必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.14.229.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.14.229.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 02:58:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.229.14.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.229.14.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
197.34.26.52 attackspam
DATE:2019-07-18_03:18:04, IP:197.34.26.52, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-18 15:46:06
129.204.112.220 attack
10 attempts against mh-misc-ban on sky.magehost.pro
2019-07-18 15:16:11
185.142.236.35 attackspambots
Honeypot hit.
2019-07-18 15:15:35
51.75.65.72 attack
Jul 18 07:17:37 vpn01 sshd\[17049\]: Invalid user user from 51.75.65.72
Jul 18 07:17:37 vpn01 sshd\[17049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.65.72
Jul 18 07:17:39 vpn01 sshd\[17049\]: Failed password for invalid user user from 51.75.65.72 port 58153 ssh2
2019-07-18 15:20:56
106.12.194.207 attack
Jul 18 08:25:19 debian sshd\[9139\]: Invalid user bsd1 from 106.12.194.207 port 43610
Jul 18 08:25:19 debian sshd\[9139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.207
...
2019-07-18 15:31:28
168.181.48.17 attack
Jul 18 09:29:30 localhost sshd\[15714\]: Invalid user tam from 168.181.48.17 port 5582
Jul 18 09:29:30 localhost sshd\[15714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.48.17
Jul 18 09:29:32 localhost sshd\[15714\]: Failed password for invalid user tam from 168.181.48.17 port 5582 ssh2
2019-07-18 15:51:25
77.243.210.156 attack
Jul 18 08:48:15 v22019058497090703 sshd[21257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.243.210.156
Jul 18 08:48:17 v22019058497090703 sshd[21257]: Failed password for invalid user mario from 77.243.210.156 port 36192 ssh2
Jul 18 08:54:17 v22019058497090703 sshd[21642]: Failed password for backup from 77.243.210.156 port 53998 ssh2
...
2019-07-18 15:17:11
177.66.180.167 attack
email spam
2019-07-18 15:48:00
2.134.204.20 attack
fell into ViewStateTrap:wien2018
2019-07-18 15:03:28
51.77.140.244 attackbots
Jul 18 02:39:01 vps200512 sshd\[26952\]: Invalid user test from 51.77.140.244
Jul 18 02:39:01 vps200512 sshd\[26952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.244
Jul 18 02:39:03 vps200512 sshd\[26952\]: Failed password for invalid user test from 51.77.140.244 port 48536 ssh2
Jul 18 02:44:10 vps200512 sshd\[27126\]: Invalid user fw from 51.77.140.244
Jul 18 02:44:10 vps200512 sshd\[27126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.244
2019-07-18 14:58:58
45.230.100.247 attackspambots
2019-07-17 20:18:01 H=(45-230-100-247.in-addr.arpa) [45.230.100.247]:58712 I=[192.147.25.65]:25 sender verify fail for : Unrouteable address
2019-07-17 20:18:01 H=(45-230-100-247.in-addr.arpa) [45.230.100.247]:58712 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
2019-07-17 20:18:02 H=(45-230-100-247.in-addr.arpa) [45.230.100.247]:58712 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
...
2019-07-18 15:47:03
80.191.140.42 attackspam
Automatic report - Banned IP Access
2019-07-18 15:08:52
142.93.58.123 attackbotsspam
Jul 18 08:33:59 icinga sshd[9522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.123
Jul 18 08:34:01 icinga sshd[9522]: Failed password for invalid user teamspeak3 from 142.93.58.123 port 44746 ssh2
...
2019-07-18 15:12:21
5.11.37.63 attack
Jul 18 09:05:48 rpi sshd[3155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.11.37.63 
Jul 18 09:05:50 rpi sshd[3155]: Failed password for invalid user atir from 5.11.37.63 port 44272 ssh2
2019-07-18 15:49:07
157.230.36.189 attackspam
Jul 18 06:56:39 localhost sshd\[43911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.36.189  user=root
Jul 18 06:56:41 localhost sshd\[43911\]: Failed password for root from 157.230.36.189 port 41422 ssh2
...
2019-07-18 15:50:14

最近上报的IP列表

190.32.99.174 149.169.235.245 100.204.240.202 174.91.32.206
28.239.136.168 126.90.13.199 202.3.243.222 245.29.94.67
133.6.122.105 155.217.133.55 213.101.174.204 6.146.198.115
232.152.64.205 231.102.208.102 218.203.142.139 106.224.78.148
136.116.37.26 61.34.116.147 250.206.240.136 121.108.134.54