必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.142.29.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43055
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.142.29.100.			IN	A

;; AUTHORITY SECTION:
.			83	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052302 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 24 08:52:57 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
Host 100.29.142.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.29.142.132.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.9.198.99 attackspam
Dec  6 17:28:55 srv206 sshd[18493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.99.198.9.5.clients.your-server.de  user=bin
Dec  6 17:28:57 srv206 sshd[18493]: Failed password for bin from 5.9.198.99 port 33006 ssh2
...
2019-12-07 05:42:55
58.26.67.73 attack
Unauthorized connection attempt from IP address 58.26.67.73 on Port 445(SMB)
2019-12-07 05:19:53
182.61.163.126 attackspambots
2019-12-06T18:08:49.337761shield sshd\[28486\]: Invalid user shapiro from 182.61.163.126 port 48226
2019-12-06T18:08:49.342071shield sshd\[28486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.163.126
2019-12-06T18:08:51.255560shield sshd\[28486\]: Failed password for invalid user shapiro from 182.61.163.126 port 48226 ssh2
2019-12-06T18:15:17.303916shield sshd\[30273\]: Invalid user asterisk from 182.61.163.126 port 58432
2019-12-06T18:15:17.308117shield sshd\[30273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.163.126
2019-12-07 05:33:27
124.160.83.138 attack
Dec  6 21:05:15 icinga sshd[30614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.83.138
Dec  6 21:05:17 icinga sshd[30614]: Failed password for invalid user telecoms from 124.160.83.138 port 57692 ssh2
...
2019-12-07 05:49:56
131.0.246.6 attackbots
Unauthorized connection attempt from IP address 131.0.246.6 on Port 445(SMB)
2019-12-07 05:29:31
109.99.228.117 attack
Automatic report - Banned IP Access
2019-12-07 06:00:33
104.236.214.8 attackspambots
2019-12-06 19:33:58,937 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 104.236.214.8
2019-12-06 20:20:34,005 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 104.236.214.8
2019-12-06 20:56:31,952 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 104.236.214.8
2019-12-06 21:32:19,951 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 104.236.214.8
2019-12-06 22:16:46,589 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 104.236.214.8
...
2019-12-07 05:37:02
171.38.218.141 attackspambots
Attempted to connect 2 times to port 26 TCP
2019-12-07 06:01:09
88.204.202.222 attackbots
Unauthorized connection attempt from IP address 88.204.202.222 on Port 445(SMB)
2019-12-07 05:22:05
36.238.88.174 attackspambots
Unauthorized connection attempt from IP address 36.238.88.174 on Port 445(SMB)
2019-12-07 05:32:23
150.109.113.127 attack
2019-12-06T18:01:32.019024shield sshd\[27492\]: Invalid user bitnami from 150.109.113.127 port 33882
2019-12-06T18:01:32.024231shield sshd\[27492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.113.127
2019-12-06T18:01:33.612355shield sshd\[27492\]: Failed password for invalid user bitnami from 150.109.113.127 port 33882 ssh2
2019-12-06T18:08:06.059287shield sshd\[28371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.113.127  user=root
2019-12-06T18:08:07.737687shield sshd\[28371\]: Failed password for root from 150.109.113.127 port 44472 ssh2
2019-12-07 05:33:43
199.195.251.227 attackspambots
Dec  6 18:00:26 wh01 sshd[32166]: Invalid user lieselotte from 199.195.251.227 port 39726
Dec  6 18:00:26 wh01 sshd[32166]: Failed password for invalid user lieselotte from 199.195.251.227 port 39726 ssh2
Dec  6 18:00:26 wh01 sshd[32166]: Received disconnect from 199.195.251.227 port 39726:11: Bye Bye [preauth]
Dec  6 18:00:26 wh01 sshd[32166]: Disconnected from 199.195.251.227 port 39726 [preauth]
Dec  6 18:08:41 wh01 sshd[374]: Invalid user aideen from 199.195.251.227 port 38636
Dec  6 18:08:41 wh01 sshd[374]: Failed password for invalid user aideen from 199.195.251.227 port 38636 ssh2
Dec  6 18:08:41 wh01 sshd[374]: Received disconnect from 199.195.251.227 port 38636:11: Bye Bye [preauth]
Dec  6 18:08:41 wh01 sshd[374]: Disconnected from 199.195.251.227 port 38636 [preauth]
Dec  6 18:38:17 wh01 sshd[3148]: Invalid user rafaee from 199.195.251.227 port 55670
Dec  6 18:38:17 wh01 sshd[3148]: Failed password for invalid user rafaee from 199.195.251.227 port 55670 ssh2
Dec  6 18:38:17 w
2019-12-07 05:45:33
200.216.68.92 attackbots
Unauthorized connection attempt from IP address 200.216.68.92 on Port 445(SMB)
2019-12-07 05:47:10
46.101.81.143 attackbots
Dec  6 11:40:09 php1 sshd\[26591\]: Invalid user athena123 from 46.101.81.143
Dec  6 11:40:09 php1 sshd\[26591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.81.143
Dec  6 11:40:11 php1 sshd\[26591\]: Failed password for invalid user athena123 from 46.101.81.143 port 36868 ssh2
Dec  6 11:48:03 php1 sshd\[27376\]: Invalid user eugenia123 from 46.101.81.143
Dec  6 11:48:03 php1 sshd\[27376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.81.143
2019-12-07 05:48:56
36.74.75.31 attack
Dec  6 17:40:40 *** sshd[19916]: Invalid user john from 36.74.75.31
2019-12-07 05:57:02

最近上报的IP列表

171.86.220.130 233.56.41.135 64.234.11.196 232.132.165.59
109.196.92.173 40.217.126.223 37.192.77.219 130.7.250.31
58.146.216.152 124.171.150.57 254.19.84.123 253.185.50.178
160.73.42.63 68.30.152.177 109.231.122.125 146.94.37.143
99.147.211.22 73.230.173.225 182.112.39.43 44.39.52.23