必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.29.128.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44859
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.29.128.86.			IN	A

;; AUTHORITY SECTION:
.			303	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103100 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 20:37:22 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 86.128.29.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 86.128.29.132.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.118.242.25 attack
SSH login attempts.
2020-03-20 13:13:41
159.203.82.104 attackspam
$f2bV_matches
2020-03-20 13:26:39
95.216.150.178 attackbotsspam
SSH login attempts.
2020-03-20 13:01:10
212.129.164.73 attack
SSH login attempts.
2020-03-20 13:11:36
198.27.79.180 attack
Mar 20 05:43:38 lnxweb61 sshd[18468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.79.180
Mar 20 05:43:38 lnxweb61 sshd[18468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.79.180
2020-03-20 12:58:09
51.68.226.159 attackbotsspam
Mar 20 04:08:42 combo sshd[7145]: Failed password for invalid user administrator from 51.68.226.159 port 45498 ssh2
Mar 20 04:15:54 combo sshd[7707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.226.159  user=root
Mar 20 04:15:56 combo sshd[7707]: Failed password for root from 51.68.226.159 port 44856 ssh2
...
2020-03-20 13:06:53
109.244.35.19 attackspam
SSH login attempts.
2020-03-20 13:30:53
218.92.0.192 attackbotsspam
03/20/2020-01:28:47.343751 218.92.0.192 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-20 13:37:11
1.213.195.155 attackspam
Mar 20 09:26:18 areeb-Workstation sshd[2174]: Failed password for root from 1.213.195.155 port 28591 ssh2
...
2020-03-20 13:15:41
206.189.171.204 attackbotsspam
Automatic report BANNED IP
2020-03-20 13:09:58
103.84.93.32 attackspambots
Mar 20 05:32:03 rotator sshd\[31828\]: Failed password for root from 103.84.93.32 port 45698 ssh2Mar 20 05:34:29 rotator sshd\[31854\]: Failed password for root from 103.84.93.32 port 42682 ssh2Mar 20 05:37:05 rotator sshd\[32650\]: Failed password for root from 103.84.93.32 port 39662 ssh2Mar 20 05:39:32 rotator sshd\[32683\]: Invalid user ftpuser1 from 103.84.93.32Mar 20 05:39:34 rotator sshd\[32683\]: Failed password for invalid user ftpuser1 from 103.84.93.32 port 36650 ssh2Mar 20 05:42:01 rotator sshd\[1000\]: Invalid user ts3 from 103.84.93.32
...
2020-03-20 13:13:11
95.110.154.101 attackspam
Mar 20 05:47:39 eventyay sshd[3000]: Failed password for root from 95.110.154.101 port 36206 ssh2
Mar 20 05:52:14 eventyay sshd[3073]: Failed password for root from 95.110.154.101 port 56238 ssh2
Mar 20 05:56:40 eventyay sshd[3144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.154.101
...
2020-03-20 13:12:37
51.68.174.177 attackspambots
SSH login attempts.
2020-03-20 13:15:20
81.34.87.171 attackspambots
SSH login attempts.
2020-03-20 13:31:23
117.201.129.92 attackspam
Lines containing failures of 117.201.129.92
Mar 20 04:49:08 shared09 sshd[14821]: Invalid user pi from 117.201.129.92 port 51153
Mar 20 04:49:08 shared09 sshd[14821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.201.129.92
Mar 20 04:49:10 shared09 sshd[14821]: Failed password for invalid user pi from 117.201.129.92 port 51153 ssh2
Mar 20 04:49:11 shared09 sshd[14821]: Connection closed by invalid user pi 117.201.129.92 port 51153 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.201.129.92
2020-03-20 13:00:33

最近上报的IP列表

248.113.147.156 125.10.255.145 148.2.138.86 50.39.97.191
167.47.134.117 123.181.56.174 99.196.252.35 49.115.218.254
158.228.67.147 109.202.117.96 130.161.47.65 177.211.184.170
51.87.153.174 221.17.23.37 15.44.90.250 37.242.53.97
142.120.38.38 218.189.154.182 121.176.93.61 83.15.228.29