必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.68.172.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25667
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.68.172.32.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:11:35 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 32.172.68.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 32.172.68.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.45.157.116 attackspambots
Sep  2 15:05:48 xb3 sshd[14538]: Failed password for r.r from 77.45.157.116 port 58485 ssh2
Sep  2 15:05:50 xb3 sshd[14538]: Failed password for r.r from 77.45.157.116 port 58485 ssh2
Sep  2 15:05:52 xb3 sshd[14538]: Failed password for r.r from 77.45.157.116 port 58485 ssh2
Sep  2 15:05:52 xb3 sshd[14538]: Disconnecting: Too many authentication failures for r.r from 77.45.157.116 port 58485 ssh2 [preauth]
Sep  2 15:05:59 xb3 sshd[14786]: Failed password for r.r from 77.45.157.116 port 58494 ssh2
Sep  2 15:06:02 xb3 sshd[14786]: Failed password for r.r from 77.45.157.116 port 58494 ssh2
Sep  2 15:06:04 xb3 sshd[14786]: Failed password for r.r from 77.45.157.116 port 58494 ssh2
Sep  2 15:06:04 xb3 sshd[14786]: Disconnecting: Too many authentication failures for r.r from 77.45.157.116 port 58494 ssh2 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.45.157.116
2019-09-03 04:58:36
45.12.220.233 attack
Sep  2 22:07:04 rotator sshd\[14777\]: Invalid user apc from 45.12.220.233Sep  2 22:07:06 rotator sshd\[14777\]: Failed password for invalid user apc from 45.12.220.233 port 35169 ssh2Sep  2 22:07:09 rotator sshd\[14781\]: Failed password for root from 45.12.220.233 port 35617 ssh2Sep  2 22:07:09 rotator sshd\[14783\]: Invalid user admin from 45.12.220.233Sep  2 22:07:11 rotator sshd\[14783\]: Failed password for invalid user admin from 45.12.220.233 port 36149 ssh2Sep  2 22:07:14 rotator sshd\[14797\]: Failed password for root from 45.12.220.233 port 36537 ssh2Sep  2 22:07:14 rotator sshd\[14799\]: Invalid user oper from 45.12.220.233
...
2019-09-03 04:45:35
157.230.119.200 attack
Sep  2 19:42:20 SilenceServices sshd[2824]: Failed password for root from 157.230.119.200 port 41430 ssh2
Sep  2 19:46:30 SilenceServices sshd[5952]: Failed password for root from 157.230.119.200 port 58528 ssh2
2019-09-03 04:50:00
118.187.31.11 attackspambots
$f2bV_matches
2019-09-03 05:19:09
77.120.228.177 attack
postfix/smtpd\[9399\]: NOQUEUE: reject: RCPT from unknown\[77.120.228.177\]: 554 5.7.1 Service Client host \[77.120.228.177\] blocked using sbl-xbl.spamhaus.org\;
2019-09-03 04:52:17
193.201.224.12 attackbots
Sep  3 01:42:57 itv-usvr-01 sshd[27597]: Invalid user 0 from 193.201.224.12
Sep  3 01:42:57 itv-usvr-01 sshd[27597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.201.224.12
Sep  3 01:42:57 itv-usvr-01 sshd[27597]: Invalid user 0 from 193.201.224.12
Sep  3 01:42:59 itv-usvr-01 sshd[27597]: Failed password for invalid user 0 from 193.201.224.12 port 9584 ssh2
2019-09-03 05:17:25
106.12.17.243 attackbots
Sep  2 13:00:09 aat-srv002 sshd[18143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.243
Sep  2 13:00:11 aat-srv002 sshd[18143]: Failed password for invalid user yyu from 106.12.17.243 port 42862 ssh2
Sep  2 13:03:06 aat-srv002 sshd[18266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.17.243
Sep  2 13:03:08 aat-srv002 sshd[18266]: Failed password for invalid user XXXXXXX from 106.12.17.243 port 42054 ssh2
...
2019-09-03 05:19:42
69.165.222.88 attack
Sep  2 11:16:59 *** sshd[29128]: Failed password for invalid user attachments from 69.165.222.88 port 38298 ssh2
Sep  2 11:33:57 *** sshd[29399]: Failed password for invalid user grace from 69.165.222.88 port 33892 ssh2
Sep  2 11:42:19 *** sshd[29602]: Failed password for invalid user bot from 69.165.222.88 port 42692 ssh2
Sep  2 11:46:17 *** sshd[29696]: Failed password for invalid user api from 69.165.222.88 port 32972 ssh2
Sep  2 11:50:20 *** sshd[29740]: Failed password for invalid user almacen from 69.165.222.88 port 51492 ssh2
Sep  2 11:54:33 *** sshd[29793]: Failed password for invalid user dutta from 69.165.222.88 port 41774 ssh2
Sep  2 11:58:44 *** sshd[29836]: Failed password for invalid user wiki from 69.165.222.88 port 60292 ssh2
Sep  2 12:02:52 *** sshd[29942]: Failed password for invalid user tester from 69.165.222.88 port 50570 ssh2
Sep  2 12:07:02 *** sshd[30030]: Failed password for invalid user zabbix from 69.165.222.88 port 40850 ssh2
Sep  2 12:15:29 *** sshd[30190]: Failed password for inv
2019-09-03 05:09:22
212.224.126.76 attackbots
Sep  2 21:23:40 MK-Soft-VM3 sshd\[12569\]: Invalid user fire from 212.224.126.76 port 54592
Sep  2 21:23:40 MK-Soft-VM3 sshd\[12569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.224.126.76
Sep  2 21:23:41 MK-Soft-VM3 sshd\[12569\]: Failed password for invalid user fire from 212.224.126.76 port 54592 ssh2
...
2019-09-03 05:28:03
185.91.116.200 attackbots
Lines containing failures of 185.91.116.200
Sep  2 14:56:58 mellenthin sshd[4268]: Invalid user support from 185.91.116.200 port 45594
Sep  2 14:56:58 mellenthin sshd[4268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.91.116.200
Sep  2 14:57:00 mellenthin sshd[4268]: Failed password for invalid user support from 185.91.116.200 port 45594 ssh2
Sep  2 14:57:00 mellenthin sshd[4268]: Received disconnect from 185.91.116.200 port 45594:11: Bye Bye [preauth]
Sep  2 14:57:00 mellenthin sshd[4268]: Disconnected from invalid user support 185.91.116.200 port 45594 [preauth]
Sep  2 15:04:04 mellenthin sshd[4417]: Invalid user ernesto from 185.91.116.200 port 59498
Sep  2 15:04:04 mellenthin sshd[4417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.91.116.200


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.91.116.200
2019-09-03 05:07:11
218.92.0.207 attackspam
2019-09-02T15:20:19.963188abusebot-7.cloudsearch.cf sshd\[21417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.207  user=root
2019-09-03 04:51:30
220.164.2.71 attackbotsspam
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:00 +0200] "POST /[munged]: HTTP/1.1" 200 9039 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:02 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:05 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:06 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:07 +0200] "POST /[munged]: HTTP/1.1" 200 4378 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 220.164.2.71 - - [02/Sep/2019:15:13:10 +0200]
2019-09-03 04:59:30
31.207.35.207 attackbotsspam
2019-09-02T14:17:51.942828abusebot-3.cloudsearch.cf sshd\[30335\]: Invalid user noc from 31.207.35.207 port 52438
2019-09-03 05:24:28
61.227.232.72 attack
Honeypot attack, port: 23, PTR: 61-227-232-72.dynamic-ip.hinet.net.
2019-09-03 05:05:24
142.93.187.61 attackbots
Sep  2 23:27:31 dedicated sshd[23419]: Invalid user test2 from 142.93.187.61 port 55764
2019-09-03 05:31:10

最近上报的IP列表

125.241.131.141 189.69.31.160 90.87.181.250 13.177.66.26
185.172.90.222 101.95.119.1 39.202.211.145 148.80.205.148
42.14.172.236 58.255.234.219 175.95.252.191 37.20.46.68
169.106.119.24 181.114.5.99 146.130.71.135 241.59.157.132
179.204.190.177 130.87.28.23 6.244.172.144 208.182.243.46