必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.138.168.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.138.168.129.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:38:35 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
129.168.138.141.in-addr.arpa domain name pointer s184.webhostingserver.nl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.168.138.141.in-addr.arpa	name = s184.webhostingserver.nl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.24.193.176 attack
Automatic report - Banned IP Access
2019-11-10 21:00:42
157.230.119.200 attack
Automatic report - Banned IP Access
2019-11-10 20:48:39
178.128.107.61 attackbots
2019-11-10T12:46:28.967053abusebot-5.cloudsearch.cf sshd\[25441\]: Invalid user robert from 178.128.107.61 port 34195
2019-11-10 21:11:10
59.27.125.131 attack
Nov 10 12:42:07 yesfletchmain sshd\[358\]: Invalid user ey from 59.27.125.131 port 55959
Nov 10 12:42:07 yesfletchmain sshd\[358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.27.125.131
Nov 10 12:42:09 yesfletchmain sshd\[358\]: Failed password for invalid user ey from 59.27.125.131 port 55959 ssh2
Nov 10 12:46:23 yesfletchmain sshd\[464\]: User root from 59.27.125.131 not allowed because not listed in AllowUsers
Nov 10 12:46:23 yesfletchmain sshd\[464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.27.125.131  user=root
...
2019-11-10 20:54:59
167.71.210.149 attack
Nov 10 09:59:28 MK-Soft-VM3 sshd[3636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.149 
Nov 10 09:59:30 MK-Soft-VM3 sshd[3636]: Failed password for invalid user tomcat from 167.71.210.149 port 52260 ssh2
...
2019-11-10 21:28:58
51.68.136.168 attack
(sshd) Failed SSH login from 51.68.136.168 (PL/Poland/-/-/mail.szot.win/[AS16276 OVH SAS]): 1 in the last 3600 secs
2019-11-10 21:02:01
220.92.16.102 attack
2019-11-10T11:51:28.714194abusebot-5.cloudsearch.cf sshd\[25029\]: Invalid user rakesh from 220.92.16.102 port 57486
2019-11-10 20:45:20
52.196.10.77 attack
abasicmove.de 52.196.10.77 \[10/Nov/2019:07:23:29 +0100\] "POST /wp-login.php HTTP/1.1" 200 5697 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
abasicmove.de 52.196.10.77 \[10/Nov/2019:07:23:30 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4139 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-10 21:01:30
185.254.68.172 attackbotsspam
Nov 10 13:15:37 h2177944 kernel: \[6263709.628468\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.68.172 DST=85.214.117.9 LEN=673 TOS=0x00 PREC=0x00 TTL=122 ID=7658 PROTO=UDP SPT=45108 DPT=15079 LEN=653 
Nov 10 13:19:50 h2177944 kernel: \[6263962.367952\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.68.172 DST=85.214.117.9 LEN=671 TOS=0x00 PREC=0x00 TTL=121 ID=28859 PROTO=UDP SPT=11309 DPT=5440 LEN=651 
Nov 10 13:21:27 h2177944 kernel: \[6264059.506677\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.68.172 DST=85.214.117.9 LEN=671 TOS=0x00 PREC=0x00 TTL=122 ID=14273 PROTO=UDP SPT=45307 DPT=5960 LEN=651 
Nov 10 13:23:08 h2177944 kernel: \[6264159.951463\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.68.172 DST=85.214.117.9 LEN=668 TOS=0x00 PREC=0x00 TTL=121 ID=14274 PROTO=UDP SPT=9616 DPT=1390 LEN=648 
Nov 10 13:23:18 h2177944 kernel: \[6264170.296742\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.254.68.172 DST=85.214.117.9 LEN=671 TOS=0x00 PREC=0x00 TTL=122 ID=14275 PROTO=UDP SPT=46703 DPT=8590 LEN=651 
...
2019-11-10 21:08:22
195.225.229.214 attack
Nov 10 02:39:55 hanapaa sshd\[14432\]: Invalid user db from 195.225.229.214
Nov 10 02:39:55 hanapaa sshd\[14432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214-229-225-195.kram.ua
Nov 10 02:39:58 hanapaa sshd\[14432\]: Failed password for invalid user db from 195.225.229.214 port 56784 ssh2
Nov 10 02:43:56 hanapaa sshd\[14729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214-229-225-195.kram.ua  user=root
Nov 10 02:43:59 hanapaa sshd\[14729\]: Failed password for root from 195.225.229.214 port 37758 ssh2
2019-11-10 20:45:51
212.119.65.133 attack
Port Scan 1433
2019-11-10 20:57:45
36.112.130.63 attack
Automatic report - XMLRPC Attack
2019-11-10 21:22:53
125.91.112.184 attackspam
2019-11-10T11:47:35.582269abusebot.cloudsearch.cf sshd\[30154\]: Invalid user admin from 125.91.112.184 port 50440
2019-11-10 20:49:21
195.154.223.226 attackspam
Nov 10 01:10:38 lanister sshd[27345]: Failed password for invalid user jira from 195.154.223.226 port 35344 ssh2
Nov 10 01:18:47 lanister sshd[27410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.223.226  user=root
Nov 10 01:18:50 lanister sshd[27410]: Failed password for root from 195.154.223.226 port 41260 ssh2
Nov 10 01:23:21 lanister sshd[27454]: Invalid user kristen from 195.154.223.226
...
2019-11-10 21:08:09
51.15.207.74 attackspam
Nov 10 13:25:49 server sshd\[24269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74  user=root
Nov 10 13:25:51 server sshd\[24269\]: Failed password for root from 51.15.207.74 port 49208 ssh2
Nov 10 13:39:48 server sshd\[27591\]: Invalid user c1 from 51.15.207.74
Nov 10 13:39:48 server sshd\[27591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74 
Nov 10 13:39:50 server sshd\[27591\]: Failed password for invalid user c1 from 51.15.207.74 port 55224 ssh2
...
2019-11-10 20:55:56

最近上报的IP列表

141.136.36.142 141.8.224.130 141.94.220.92 141.8.195.59
141.94.218.183 141.24.220.222 141.94.238.212 141.94.63.192
141.95.117.104 141.95.19.243 141.94.30.95 141.95.36.129
141.98.205.98 142.11.227.62 141.98.205.229 142.176.20.13
142.11.214.150 142.132.197.54 142.166.131.50 142.132.198.43