必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.97.56.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.97.56.8.			IN	A

;; AUTHORITY SECTION:
.			261	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:23:16 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 8.56.97.129.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.56.97.129.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.204.101.132 attack
Nov  2 14:15:13 markkoudstaal sshd[21306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.101.132
Nov  2 14:15:15 markkoudstaal sshd[21306]: Failed password for invalid user guest from 129.204.101.132 port 57840 ssh2
Nov  2 14:20:58 markkoudstaal sshd[21877]: Failed password for root from 129.204.101.132 port 40386 ssh2
2019-11-03 01:31:43
49.88.112.71 attackbotsspam
2019-11-02T16:57:28.318275shield sshd\[22726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-11-02T16:57:29.875519shield sshd\[22726\]: Failed password for root from 49.88.112.71 port 50397 ssh2
2019-11-02T16:57:32.277330shield sshd\[22726\]: Failed password for root from 49.88.112.71 port 50397 ssh2
2019-11-02T16:57:34.627895shield sshd\[22726\]: Failed password for root from 49.88.112.71 port 50397 ssh2
2019-11-02T16:58:08.056240shield sshd\[22897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-11-03 01:06:58
104.244.77.119 attack
web-1 [ssh] SSH Attack
2019-11-03 01:14:16
45.141.84.50 attackbots
Nov  2 15:14:14 h2177944 kernel: \[5579749.715947\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.141.84.50 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=41428 PROTO=TCP SPT=57773 DPT=21303 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  2 15:16:23 h2177944 kernel: \[5579878.315867\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.141.84.50 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=11946 PROTO=TCP SPT=57773 DPT=22689 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  2 15:18:54 h2177944 kernel: \[5580029.637046\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.141.84.50 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34537 PROTO=TCP SPT=57773 DPT=22434 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  2 15:20:32 h2177944 kernel: \[5580128.179273\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.141.84.50 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=18502 PROTO=TCP SPT=57773 DPT=22871 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  2 15:29:37 h2177944 kernel: \[5580672.752785\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.141.84.50 DST=85.214.117.9
2019-11-03 01:01:14
89.214.212.39 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/89.214.212.39/ 
 
 PT - 1H : (10)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PT 
 NAME ASN : ASN42863 
 
 IP : 89.214.212.39 
 
 CIDR : 89.214.0.0/16 
 
 PREFIX COUNT : 9 
 
 UNIQUE IP COUNT : 254976 
 
 
 ATTACKS DETECTED ASN42863 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-11-02 12:52:28 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-03 01:17:28
185.162.235.113 attack
2019-11-02T18:05:02.286141mail01 postfix/smtpd[31878]: warning: unknown[185.162.235.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-02T18:10:20.373191mail01 postfix/smtpd[23751]: warning: unknown[185.162.235.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-02T18:10:20.373608mail01 postfix/smtpd[23752]: warning: unknown[185.162.235.113]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-03 01:12:14
212.237.55.37 attackbotsspam
Nov  2 03:06:30 sachi sshd\[16971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.55.37  user=root
Nov  2 03:06:32 sachi sshd\[16971\]: Failed password for root from 212.237.55.37 port 47458 ssh2
Nov  2 03:10:25 sachi sshd\[17370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.55.37  user=root
Nov  2 03:10:27 sachi sshd\[17370\]: Failed password for root from 212.237.55.37 port 57728 ssh2
Nov  2 03:14:30 sachi sshd\[17686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.55.37  user=root
2019-11-03 00:57:41
203.147.80.40 attack
(imapd) Failed IMAP login from 203.147.80.40 (NC/New Caledonia/host-203-147-80-40.h33.canl.nc): 1 in the last 3600 secs
2019-11-03 01:23:03
89.24.199.80 attackspam
Lines containing failures of 89.24.199.80
Nov  2 12:33:40 omfg postfix/smtpd[7228]: connect from 89-24-199-80.customers.tmcz.cz[89.24.199.80]
Nov x@x
Nov  2 12:33:51 omfg postfix/smtpd[7228]: lost connection after RCPT from 89-24-199-80.customers.tmcz.cz[89.24.199.80]
Nov  2 12:33:51 omfg postfix/smtpd[7228]: disconnect from 89-24-199-80.customers.tmcz.cz[89.24.199.80] ehlo=1 mail=1 rcpt=0/1 commands=2/3


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=89.24.199.80
2019-11-03 01:20:24
209.80.12.167 attack
Nov  2 19:21:59 server sshd\[18874\]: Invalid user sim123 from 209.80.12.167 port 60610
Nov  2 19:21:59 server sshd\[18874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.80.12.167
Nov  2 19:22:01 server sshd\[18874\]: Failed password for invalid user sim123 from 209.80.12.167 port 60610 ssh2
Nov  2 19:25:54 server sshd\[18526\]: Invalid user liu from 209.80.12.167 port 48128
Nov  2 19:25:54 server sshd\[18526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.80.12.167
2019-11-03 01:35:57
146.185.162.244 attackbots
2019-11-02T13:01:58.003971abusebot-6.cloudsearch.cf sshd\[8949\]: Invalid user iz from 146.185.162.244 port 40150
2019-11-03 01:34:50
87.101.240.10 attackspam
2019-11-02T14:14:40.209935scmdmz1 sshd\[18685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.101.240.10  user=root
2019-11-02T14:14:42.576224scmdmz1 sshd\[18685\]: Failed password for root from 87.101.240.10 port 38978 ssh2
2019-11-02T14:19:44.534479scmdmz1 sshd\[19040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.101.240.10  user=root
...
2019-11-03 01:08:30
165.227.122.251 attackspambots
2019-11-02T16:00:51.197157abusebot-5.cloudsearch.cf sshd\[25609\]: Invalid user da from 165.227.122.251 port 54306
2019-11-03 00:53:16
118.25.133.121 attackbotsspam
Nov  2 12:47:52 root sshd[25132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.121 
Nov  2 12:47:54 root sshd[25132]: Failed password for invalid user susane from 118.25.133.121 port 40372 ssh2
Nov  2 12:52:25 root sshd[25156]: Failed password for root from 118.25.133.121 port 47136 ssh2
...
2019-11-03 01:21:34
192.99.247.232 attack
Nov  2 03:10:19 eddieflores sshd\[17663\]: Invalid user danman from 192.99.247.232
Nov  2 03:10:19 eddieflores sshd\[17663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v6rwik.insurewise247.com
Nov  2 03:10:21 eddieflores sshd\[17663\]: Failed password for invalid user danman from 192.99.247.232 port 51220 ssh2
Nov  2 03:14:16 eddieflores sshd\[17944\]: Invalid user gm from 192.99.247.232
Nov  2 03:14:16 eddieflores sshd\[17944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v6rwik.insurewise247.com
2019-11-03 01:10:40

最近上报的IP列表

203.77.41.1 247.84.155.112 147.167.178.253 104.1.105.105
113.176.67.236 59.8.12.208 113.47.23.42 228.171.210.24
180.169.94.253 148.80.64.167 31.44.236.114 155.140.207.143
176.46.109.49 146.176.220.23 88.128.105.18 34.163.215.171
106.25.149.163 237.79.242.92 224.237.214.164 95.179.186.110