必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.220.111.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62681
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.220.111.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 17:43:07 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 29.111.220.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.111.220.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
146.242.56.18 attackspam
Automated reporting of port scanning
2019-09-05 05:32:56
185.195.237.25 attackspambots
Sep  4 12:35:12 plusreed sshd[24092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.195.237.25  user=root
Sep  4 12:35:15 plusreed sshd[24092]: Failed password for root from 185.195.237.25 port 38637 ssh2
Sep  4 12:35:21 plusreed sshd[24092]: Failed password for root from 185.195.237.25 port 38637 ssh2
Sep  4 12:35:12 plusreed sshd[24092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.195.237.25  user=root
Sep  4 12:35:15 plusreed sshd[24092]: Failed password for root from 185.195.237.25 port 38637 ssh2
Sep  4 12:35:21 plusreed sshd[24092]: Failed password for root from 185.195.237.25 port 38637 ssh2
Sep  4 12:35:12 plusreed sshd[24092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.195.237.25  user=root
Sep  4 12:35:15 plusreed sshd[24092]: Failed password for root from 185.195.237.25 port 38637 ssh2
Sep  4 12:35:21 plusreed sshd[24092]: Failed password for root from 185.1
2019-09-05 05:56:15
186.226.188.17 attackspam
Unauthorized connection attempt from IP address 186.226.188.17 on Port 445(SMB)
2019-09-05 05:58:24
202.42.100.26 attack
Unauthorized connection attempt from IP address 202.42.100.26 on Port 445(SMB)
2019-09-05 05:19:42
123.16.170.155 attackspam
Unauthorized connection attempt from IP address 123.16.170.155 on Port 445(SMB)
2019-09-05 05:27:08
68.183.179.142 attackspambots
Sep  3 03:28:46 itv-usvr-01 sshd[31947]: Invalid user test1 from 68.183.179.142
Sep  3 03:28:46 itv-usvr-01 sshd[31947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.179.142
Sep  3 03:28:46 itv-usvr-01 sshd[31947]: Invalid user test1 from 68.183.179.142
Sep  3 03:28:49 itv-usvr-01 sshd[31947]: Failed password for invalid user test1 from 68.183.179.142 port 48490 ssh2
Sep  3 03:33:08 itv-usvr-01 sshd[32123]: Invalid user hr from 68.183.179.142
2019-09-05 05:14:20
49.231.229.229 attack
Sep  5 00:12:09 server sshd\[20977\]: Invalid user nazrul from 49.231.229.229 port 37548
Sep  5 00:12:09 server sshd\[20977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.229.229
Sep  5 00:12:11 server sshd\[20977\]: Failed password for invalid user nazrul from 49.231.229.229 port 37548 ssh2
Sep  5 00:17:35 server sshd\[21235\]: Invalid user consulta from 49.231.229.229 port 54348
Sep  5 00:17:35 server sshd\[21235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.229.229
2019-09-05 05:21:01
159.192.96.180 attack
Unauthorized connection attempt from IP address 159.192.96.180 on Port 445(SMB)
2019-09-05 05:44:27
182.72.101.19 attackbotsspam
Sep  4 10:31:28 aat-srv002 sshd[17335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.101.19
Sep  4 10:31:30 aat-srv002 sshd[17335]: Failed password for invalid user oracle from 182.72.101.19 port 62696 ssh2
Sep  4 10:36:53 aat-srv002 sshd[17491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.101.19
Sep  4 10:36:55 aat-srv002 sshd[17491]: Failed password for invalid user secretar from 182.72.101.19 port 63168 ssh2
...
2019-09-05 05:41:04
83.97.20.176 attackbotsspam
09/04/2019-16:10:01.304596 83.97.20.176 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-05 05:37:04
222.98.37.25 attackspam
$f2bV_matches
2019-09-05 05:32:16
201.22.95.52 attack
Automatic report - Banned IP Access
2019-09-05 05:22:40
52.101.134.83 attackspambots
Phishing, Donation abuse.
2019-09-05 05:25:46
221.148.63.118 attackbots
F2B jail: sshd. Time: 2019-09-04 22:04:23, Reported by: VKReport
2019-09-05 05:34:32
94.41.129.173 attackbots
Unauthorized connection attempt from IP address 94.41.129.173 on Port 445(SMB)
2019-09-05 05:42:36

最近上报的IP列表

174.63.95.96 193.207.54.210 224.151.199.111 79.110.84.18
127.124.133.89 32.254.98.29 184.98.64.142 163.216.60.217
125.159.170.211 92.94.48.167 113.65.174.53 107.121.128.168
180.111.92.51 174.213.146.163 98.169.243.133 141.33.151.97
19.17.13.26 14.31.95.185 215.22.3.243 69.108.107.252