必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.145.29.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.145.29.204.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 151 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:14:51 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 204.29.145.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 204.29.145.132.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.115.15.210 attackbotsspam
Aug 25 21:05:22 debian sshd\[18926\]: Invalid user gordon from 203.115.15.210 port 54028
Aug 25 21:05:22 debian sshd\[18926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.115.15.210
...
2019-08-26 05:35:55
121.186.14.44 attackbotsspam
Aug 25 11:12:37 auw2 sshd\[16702\]: Invalid user at123 from 121.186.14.44
Aug 25 11:12:37 auw2 sshd\[16702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.14.44
Aug 25 11:12:40 auw2 sshd\[16702\]: Failed password for invalid user at123 from 121.186.14.44 port 28400 ssh2
Aug 25 11:17:53 auw2 sshd\[17219\]: Invalid user ccccc from 121.186.14.44
Aug 25 11:17:53 auw2 sshd\[17219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.14.44
2019-08-26 05:27:31
51.15.141.1 attackspam
SIP Server BruteForce Attack
2019-08-26 05:23:13
222.222.71.101 attackspam
failed_logins
2019-08-26 05:26:28
51.140.241.96 attackbots
Aug 25 21:53:46 mail sshd\[1633\]: Invalid user marty from 51.140.241.96 port 59978
Aug 25 21:53:46 mail sshd\[1633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.140.241.96
...
2019-08-26 05:11:45
47.100.205.231 attackspam
firewall-block, port(s): 80/tcp, 8080/tcp
2019-08-26 05:12:51
49.88.112.65 attack
Aug 25 11:11:57 hpm sshd\[12507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Aug 25 11:11:58 hpm sshd\[12507\]: Failed password for root from 49.88.112.65 port 43314 ssh2
Aug 25 11:12:43 hpm sshd\[12568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Aug 25 11:12:46 hpm sshd\[12568\]: Failed password for root from 49.88.112.65 port 37169 ssh2
Aug 25 11:13:32 hpm sshd\[12632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
2019-08-26 05:18:09
189.28.162.159 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-25 14:18:38,830 INFO [shellcode_manager] (189.28.162.159) no match, writing hexdump (b62c61212ef9b2d3ccc162fe0cf489c3 :2262318) - MS17010 (EternalBlue)
2019-08-26 05:28:25
221.226.48.78 attackspambots
Aug 25 14:49:37 Tower sshd[38903]: Connection from 221.226.48.78 port 36964 on 192.168.10.220 port 22
Aug 25 14:49:38 Tower sshd[38903]: Invalid user permlink from 221.226.48.78 port 36964
Aug 25 14:49:38 Tower sshd[38903]: error: Could not get shadow information for NOUSER
Aug 25 14:49:38 Tower sshd[38903]: Failed password for invalid user permlink from 221.226.48.78 port 36964 ssh2
Aug 25 14:49:39 Tower sshd[38903]: Received disconnect from 221.226.48.78 port 36964:11: Bye Bye [preauth]
Aug 25 14:49:39 Tower sshd[38903]: Disconnected from invalid user permlink 221.226.48.78 port 36964 [preauth]
2019-08-26 05:29:39
217.218.21.242 attackbots
Aug 25 21:03:49 mail sshd\[10092\]: Failed password for invalid user csgoserver from 217.218.21.242 port 1036 ssh2
Aug 25 21:08:10 mail sshd\[10648\]: Invalid user stan from 217.218.21.242 port 1640
Aug 25 21:08:10 mail sshd\[10648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.218.21.242
Aug 25 21:08:12 mail sshd\[10648\]: Failed password for invalid user stan from 217.218.21.242 port 1640 ssh2
Aug 25 21:12:18 mail sshd\[11262\]: Invalid user mrtinluther from 217.218.21.242 port 4928
2019-08-26 05:32:56
106.12.190.217 attack
firewall-block, port(s): 23/tcp
2019-08-26 05:07:22
206.189.134.83 attackbots
Aug 25 09:22:43 *** sshd[22123]: Failed password for invalid user marco from 206.189.134.83 port 60666 ssh2
Aug 25 09:29:16 *** sshd[22239]: Failed password for invalid user jobs from 206.189.134.83 port 47744 ssh2
Aug 25 09:36:16 *** sshd[22348]: Failed password for invalid user guest from 206.189.134.83 port 34814 ssh2
2019-08-26 05:19:27
14.192.19.27 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-25 17:30:59,672 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.192.19.27)
2019-08-26 05:29:13
106.13.17.8 attack
Aug 25 17:33:58 vps200512 sshd\[9859\]: Invalid user nnn from 106.13.17.8
Aug 25 17:33:58 vps200512 sshd\[9859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.17.8
Aug 25 17:34:00 vps200512 sshd\[9859\]: Failed password for invalid user nnn from 106.13.17.8 port 60288 ssh2
Aug 25 17:36:57 vps200512 sshd\[9953\]: Invalid user liza from 106.13.17.8
Aug 25 17:36:57 vps200512 sshd\[9953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.17.8
2019-08-26 05:39:09
94.191.64.101 attack
Aug 25 11:24:59 hanapaa sshd\[17974\]: Invalid user website1 from 94.191.64.101
Aug 25 11:24:59 hanapaa sshd\[17974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.64.101
Aug 25 11:25:02 hanapaa sshd\[17974\]: Failed password for invalid user website1 from 94.191.64.101 port 52754 ssh2
Aug 25 11:28:50 hanapaa sshd\[18360\]: Invalid user 123456 from 94.191.64.101
Aug 25 11:28:50 hanapaa sshd\[18360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.64.101
2019-08-26 05:43:58

最近上报的IP列表

132.145.24.156 132.145.46.183 132.145.43.87 132.145.51.30
132.145.34.161 132.145.59.241 132.145.72.107 132.145.82.138
132.148.10.145 132.145.73.47 132.148.100.65 132.148.103.77
132.148.114.125 132.147.119.33 132.148.113.198 132.148.115.116
132.148.102.53 132.148.164.4 132.148.135.165 132.148.135.250