必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.29.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.18.29.141.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 13:16:03 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 141.29.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.29.18.149.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.137.235.17 attack
SSH login attempts.
2020-03-11 21:29:34
103.212.34.28 attackspam
Port probing on unauthorized port 445
2020-03-11 21:31:59
222.186.31.166 attackbotsspam
[MK-VM5] SSH login failed
2020-03-11 21:44:45
182.74.86.75 attackbots
Attempted connection to port 1433.
2020-03-11 21:14:02
92.222.90.130 attack
SSH login attempts.
2020-03-11 21:40:50
40.92.74.56 attack
TCP Port: 25      invalid blocked  spam-sorbs also backscatter           (227)
2020-03-11 21:23:16
58.229.187.72 attack
Attempted connection to port 445.
2020-03-11 21:03:18
43.240.117.219 attack
Attempted connection to port 445.
2020-03-11 21:03:50
201.150.102.180 attackbots
Attempted connection to port 4567.
2020-03-11 21:11:19
182.184.61.177 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-11 21:43:00
83.222.97.197 attack
SSH login attempts.
2020-03-11 21:05:30
167.172.131.124 attackbots
Mar 11 10:34:15 h2034429 sshd[13243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.131.124  user=r.r
Mar 11 10:34:16 h2034429 sshd[13243]: Failed password for r.r from 167.172.131.124 port 54582 ssh2
Mar 11 10:34:16 h2034429 sshd[13243]: Received disconnect from 167.172.131.124 port 54582:11: Bye Bye [preauth]
Mar 11 10:34:16 h2034429 sshd[13243]: Disconnected from 167.172.131.124 port 54582 [preauth]
Mar 11 10:36:57 h2034429 sshd[13285]: Invalid user igor from 167.172.131.124
Mar 11 10:36:57 h2034429 sshd[13285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.131.124
Mar 11 10:36:59 h2034429 sshd[13285]: Failed password for invalid user igor from 167.172.131.124 port 37324 ssh2
Mar 11 10:36:59 h2034429 sshd[13285]: Received disconnect from 167.172.131.124 port 37324:11: Bye Bye [preauth]
Mar 11 10:36:59 h2034429 sshd[13285]: Disconnected from 167.172.131.124 port 37324 [........
-------------------------------
2020-03-11 21:24:34
46.101.39.199 attackspambots
Mar 11 13:15:30 localhost sshd[119199]: Invalid user ftpguest from 46.101.39.199 port 42696
Mar 11 13:15:30 localhost sshd[119199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.39.199
Mar 11 13:15:30 localhost sshd[119199]: Invalid user ftpguest from 46.101.39.199 port 42696
Mar 11 13:15:32 localhost sshd[119199]: Failed password for invalid user ftpguest from 46.101.39.199 port 42696 ssh2
Mar 11 13:19:50 localhost sshd[119633]: Invalid user minecraft from 46.101.39.199 port 59772
...
2020-03-11 21:39:56
37.139.9.23 attackbots
Invalid user bridaldate from 37.139.9.23 port 56332
2020-03-11 21:28:23
106.13.234.23 attackbots
Mar 10 15:53:45 liveconfig01 sshd[12873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.234.23  user=r.r
Mar 10 15:53:47 liveconfig01 sshd[12873]: Failed password for r.r from 106.13.234.23 port 37628 ssh2
Mar 10 15:53:47 liveconfig01 sshd[12873]: Received disconnect from 106.13.234.23 port 37628:11: Bye Bye [preauth]
Mar 10 15:53:47 liveconfig01 sshd[12873]: Disconnected from 106.13.234.23 port 37628 [preauth]
Mar 10 16:04:44 liveconfig01 sshd[13559]: Invalid user test1 from 106.13.234.23
Mar 10 16:04:44 liveconfig01 sshd[13559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.234.23
Mar 10 16:04:46 liveconfig01 sshd[13559]: Failed password for invalid user test1 from 106.13.234.23 port 54510 ssh2
Mar 10 16:04:46 liveconfig01 sshd[13559]: Received disconnect from 106.13.234.23 port 54510:11: Bye Bye [preauth]
Mar 10 16:04:46 liveconfig01 sshd[13559]: Disconnected from 106.13........
-------------------------------
2020-03-11 21:30:33

最近上报的IP列表

104.144.34.246 154.27.23.30 23.250.32.164 45.166.156.68
164.163.32.3 113.121.92.40 95.181.151.227 77.83.87.41
151.82.112.116 23.254.101.248 31.172.77.18 94.30.243.71
95.90.194.231 95.132.211.100 80.187.75.153 82.63.23.97
64.252.114.170 183.130.130.73 175.178.237.54 88.218.66.113