必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.51.14.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.51.14.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 21:34:15 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 159.14.51.129.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 129.51.14.159.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
173.212.250.131 attack
Wordpress Admin Login attack
2019-10-23 16:41:58
121.141.5.199 attackbotsspam
Oct 23 06:36:47 server sshd\[18970\]: Invalid user admin from 121.141.5.199
Oct 23 06:36:47 server sshd\[18970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.141.5.199 
Oct 23 06:36:49 server sshd\[18970\]: Failed password for invalid user admin from 121.141.5.199 port 59466 ssh2
Oct 23 11:32:05 server sshd\[17758\]: Invalid user zabbix from 121.141.5.199
Oct 23 11:32:05 server sshd\[17758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.141.5.199 
...
2019-10-23 16:53:32
139.59.238.14 attackbots
k+ssh-bruteforce
2019-10-23 17:02:28
119.40.33.22 attackspam
2019-10-23T10:51:14.558439enmeeting.mahidol.ac.th sshd\[25276\]: User root from 119.40.33.22 not allowed because not listed in AllowUsers
2019-10-23T10:51:14.678265enmeeting.mahidol.ac.th sshd\[25276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.40.33.22  user=root
2019-10-23T10:51:16.583389enmeeting.mahidol.ac.th sshd\[25276\]: Failed password for invalid user root from 119.40.33.22 port 33963 ssh2
...
2019-10-23 16:44:27
2.13.231.199 attack
Oct 23 05:51:22 mail sshd\[26080\]: Invalid user admin from 2.13.231.199
Oct 23 05:51:22 mail sshd\[26080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.13.231.199
Oct 23 05:51:24 mail sshd\[26080\]: Failed password for invalid user admin from 2.13.231.199 port 46068 ssh2
2019-10-23 16:39:27
174.138.18.157 attackbots
Oct 23 06:05:25 vps691689 sshd[520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.18.157
Oct 23 06:05:28 vps691689 sshd[520]: Failed password for invalid user 123!@# from 174.138.18.157 port 40198 ssh2
...
2019-10-23 16:56:58
96.19.3.46 attackbots
Oct 22 07:24:11 odroid64 sshd\[31518\]: User root from 96.19.3.46 not allowed because not listed in AllowUsers
Oct 22 07:24:11 odroid64 sshd\[31518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.19.3.46  user=root
Oct 22 07:24:13 odroid64 sshd\[31518\]: Failed password for invalid user root from 96.19.3.46 port 49094 ssh2
Oct 22 07:24:11 odroid64 sshd\[31518\]: User root from 96.19.3.46 not allowed because not listed in AllowUsers
Oct 22 07:24:11 odroid64 sshd\[31518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.19.3.46  user=root
Oct 22 07:24:13 odroid64 sshd\[31518\]: Failed password for invalid user root from 96.19.3.46 port 49094 ssh2
...
2019-10-23 17:07:42
181.120.246.83 attackbotsspam
SSHScan
2019-10-23 16:49:17
194.7.35.200 attack
Joomla User : try to access forms...
2019-10-23 17:08:18
174.138.19.114 attackspambots
Oct 23 06:46:02 MK-Soft-VM5 sshd[3997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.19.114 
Oct 23 06:46:04 MK-Soft-VM5 sshd[3997]: Failed password for invalid user donna from 174.138.19.114 port 39716 ssh2
...
2019-10-23 16:34:01
77.247.181.165 attack
Oct 23 09:05:56 vpn01 sshd[26965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.247.181.165
Oct 23 09:05:58 vpn01 sshd[26965]: Failed password for invalid user minecraft from 77.247.181.165 port 11124 ssh2
...
2019-10-23 16:56:32
132.232.113.102 attackspambots
Oct 23 08:57:30 nextcloud sshd\[21334\]: Invalid user sakys from 132.232.113.102
Oct 23 08:57:30 nextcloud sshd\[21334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.113.102
Oct 23 08:57:32 nextcloud sshd\[21334\]: Failed password for invalid user sakys from 132.232.113.102 port 48513 ssh2
...
2019-10-23 16:57:15
178.47.0.220 attack
Chat Spam
2019-10-23 16:35:56
184.95.45.106 attackspam
xmlrpc attack
2019-10-23 16:33:42
123.175.9.110 attack
Fail2Ban - FTP Abuse Attempt
2019-10-23 17:06:50

最近上报的IP列表

193.30.65.236 157.76.182.207 175.140.190.202 207.112.190.246
234.19.48.253 12.2.130.159 232.161.100.134 179.189.69.124
13.93.185.240 132.6.105.223 118.136.118.123 224.44.231.239
69.168.188.60 223.197.37.22 197.202.108.84 233.148.199.215
132.111.161.196 160.206.158.107 193.1.126.246 120.143.243.172