187707shield sshd\[19542\]: Invalid user ts from 103.82.24.89 port 56400
2020-09-19T09:17:28.195287shield sshd\[19542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.82.24.89
2020-09-19 17:33:35
193.169.253.35 attackbots
[url=http://wrubel-jaroslaw-anwil.jaroslaw-wrobel.pl/]Jaroslaw;Wrobel[/url]
2020-09-19 17:34:36
1.214.245.27 attack
Found on   CINS-badguys    / proto=6  .  srcport=49788  .  dstport=4306  .     (372)
2020-09-19 17:49:56
203.230.6.175 attackbots
Sep 19 08:36:45 sip sshd[1654728]: Failed password for invalid user admin from 203.230.6.175 port 45962 ssh2
Sep 19 08:41:16 sip sshd[1654798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.230.6.175  user=root
Sep 19 08:41:18 sip sshd[1654798]: Failed password for root from 203.230.6.175 port 57418 ssh2
...
2020-09-19 17:26:02
142.93.193.63 attackspambots
142.93.193.63 - - [19/Sep/2020:07:59:14 +0000] "POST /wp-login.php HTTP/1.1" 200 2075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
142.93.193.63 - - [19/Sep/2020:07:59:16 +0000] "POST /wp-login.php HTTP/1.1" 200 2052 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
142.93.193.63 - - [19/Sep/2020:07:59:19 +0000] "POST /wp-login.php HTTP/1.1" 200 2049 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
142.93.193.63 - - [19/Sep/2020:07:59:21 +0000] "POST /wp-login.php HTTP/1.1" 200 2049 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
142.93.193.63 - - [19/Sep/2020:07:59:22 +0000] "POST /xmlrpc.php HTTP/1.1" 200 236 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-"
2020-09-19 17:44:54
23.96.3.40 attackspambots
100's of POST /xmlrpc.php HTTP/1.1
2020-09-19 17:49:26
157.230.100.192 attackspambots
Auto Fail2Ban report, multiple SSH login attempts.
2020-09-19 17:44:27
106.12.90.45 attackspam
Sep 18 19:57:19 localhost sshd[2384091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.90.45 
Sep 18 19:57:19 localhost sshd[2384091]: Invalid user alex from 106.12.90.45 port 57436
Sep 18 19:57:21 localhost sshd[2384091]: Failed password for invalid user alex from 106.12.90.45 port 57436 ssh2
Sep 18 20:01:41 localhost sshd[2393309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.90.45  user=root
Sep 18 20:01:43 localhost sshd[2393309]: Failed password for root from 106.12.90.45 port 35296 ssh2
...
2020-09-19 17:14:53
103.145.13.159 attackbots
Listed on    zen-spamhaus also abuseat.org   / proto=17  .  srcport=5061  .  dstport=5060  .     (2851)
2020-09-19 17:15:31

最近上报的IP列表

53.138.151.42 116.132.36.63 9.143.45.210 126.76.254.93
19.184.48.121 179.52.158.117 189.74.226.144 147.153.217.157
91.22.209.245 202.179.106.108 167.126.22.102 251.72.9.15
140.182.166.8 61.114.252.109 51.181.253.20 223.178.109.238
196.37.86.63 47.127.171.164 246.22.197.100 246.139.101.206