必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.34.249.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.34.249.29.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:03:04 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
29.249.34.142.in-addr.arpa domain name pointer www.justicebc.ca.
29.249.34.142.in-addr.arpa domain name pointer www.orderofbc.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer www.seniorsadvocatebc.ca.
29.249.34.142.in-addr.arpa domain name pointer adopt.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer bcartscouncil.ca.
29.249.34.142.in-addr.arpa domain name pointer bcbudget2017.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer bcforhighschool.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer bcjobsplan.com.
29.249.34.142.in-addr.arpa domain name pointer bcjobsplan.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer bcparksvolunteers.ca.
29.249.34.142.in-addr.arpa domain name pointer bcwsinnovation.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer betterbc.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer blog.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer buybc.gov.bc.ca.
29.249.34.142.in-addr.arpa domain name pointer cannabis.gov.bc.ca.
29.24
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.249.34.142.in-addr.arpa	name = spills.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = thronespeech.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = upgradebc.ca.
29.249.34.142.in-addr.arpa	name = vanity.blog.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = workingforyou.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = www.aglg.ca.
29.249.34.142.in-addr.arpa	name = www.bcforhighschool.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = www.emergencyinfobc.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = www.justicebc.ca.
29.249.34.142.in-addr.arpa	name = www.orderofbc.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = www.seniorsadvocatebc.ca.
29.249.34.142.in-addr.arpa	name = adopt.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = bcartscouncil.ca.
29.249.34.142.in-addr.arpa	name = bcbudget2017.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = bcforhighschool.gov.bc.ca.
29.249.34.142.in-addr.arpa	name = bcjobsplan.com.
29.249.34.142.in-addr.arpa	name = bcjobsplan.gov.bc.ca.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
174.138.20.132 attack
Aug 21 00:06:20 mout sshd[26123]: Invalid user user from 174.138.20.132 port 43358
2019-08-21 06:13:05
151.73.46.21 attack
DATE:2019-08-20 16:46:36, IP:151.73.46.21, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-08-21 06:46:50
114.84.142.178 attackbots
Aug 20 10:54:53 Tower sshd[8279]: Connection from 114.84.142.178 port 3584 on 192.168.10.220 port 22
Aug 20 10:54:55 Tower sshd[8279]: Invalid user admin from 114.84.142.178 port 3584
Aug 20 10:54:55 Tower sshd[8279]: error: Could not get shadow information for NOUSER
Aug 20 10:54:55 Tower sshd[8279]: Failed password for invalid user admin from 114.84.142.178 port 3584 ssh2
Aug 20 10:54:55 Tower sshd[8279]: Received disconnect from 114.84.142.178 port 3584:11: Bye Bye [preauth]
Aug 20 10:54:55 Tower sshd[8279]: Disconnected from invalid user admin 114.84.142.178 port 3584 [preauth]
2019-08-21 06:30:42
51.75.247.13 attackbotsspam
2019-08-20T22:32:23.854013abusebot.cloudsearch.cf sshd\[17619\]: Invalid user pacs from 51.75.247.13 port 37688
2019-08-21 06:38:16
42.51.156.6 attackspam
Aug 21 00:08:35 dedicated sshd[874]: Invalid user lilian from 42.51.156.6 port 7983
2019-08-21 06:28:38
106.13.87.170 attack
Aug 20 21:49:50 server01 sshd\[8420\]: Invalid user tanja from 106.13.87.170
Aug 20 21:49:50 server01 sshd\[8420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.87.170
Aug 20 21:49:52 server01 sshd\[8420\]: Failed password for invalid user tanja from 106.13.87.170 port 45124 ssh2
...
2019-08-21 06:39:49
134.209.174.47 attack
xmlrpc attack
2019-08-21 06:30:04
168.128.13.253 attack
Aug 20 21:33:11 marvibiene sshd[19277]: Invalid user samba1 from 168.128.13.253 port 48656
Aug 20 21:33:11 marvibiene sshd[19277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.13.253
Aug 20 21:33:11 marvibiene sshd[19277]: Invalid user samba1 from 168.128.13.253 port 48656
Aug 20 21:33:13 marvibiene sshd[19277]: Failed password for invalid user samba1 from 168.128.13.253 port 48656 ssh2
...
2019-08-21 06:22:05
5.249.144.206 attack
Aug 20 22:39:34 MK-Soft-VM5 sshd\[1124\]: Invalid user deploy from 5.249.144.206 port 40480
Aug 20 22:39:34 MK-Soft-VM5 sshd\[1124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.144.206
Aug 20 22:39:36 MK-Soft-VM5 sshd\[1124\]: Failed password for invalid user deploy from 5.249.144.206 port 40480 ssh2
...
2019-08-21 06:50:47
192.42.116.13 attackbots
Automated report - ssh fail2ban:
Aug 20 16:46:42 wrong password, user=root, port=46096, ssh2
Aug 20 16:46:45 wrong password, user=root, port=46096, ssh2
Aug 20 16:46:49 wrong password, user=root, port=46096, ssh2
Aug 20 16:46:52 wrong password, user=root, port=46096, ssh2
2019-08-21 06:37:24
104.236.239.60 attack
Aug 20 10:20:14 friendsofhawaii sshd\[22572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.239.60  user=root
Aug 20 10:20:17 friendsofhawaii sshd\[22572\]: Failed password for root from 104.236.239.60 port 48501 ssh2
Aug 20 10:24:31 friendsofhawaii sshd\[22956\]: Invalid user samples from 104.236.239.60
Aug 20 10:24:31 friendsofhawaii sshd\[22956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.239.60
Aug 20 10:24:34 friendsofhawaii sshd\[22956\]: Failed password for invalid user samples from 104.236.239.60 port 43413 ssh2
2019-08-21 06:23:46
178.128.158.113 attack
Invalid user user from 178.128.158.113 port 41418
2019-08-21 06:42:29
5.45.6.66 attack
Aug 20 18:18:23 rpi sshd[3413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.45.6.66 
Aug 20 18:18:25 rpi sshd[3413]: Failed password for invalid user everett from 5.45.6.66 port 56650 ssh2
2019-08-21 06:41:02
49.88.112.90 attack
Aug 20 22:45:34 localhost sshd\[24519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
Aug 20 22:45:36 localhost sshd\[24519\]: Failed password for root from 49.88.112.90 port 63568 ssh2
Aug 20 22:45:38 localhost sshd\[24519\]: Failed password for root from 49.88.112.90 port 63568 ssh2
...
2019-08-21 06:47:12
36.152.65.206 attackspambots
Automatic report - Port Scan Attack
2019-08-21 06:57:14

最近上报的IP列表

142.34.226.170 142.34.228.153 142.34.249.27 142.34.77.47
8.81.215.116 142.4.0.106 142.4.0.166 142.4.0.161
142.4.0.117 142.35.186.204 142.4.0.220 142.4.0.99
142.4.1.14 142.4.0.174 142.4.1.197 142.4.10.113
142.4.110.149 142.4.112.181 142.4.107.60 142.4.117.58