必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.141.29.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.141.29.71.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 03:49:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
71.29.141.145.in-addr.arpa domain name pointer 145.141.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
71.29.141.145.in-addr.arpa	name = 145.141.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.98.203.29 attackbotsspam
Unauthorized connection attempt from IP address 202.98.203.29 on Port 445(SMB)
2020-02-08 19:02:21
180.76.248.194 attackbotsspam
Feb  8 04:51:43 prox sshd[23382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.248.194 
Feb  8 04:51:45 prox sshd[23382]: Failed password for invalid user kng from 180.76.248.194 port 50228 ssh2
2020-02-08 18:53:54
123.0.198.61 attack
Telnet Server BruteForce Attack
2020-02-08 18:58:14
121.229.2.190 attackbots
2020-02-08T02:56:09.6526721495-001 sshd[54762]: Invalid user ylo from 121.229.2.190 port 57358
2020-02-08T02:56:09.6561551495-001 sshd[54762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.2.190
2020-02-08T02:56:09.6526721495-001 sshd[54762]: Invalid user ylo from 121.229.2.190 port 57358
2020-02-08T02:56:11.8356961495-001 sshd[54762]: Failed password for invalid user ylo from 121.229.2.190 port 57358 ssh2
2020-02-08T02:59:51.8401881495-001 sshd[54941]: Invalid user xau from 121.229.2.190 port 50200
2020-02-08T02:59:51.8484041495-001 sshd[54941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.2.190
2020-02-08T02:59:51.8401881495-001 sshd[54941]: Invalid user xau from 121.229.2.190 port 50200
2020-02-08T02:59:53.8367971495-001 sshd[54941]: Failed password for invalid user xau from 121.229.2.190 port 50200 ssh2
2020-02-08T03:03:37.2221201495-001 sshd[55181]: Invalid user jwm from 121.229.2.
...
2020-02-08 19:11:38
14.191.63.162 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-08 18:39:18
37.49.231.127 attack
Port 5038 scan denied
2020-02-08 18:42:34
180.177.105.6 attackspambots
Honeypot attack, port: 81, PTR: 180-177-105-6.dynamic.kbronet.com.tw.
2020-02-08 18:43:14
114.32.120.19 attack
Honeypot attack, port: 81, PTR: 114-32-120-19.HINET-IP.hinet.net.
2020-02-08 18:51:58
103.23.102.3 attackspambots
Automatic report - Banned IP Access
2020-02-08 19:10:52
186.151.18.213 attackbotsspam
SSH Brute-Forcing (server1)
2020-02-08 19:14:46
180.241.47.214 attackbotsspam
1581137529 - 02/08/2020 05:52:09 Host: 180.241.47.214/180.241.47.214 Port: 445 TCP Blocked
2020-02-08 18:35:22
106.54.64.77 attackspambots
$f2bV_matches
2020-02-08 19:04:19
176.215.246.202 attackspam
Honeypot attack, port: 81, PTR: dynamicip-176-215-246-202.pppoe.irkutsk.ertelecom.ru.
2020-02-08 19:14:04
5.196.7.133 attackbots
Feb  8 10:54:42 game-panel sshd[4043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.7.133
Feb  8 10:54:44 game-panel sshd[4043]: Failed password for invalid user vqi from 5.196.7.133 port 57868 ssh2
Feb  8 10:57:36 game-panel sshd[4151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.7.133
2020-02-08 19:13:25
148.70.125.42 attackbots
2020-02-08T08:25:36.630408abusebot-2.cloudsearch.cf sshd[5872]: Invalid user jar from 148.70.125.42 port 60394
2020-02-08T08:25:36.635942abusebot-2.cloudsearch.cf sshd[5872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.125.42
2020-02-08T08:25:36.630408abusebot-2.cloudsearch.cf sshd[5872]: Invalid user jar from 148.70.125.42 port 60394
2020-02-08T08:25:38.393623abusebot-2.cloudsearch.cf sshd[5872]: Failed password for invalid user jar from 148.70.125.42 port 60394 ssh2
2020-02-08T08:30:21.457432abusebot-2.cloudsearch.cf sshd[6118]: Invalid user bry from 148.70.125.42 port 56040
2020-02-08T08:30:21.465040abusebot-2.cloudsearch.cf sshd[6118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.125.42
2020-02-08T08:30:21.457432abusebot-2.cloudsearch.cf sshd[6118]: Invalid user bry from 148.70.125.42 port 56040
2020-02-08T08:30:23.679695abusebot-2.cloudsearch.cf sshd[6118]: Failed password for inva
...
2020-02-08 18:56:52

最近上报的IP列表

107.11.69.247 60.224.110.131 31.91.224.93 54.45.133.65
78.144.73.199 132.116.178.48 34.117.76.208 94.220.249.163
23.240.116.225 44.6.126.2 31.100.11.54 140.75.160.34
65.15.226.166 216.176.118.151 239.139.130.31 146.68.84.26
208.120.85.172 108.199.68.49 73.198.244.44 62.71.8.161