必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.50.34.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42032
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.50.34.196.			IN	A

;; AUTHORITY SECTION:
.			323	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 00:28:04 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 196.34.50.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.34.50.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.79.50.231 attackbotsspam
Invalid user ye from 61.79.50.231 port 49984
2020-04-02 19:32:31
188.234.148.165 attackbotsspam
[portscan] tcp/3389 [MS RDP]
[scan/connect: 3 time(s)]
*(RWIN=64800)(04021226)
2020-04-02 19:18:07
110.49.40.4 attack
Unauthorised access (Apr  2) SRC=110.49.40.4 LEN=52 TTL=113 ID=23069 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-02 19:34:44
23.236.148.54 attackbots
(From highranks4ursite@gmail.com) Hello! 

Are you interested in making your website more engaging, useful to users and profitable in the long term? I'm an online marketing specialist, and I specialize in SEO (search engine optimization). It's proven to be the most effective way to make people who are searching on major search engines like Google and Bing find your website faster and easier. This opens more sales opportunities while overshadowing your competitors, therefore will generate more sales. 

I can tell you more about this during a free consultation if you'd like. I make sure that all of my work is affordable and effective to all my clients. I also have an awesome portfolio of past works that you can take a look at. If you're interested, please reply to let me know so we can schedule a time for us to talk. I hope to speak with you soon!

Randall Rose
2020-04-02 19:12:15
194.26.29.110 attackspambots
Excessive Port-Scanning
2020-04-02 19:19:17
201.47.158.130 attack
2020-04-02T12:33:44.073457ns386461 sshd\[14133\]: Invalid user yy from 201.47.158.130 port 51334
2020-04-02T12:33:44.077972ns386461 sshd\[14133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.47.158.130
2020-04-02T12:33:45.885272ns386461 sshd\[14133\]: Failed password for invalid user yy from 201.47.158.130 port 51334 ssh2
2020-04-02T12:43:55.404462ns386461 sshd\[23863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.47.158.130  user=root
2020-04-02T12:43:57.426498ns386461 sshd\[23863\]: Failed password for root from 201.47.158.130 port 59646 ssh2
...
2020-04-02 19:13:05
220.190.13.30 attackspambots
CN China 30.13.190.220.broad.wz.zj.dynamic.163data.com.cn Failures: 20 ftpd
2020-04-02 19:15:49
14.204.145.125 attackbotsspam
2020-04-01 UTC: (2x) - nproc,root
2020-04-02 19:16:33
116.22.58.183 attackbots
CN China - Failures: 20 ftpd
2020-04-02 19:42:39
27.191.209.93 attack
Apr  2 08:06:06 server sshd\[19951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.191.209.93  user=root
Apr  2 08:06:09 server sshd\[19951\]: Failed password for root from 27.191.209.93 port 40149 ssh2
Apr  2 08:14:20 server sshd\[21628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.191.209.93  user=root
Apr  2 08:14:21 server sshd\[21628\]: Failed password for root from 27.191.209.93 port 60647 ssh2
Apr  2 08:19:47 server sshd\[22866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.191.209.93  user=root
...
2020-04-02 19:44:28
185.194.49.132 attackspam
Apr  2 01:20:36 php1 sshd\[4588\]: Invalid user sysadmin from 185.194.49.132
Apr  2 01:20:36 php1 sshd\[4588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.194.49.132
Apr  2 01:20:39 php1 sshd\[4588\]: Failed password for invalid user sysadmin from 185.194.49.132 port 36621 ssh2
Apr  2 01:24:00 php1 sshd\[5009\]: Invalid user test from 185.194.49.132
Apr  2 01:24:00 php1 sshd\[5009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.194.49.132
2020-04-02 19:36:54
31.41.255.34 attackspam
Apr  2 11:53:16 markkoudstaal sshd[11826]: Failed password for root from 31.41.255.34 port 51680 ssh2
Apr  2 11:57:33 markkoudstaal sshd[12427]: Failed password for root from 31.41.255.34 port 35374 ssh2
2020-04-02 19:23:00
180.250.247.45 attackbotsspam
Apr  2 15:24:41 itv-usvr-01 sshd[14189]: Invalid user lu from 180.250.247.45
Apr  2 15:24:41 itv-usvr-01 sshd[14189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45
Apr  2 15:24:41 itv-usvr-01 sshd[14189]: Invalid user lu from 180.250.247.45
Apr  2 15:24:43 itv-usvr-01 sshd[14189]: Failed password for invalid user lu from 180.250.247.45 port 33262 ssh2
Apr  2 15:32:38 itv-usvr-01 sshd[14515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.247.45  user=root
Apr  2 15:32:40 itv-usvr-01 sshd[14515]: Failed password for root from 180.250.247.45 port 41156 ssh2
2020-04-02 19:05:01
217.182.68.93 attackbotsspam
Invalid user es from 217.182.68.93 port 39118
2020-04-02 19:45:06
138.197.220.231 attackbotsspam
Automatic report - XMLRPC Attack
2020-04-02 19:04:30

最近上报的IP列表

36.140.185.159 181.221.90.180 146.128.25.115 17.74.131.195
27.14.85.180 84.165.231.2 211.8.27.201 197.0.226.111
186.120.225.189 47.220.173.58 107.138.216.218 218.92.115.50
154.207.36.62 230.214.50.138 190.182.116.126 122.163.134.98
5.13.198.8 198.50.201.31 31.12.127.58 237.195.154.183