必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.75.18.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1671
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.75.18.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:54:50 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 29.18.75.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.18.75.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.143.199.89 attackbots
Invalid user hub from 140.143.199.89 port 47702
2020-08-21 14:33:12
217.182.192.217 attackspam
Aug 21 01:18:07 firewall sshd[15779]: Invalid user admin from 217.182.192.217
Aug 21 01:18:09 firewall sshd[15779]: Failed password for invalid user admin from 217.182.192.217 port 50520 ssh2
Aug 21 01:18:12 firewall sshd[15781]: Invalid user admin from 217.182.192.217
...
2020-08-21 14:17:31
111.182.233.51 attackspam
Port Scan
...
2020-08-21 14:29:43
51.254.129.128 attack
2020-08-21T07:55:54.887079vps751288.ovh.net sshd\[18695\]: Invalid user volumio from 51.254.129.128 port 34046
2020-08-21T07:55:54.895402vps751288.ovh.net sshd\[18695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-51-254-129.eu
2020-08-21T07:55:57.550459vps751288.ovh.net sshd\[18695\]: Failed password for invalid user volumio from 51.254.129.128 port 34046 ssh2
2020-08-21T07:59:40.085600vps751288.ovh.net sshd\[18719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-51-254-129.eu  user=root
2020-08-21T07:59:42.096314vps751288.ovh.net sshd\[18719\]: Failed password for root from 51.254.129.128 port 38054 ssh2
2020-08-21 14:57:31
222.186.180.147 attackspambots
Aug 21 07:15:30 ajax sshd[26444]: Failed password for root from 222.186.180.147 port 39352 ssh2
Aug 21 07:15:34 ajax sshd[26444]: Failed password for root from 222.186.180.147 port 39352 ssh2
2020-08-21 14:20:18
82.165.81.190 attackspam
Trolling for resource vulnerabilities
2020-08-21 14:38:52
159.65.147.235 attackspambots
Invalid user deploy from 159.65.147.235 port 43886
2020-08-21 14:32:50
185.217.1.246 attackspambots
2020-08-21T00:18:36.748394dreamphreak.com sshd[116665]: Invalid user 0 from 185.217.1.246 port 35344
2020-08-21T00:18:43.088234dreamphreak.com sshd[116665]: Failed password for invalid user 0 from 185.217.1.246 port 35344 ssh2
...
2020-08-21 14:36:08
24.16.139.106 attackbotsspam
2020-08-21T08:17:30.178706vps773228.ovh.net sshd[22687]: Invalid user fran from 24.16.139.106 port 60504
2020-08-21T08:17:30.200142vps773228.ovh.net sshd[22687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.16.139.106
2020-08-21T08:17:30.178706vps773228.ovh.net sshd[22687]: Invalid user fran from 24.16.139.106 port 60504
2020-08-21T08:17:32.433418vps773228.ovh.net sshd[22687]: Failed password for invalid user fran from 24.16.139.106 port 60504 ssh2
2020-08-21T08:22:25.884526vps773228.ovh.net sshd[22705]: Invalid user gzuser from 24.16.139.106 port 44544
...
2020-08-21 14:40:08
217.182.252.30 attackbots
Aug 21 07:00:50 ajax sshd[21073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.252.30 
Aug 21 07:00:52 ajax sshd[21073]: Failed password for invalid user zck from 217.182.252.30 port 44878 ssh2
2020-08-21 14:56:44
170.239.85.39 attack
Invalid user teste from 170.239.85.39 port 39182
2020-08-21 14:19:50
37.208.154.130 attackspam
2020-08-21T07:57:59+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-08-21 14:59:32
51.254.141.10 attack
Aug 21 06:53:36 OPSO sshd\[3138\]: Invalid user buh from 51.254.141.10 port 51808
Aug 21 06:53:36 OPSO sshd\[3138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.141.10
Aug 21 06:53:37 OPSO sshd\[3138\]: Failed password for invalid user buh from 51.254.141.10 port 51808 ssh2
Aug 21 07:00:58 OPSO sshd\[4859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.141.10  user=root
Aug 21 07:01:00 OPSO sshd\[4859\]: Failed password for root from 51.254.141.10 port 33148 ssh2
2020-08-21 14:52:44
121.229.26.104 attackspam
2020-08-21T07:10:06.864152mail.standpoint.com.ua sshd[25297]: Invalid user mercedes from 121.229.26.104 port 34270
2020-08-21T07:10:06.866541mail.standpoint.com.ua sshd[25297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.26.104
2020-08-21T07:10:06.864152mail.standpoint.com.ua sshd[25297]: Invalid user mercedes from 121.229.26.104 port 34270
2020-08-21T07:10:08.714077mail.standpoint.com.ua sshd[25297]: Failed password for invalid user mercedes from 121.229.26.104 port 34270 ssh2
2020-08-21T07:14:41.393896mail.standpoint.com.ua sshd[26084]: Invalid user gourav from 121.229.26.104 port 57286
...
2020-08-21 14:48:43
157.230.132.100 attackspambots
2020-08-21T08:27:57.741642mail.standpoint.com.ua sshd[6787]: Invalid user admin from 157.230.132.100 port 41314
2020-08-21T08:27:57.744330mail.standpoint.com.ua sshd[6787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.132.100
2020-08-21T08:27:57.741642mail.standpoint.com.ua sshd[6787]: Invalid user admin from 157.230.132.100 port 41314
2020-08-21T08:28:00.173234mail.standpoint.com.ua sshd[6787]: Failed password for invalid user admin from 157.230.132.100 port 41314 ssh2
2020-08-21T08:31:55.736678mail.standpoint.com.ua sshd[7405]: Invalid user idc from 157.230.132.100 port 50776
...
2020-08-21 14:36:46

最近上报的IP列表

189.97.207.143 254.189.140.18 236.169.157.202 67.34.188.38
119.252.28.233 198.215.69.121 139.192.220.26 26.75.120.190
135.220.79.198 125.243.89.248 152.176.241.60 205.205.81.116
138.48.176.98 27.15.253.12 43.201.143.26 238.154.81.47
16.245.44.223 82.53.93.108 239.222.254.232 214.33.248.167