必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.29.101.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.29.101.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 00:18:25 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 109.101.29.134.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 109.101.29.134.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.161.5.234 attackbots
"SMTPD"	2392	16549	"2019-07-20 x@x
"SMTPD"	2392	16549	"2019-07-20 03:19:02.620"	"178.161.5.234"	"SENT: 550 Delivery is not allowed to this address."

IP Address:	178.161.5.234
Email x@x
No MX record resolves to this server for domain: opvakantievanafmaastricht.nl


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.161.5.234
2019-07-20 16:55:13
178.62.252.89 attackbotsspam
Jul 20 10:20:04 v22019058497090703 sshd[25155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.252.89
Jul 20 10:20:06 v22019058497090703 sshd[25155]: Failed password for invalid user johny from 178.62.252.89 port 50500 ssh2
Jul 20 10:27:00 v22019058497090703 sshd[25598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.252.89
...
2019-07-20 17:04:29
149.56.101.113 attack
Automatic report - Banned IP Access
2019-07-20 17:14:48
14.207.202.228 attackspam
SMB Server BruteForce Attack
2019-07-20 16:56:33
74.208.252.136 attackspam
Jul 20 09:27:08 mail sshd\[26997\]: Failed password for invalid user mailtest from 74.208.252.136 port 33086 ssh2
Jul 20 09:45:36 mail sshd\[27286\]: Invalid user mwang from 74.208.252.136 port 49554
...
2019-07-20 16:56:04
131.161.69.2 attack
"SMTPD"	5860	16561	"2019-07-20 x@x
"SMTPD"	5860	16561	"2019-07-20 03:19:15.902"	"131.161.69.2"	"SENT: 550 Delivery is not allowed to this address."

IP Address:	131.161.69.2
Email x@x
No MX record resolves to this server for domain: opvakantievanafmaastricht.nl


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=131.161.69.2
2019-07-20 17:16:20
5.16.70.207 attackspambots
Jul 20 03:19:17 mxgate1 postfix/postscreen[22477]: CONNECT from [5.16.70.207]:55103 to [176.31.12.44]:25
Jul 20 03:19:17 mxgate1 postfix/dnsblog[22496]: addr 5.16.70.207 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 20 03:19:18 mxgate1 postfix/postscreen[22477]: PREGREET 18 after 0.6 from [5.16.70.207]:55103: HELO xiixaku.com

Jul 20 03:19:18 mxgate1 postfix/dnsblog[22492]: addr 5.16.70.207 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 20 03:19:18 mxgate1 postfix/dnsblog[22492]: addr 5.16.70.207 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 20 03:19:18 mxgate1 postfix/postscreen[22477]: DNSBL rank 3 for [5.16.70.207]:55103
Jul x@x
Jul 20 03:19:20 mxgate1 postfix/postscreen[22477]: HANGUP after 1.6 from [5.16.70.207]:55103 in tests after SMTP handshake
Jul 20 03:19:20 mxgate1 postfix/postscreen[22477]: DISCONNECT [5.16.70.207]:55103


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.16.70.207
2019-07-20 17:19:16
71.78.55.236 attackspambots
RDP Bruteforce
2019-07-20 16:58:29
118.67.219.101 attackspam
2019-07-20T15:51:28.485006enmeeting.mahidol.ac.th sshd\[24458\]: Invalid user eddy from 118.67.219.101 port 38276
2019-07-20T15:51:28.504865enmeeting.mahidol.ac.th sshd\[24458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.67.219.101
2019-07-20T15:51:30.309423enmeeting.mahidol.ac.th sshd\[24458\]: Failed password for invalid user eddy from 118.67.219.101 port 38276 ssh2
...
2019-07-20 17:15:15
211.23.160.131 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-07-20 17:13:05
185.110.136.23 attack
email spam
2019-07-20 17:37:53
223.221.206.177 attackspam
Jul 20 03:22:19 localhost postfix/smtpd\[31599\]: warning: unknown\[223.221.206.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 03:23:05 localhost postfix/smtpd\[31587\]: warning: unknown\[223.221.206.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 03:23:30 localhost postfix/smtpd\[31599\]: warning: unknown\[223.221.206.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 03:24:01 localhost postfix/smtpd\[31587\]: warning: unknown\[223.221.206.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 20 03:24:18 localhost postfix/smtpd\[31599\]: warning: unknown\[223.221.206.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-20 17:07:43
203.160.91.226 attackbotsspam
Jul 20 14:03:02 areeb-Workstation sshd\[15011\]: Invalid user marketing from 203.160.91.226
Jul 20 14:03:02 areeb-Workstation sshd\[15011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.91.226
Jul 20 14:03:04 areeb-Workstation sshd\[15011\]: Failed password for invalid user marketing from 203.160.91.226 port 51262 ssh2
...
2019-07-20 16:46:45
106.13.65.210 attackspam
Jul 20 06:48:09 lnxmail61 sshd[29160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.65.210
2019-07-20 16:55:34
206.189.232.45 attack
Jul 20 10:21:51 [host] sshd[13247]: Invalid user web from 206.189.232.45
Jul 20 10:21:51 [host] sshd[13247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.232.45
Jul 20 10:21:53 [host] sshd[13247]: Failed password for invalid user web from 206.189.232.45 port 49496 ssh2
2019-07-20 16:51:19

最近上报的IP列表

89.87.175.192 57.140.230.150 190.106.119.186 229.30.65.26
85.113.75.148 39.132.154.247 68.255.252.85 98.133.241.229
180.195.226.85 114.205.251.120 12.31.30.42 107.143.172.112
77.118.122.24 161.173.189.30 203.92.242.111 74.60.17.86
120.248.155.164 232.239.115.135 80.239.44.163 171.233.224.52