必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
149.129.227.5 attackspambots
 TCP (SYN) 149.129.227.5:5113 -> port 80, len 44
2020-08-13 01:15:23
149.129.225.229 attackbotsspam
k+ssh-bruteforce
2020-08-12 21:30:15
149.129.222.60 attackspambots
Invalid user postgres from 149.129.222.60 port 41158
2020-07-23 18:34:31
149.129.222.60 attackbotsspam
Fail2Ban
2020-07-20 07:13:55
149.129.225.229 attackbotsspam
20 attempts against mh-ssh on install-test
2020-05-14 01:06:43
149.129.222.97 attackspambots
21 attempts against mh-ssh on echoip
2020-05-03 04:53:53
149.129.222.60 attackspambots
Jan 20 13:50:36 pi sshd[6232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.222.60 
Jan 20 13:50:37 pi sshd[6232]: Failed password for invalid user postgres from 149.129.222.60 port 43760 ssh2
2020-03-13 23:51:28
149.129.226.26 attackspambots
Invalid user alex from 149.129.226.26 port 56958
2020-03-13 23:50:16
149.129.226.26 attack
Mar 11 13:06:37 *** sshd[24035]: Invalid user adm from 149.129.226.26
2020-03-11 22:47:27
149.129.222.252 attack
SSH brute force
2020-03-11 08:29:11
149.129.226.26 attackbots
suspicious action Mon, 09 Mar 2020 15:34:28 -0300
2020-03-10 03:43:16
149.129.223.160 attackspambots
2020-03-07T23:00:20.924991ns386461 sshd\[25855\]: Invalid user mysql from 149.129.223.160 port 52392
2020-03-07T23:00:20.929577ns386461 sshd\[25855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.223.160
2020-03-07T23:00:22.635617ns386461 sshd\[25855\]: Failed password for invalid user mysql from 149.129.223.160 port 52392 ssh2
2020-03-07T23:08:29.407429ns386461 sshd\[773\]: Invalid user mcadmin from 149.129.223.160 port 39568
2020-03-07T23:08:29.413727ns386461 sshd\[773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.223.160
...
2020-03-08 07:37:49
149.129.226.26 attack
Mar  1 07:05:37 webhost01 sshd[29381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.226.26
Mar  1 07:05:40 webhost01 sshd[29381]: Failed password for invalid user anukis from 149.129.226.26 port 40596 ssh2
...
2020-03-01 08:18:08
149.129.222.252 attackspambots
DATE:2020-02-28 09:53:15, IP:149.129.222.252, PORT:ssh SSH brute force auth (docker-dc)
2020-02-28 18:13:22
149.129.226.26 attack
Feb 27 21:56:05 gw1 sshd[28612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.226.26
Feb 27 21:56:07 gw1 sshd[28612]: Failed password for invalid user cpanelcabcache from 149.129.226.26 port 42572 ssh2
...
2020-02-28 01:00:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.129.22.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.129.22.42.			IN	A

;; AUTHORITY SECTION:
.			396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 23:55:40 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.22.129.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.22.129.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.66.9.201 attack
Port Scan: TCP/443
2019-09-16 05:28:07
221.212.116.31 attack
Port Scan: UDP/49153
2019-09-16 05:06:52
212.47.238.207 attackbots
Sep 15 20:18:17 MK-Soft-VM6 sshd\[3417\]: Invalid user fz from 212.47.238.207 port 60388
Sep 15 20:18:17 MK-Soft-VM6 sshd\[3417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.238.207
Sep 15 20:18:18 MK-Soft-VM6 sshd\[3417\]: Failed password for invalid user fz from 212.47.238.207 port 60388 ssh2
...
2019-09-16 05:05:29
223.99.60.182 attackbots
Port Scan: UDP/34567
2019-09-16 05:06:13
199.217.115.133 attackspam
Port Scan: TCP/445
2019-09-16 05:08:55
37.6.121.231 attackspambots
Port Scan: TCP/23
2019-09-16 05:30:15
51.15.13.167 attackbotsspam
Port Scan: TCP/1269
2019-09-16 05:26:55
171.121.221.254 attackspambots
Port Scan: TCP/21
2019-09-16 05:12:41
40.137.191.210 attackbots
Port Scan: UDP/137
2019-09-16 05:29:08
151.73.61.3 attackspam
Automatic report - Port Scan Attack
2019-09-16 05:04:06
200.98.117.142 attackspam
Port Scan: TCP/445
2019-09-16 05:08:21
66.193.200.142 attackspambots
Port Scan: UDP/137
2019-09-16 05:24:40
91.113.201.90 attackbotsspam
Port Scan: TCP/8080
2019-09-16 05:22:01
183.214.189.77 attack
Port Scan: TCP/1433
2019-09-16 05:11:23
209.59.116.82 attackbots
Port Scan: UDP/137
2019-09-16 05:36:42

最近上报的IP列表

205.110.223.98 216.211.19.249 137.222.197.255 165.141.212.232
102.72.186.54 138.45.172.75 167.171.122.74 187.76.244.247
245.226.32.20 184.123.199.119 127.43.11.53 125.26.170.39
107.190.84.167 119.192.73.181 190.37.35.91 131.133.2.79
192.89.105.158 198.77.147.199 180.62.95.101 153.21.45.157