必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.29.201.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.29.201.138.			IN	A

;; AUTHORITY SECTION:
.			133	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 10:42:48 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 138.201.29.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.201.29.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.54.238.191 attackspambots
Unauthorised access (Sep 16) SRC=110.54.238.191 LEN=52 TTL=114 ID=22915 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-16 08:39:27
198.98.62.183 attackbotsspam
firewall-block, port(s): 5683/udp
2019-09-16 08:57:18
159.65.13.203 attackspam
Sep 15 13:53:02 hpm sshd\[24354\]: Invalid user sugs from 159.65.13.203
Sep 15 13:53:02 hpm sshd\[24354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.13.203
Sep 15 13:53:03 hpm sshd\[24354\]: Failed password for invalid user sugs from 159.65.13.203 port 59866 ssh2
Sep 15 13:57:45 hpm sshd\[24715\]: Invalid user we from 159.65.13.203
Sep 15 13:57:45 hpm sshd\[24715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.13.203
2019-09-16 08:39:00
141.255.32.128 attackbots
Telnet Server BruteForce Attack
2019-09-16 09:13:14
119.29.119.151 attackbotsspam
Sep 16 02:03:56 mail sshd[18374]: Invalid user sinus from 119.29.119.151
Sep 16 02:03:56 mail sshd[18374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.119.151
Sep 16 02:03:56 mail sshd[18374]: Invalid user sinus from 119.29.119.151
Sep 16 02:03:57 mail sshd[18374]: Failed password for invalid user sinus from 119.29.119.151 port 57408 ssh2
Sep 16 02:30:57 mail sshd[27953]: Invalid user michael from 119.29.119.151
...
2019-09-16 09:08:45
129.204.154.133 attackspambots
Sep 15 14:09:34 hcbb sshd\[11057\]: Invalid user monoacid from 129.204.154.133
Sep 15 14:09:34 hcbb sshd\[11057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.154.133
Sep 15 14:09:35 hcbb sshd\[11057\]: Failed password for invalid user monoacid from 129.204.154.133 port 52704 ssh2
Sep 15 14:17:07 hcbb sshd\[11689\]: Invalid user informix1 from 129.204.154.133
Sep 15 14:17:07 hcbb sshd\[11689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.154.133
2019-09-16 08:41:55
129.158.73.144 attack
Sep 16 01:51:10 OPSO sshd\[5876\]: Invalid user johny from 129.158.73.144 port 41214
Sep 16 01:51:10 OPSO sshd\[5876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.73.144
Sep 16 01:51:12 OPSO sshd\[5876\]: Failed password for invalid user johny from 129.158.73.144 port 41214 ssh2
Sep 16 01:55:42 OPSO sshd\[7494\]: Invalid user test from 129.158.73.144 port 63853
Sep 16 01:55:42 OPSO sshd\[7494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.73.144
2019-09-16 08:35:27
159.203.201.66 attackspambots
firewall-block, port(s): 5093/udp
2019-09-16 09:01:39
221.127.98.5 attackspam
Sep 14 02:29:19 nexus sshd[19053]: Invalid user pi from 221.127.98.5 port 35776
Sep 14 02:29:19 nexus sshd[19053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.127.98.5
Sep 14 02:29:19 nexus sshd[19055]: Invalid user pi from 221.127.98.5 port 35780
Sep 14 02:29:19 nexus sshd[19055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.127.98.5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=221.127.98.5
2019-09-16 08:32:50
118.25.189.123 attack
Automatic report - Banned IP Access
2019-09-16 08:54:24
140.246.175.68 attackspam
Sep 15 14:41:09 auw2 sshd\[28797\]: Invalid user nv from 140.246.175.68
Sep 15 14:41:09 auw2 sshd\[28797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.175.68
Sep 15 14:41:11 auw2 sshd\[28797\]: Failed password for invalid user nv from 140.246.175.68 port 14840 ssh2
Sep 15 14:46:25 auw2 sshd\[29241\]: Invalid user ax400 from 140.246.175.68
Sep 15 14:46:26 auw2 sshd\[29241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.175.68
2019-09-16 09:11:53
92.118.37.74 attackspam
Sep 16 02:48:07 mc1 kernel: \[1145438.118210\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=39440 PROTO=TCP SPT=46525 DPT=26403 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 16 02:55:49 mc1 kernel: \[1145899.509530\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=34205 PROTO=TCP SPT=46525 DPT=24265 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 16 02:56:12 mc1 kernel: \[1145922.535013\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=9897 PROTO=TCP SPT=46525 DPT=63741 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-16 09:07:13
112.78.170.59 attack
Sep 16 01:13:12 icinga sshd[62167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.170.59 
Sep 16 01:13:13 icinga sshd[62167]: Failed password for invalid user sammy from 112.78.170.59 port 43251 ssh2
Sep 16 01:20:21 icinga sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.170.59 
...
2019-09-16 08:50:56
59.9.31.195 attackspambots
Sep 16 04:50:44 areeb-Workstation sshd[2909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.9.31.195
Sep 16 04:50:46 areeb-Workstation sshd[2909]: Failed password for invalid user criminal from 59.9.31.195 port 47821 ssh2
...
2019-09-16 08:28:06
51.38.186.200 attackspam
Sep 16 02:21:38 nextcloud sshd\[30871\]: Invalid user du from 51.38.186.200
Sep 16 02:21:38 nextcloud sshd\[30871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.200
Sep 16 02:21:39 nextcloud sshd\[30871\]: Failed password for invalid user du from 51.38.186.200 port 58516 ssh2
...
2019-09-16 08:58:09

最近上报的IP列表

250.135.67.12 104.255.106.86 96.100.113.241 189.206.182.188
153.156.30.220 27.33.151.192 93.48.149.57 3.133.87.137
45.86.15.165 196.188.240.76 190.67.81.90 183.194.139.147
14.81.17.134 247.235.94.179 45.156.42.88 143.88.163.92
114.154.109.7 128.145.234.1 76.42.138.164 154.53.151.24