必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.80.29.182
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56919
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.80.29.182.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 05:46:10 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 182.29.80.150.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 182.29.80.150.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.30.242.57 attack
May 23 08:20:03 mail sshd\\[16706\\]: pam_unix\\(sshd:auth\\): authentication failure\\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.30.242.57 user=root
May 23 08:20:05 mail sshd\\[16706\\]: Failed password for root from 190.30.242.57 port 47714 ssh2
May 23 08:20:12 mail sshd\\[16706\\]: Failed password for root from 190.30.242.57 port 47714 ssh2
2019-05-25 07:32:28
134.175.123.16 attack
May 21 01:42:33 s64-1 sshd[7561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.123.16
May 21 01:42:35 s64-1 sshd[7561]: Failed password for invalid user postgres from 134.175.123.16 port 33900 ssh2
May 21 01:49:41 s64-1 sshd[7674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.123.16
2019-05-21 10:06:46
218.92.0.179 attack
Last failed login: Sun May 12 XX:XX:XX UTC 2019 from 218.92.0.179 on ssh:notty
There were 20X01 failed login attempts since the last successful login.
2019-05-12 22:04:40
141.8.142.176 bots
看样子是yandex搜索引擎的可用性爬虫
141.8.142.176 - - [17/May/2019:17:29:40 +0800] "GET /check-ip/2804:14d:5a83:449f:5ab:f26:15e4:e7ce HTTP/1.1" 200 7939 "-" "Mozilla/5.0 (compatible; YandexAccessibilityBot/3.0; +http://yandex.com/bots)"
2019-05-17 17:33:15
38.100.21.237 bots
疑似爬虫但是流量小
2019-05-21 14:01:53
54.71.187.124 bots
亚马逊机器,未知参数
54.71.187.124 - - [09/May/2019:13:19:05 +0800] "GET /check-ip/162.209.84.154&ss=fb&rt=162.209.84.154+-+IPInfo&cd=KhM3OTYwOTgyODEyNTczODUyNjQyMho2ZjJlMmIwNTY4YzIxNDk2OmNvbTplbjpVUw&ssp=AMJHsmXNULk8-X0y9ftVBg3MZ55TktPPUg HTTP/1.1" 200 3051 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"
54.71.187.124 - - [09/May/2019:13:19:05 +0800] "GET /check-ip/162.209.84.154&ss=gp&rt=162.209.84.154+-+IPInfo&cd=KhM3OTYwOTgyODEyNTczODUyNjQyMho2ZjJlMmIwNTY4YzIxNDk2OmNvbTplbjpVUw&ssp=AMJHsmXNULk8-X0y9ftVBg3MZ55TktPPUg HTTP/1.1" 200 3050 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0"
54.70.53.60 - - [09/May/2019:13:19:05 +0800] "GET /check-ip/162.209.84.154&ss=fb&rt=162.209.84.154+-+IPInfo&cd=KhMyMjYzNTA5MTAxNzU0NDU5NTk3Mho2ZjJlMmIwNTY4YzIxNDk2OmNvbTplbjpVUw&ssp=AMJHsmXNULk8-X0y9ftVBg3MZ55TktPPUg HTTP/1.1" 200 3052 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0"
54.70.53.60 - - [09/May/2019:13:19:05 +0800] "GET /check-ip/162.209.84.154&ss=gp&rt=162.209.84.154+-+IPInfo&cd=KhMyMjYzNTA5MTAxNzU0NDU5NTk3Mho2ZjJlMmIwNTY4YzIxNDk2OmNvbTplbjpVUw&ssp=AMJHsmXNULk8-X0y9ftVBg3MZ55TktPPUg HTTP/1.1" 200 3047 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0"
2019-05-09 14:00:03
46.0.118.192 bots
俄罗斯爬虫
2019-06-04 06:49:17
54.221.53.134 spambots
利用ua字段进行推广的嫌疑
54.221.53.134 - - [15/May/2019:14:13:22 +0800] "GET /check-ip/190.81.186.114 HTTP/1.1" 200 10363 "-" "Slackbot-LinkExpanding 1.0 (+https://api.slack.com/robots)"
34.207.74.88 - - [15/May/2019:14:13:23 +0800] "GET /favicon.ico HTTP/1.1" 200 4286 "-" "Slackbot 1.0 (+https://api.slack.com/robots)"
2019-05-15 14:16:00
121.138.174.176 attack
May 6 17:49:14 mail sshd\\[17774\\]: Invalid user admin from 121.138.174.176\\
May 6 17:49:15 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
May 6 17:49:17 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
May 6 17:49:19 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
May 6 17:49:21 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
May 6 17:49:23 mail sshd\\[17774\\]: Failed password for invalid user admin from 121.138.174.176 port 47833 ssh2\\
2019-05-25 07:34:15
3.92.45.174 bots
应该是adsense合作的一个广告商
3.92.45.174 - - [10/May/2019:08:19:00 +0800] "GET /ads.txt HTTP/1.1" 301 194 "-" "Jersey/2.25.1 (HttpUrlConnection 1.8.0_141)"
3.92.45.174 - - [10/May/2019:08:19:05 +0800] "GET /ads.txt HTTP/1.1" 404 232 "-" "Jersey/2.25.1 (HttpUrlConnection 1.8.0_141)"
2019-05-10 08:20:35
91.203.101.134 attack
攻擊信件主機
2019-05-08 17:06:35
172.58.221.194 attack
Google account has been hacked into. Recovery ip address comes up in Providence R.I.. Can you help me access my google account
2019-06-12 01:31:18
203.129.219.198 attack
Bruteforce ssh attacks
2019-05-28 23:42:03
197.234.221.107 bots
197.234.221.107 - - [03/Jun/2019:11:57:32 +0800] "GET /check-ip/66.210.62.119 HTTP/1.1" 200 10381 "https://ipinfo.asytech.cn" "DuckDuckBot/1.0; (+http://duckduckgo.com/duckduckbot.html)"
197.234.221.107 - - [03/Jun/2019:11:57:32 +0800] "GET /check-ip/43.51.218.99 HTTP/1.1" 200 10479 "https://ipinfo.asytech.cn" "DuckDuckBot/1.0; (+http://duckduckgo.com/duckduckbot.html)"
197.234.221.107 - - [03/Jun/2019:11:57:32 +0800] "GET /check-ip/13.173.52.241 HTTP/1.1" 200 10609 "https://ipinfo.asytech.cn" "DuckDuckBot/1.0; (+http://duckduckgo.com/duckduckbot.html)"
197.234.221.107 - - [03/Jun/2019:11:57:34 +0800] "GET /check-ip/150.95.52.71 HTTP/1.1" 200 10158 "https://ipinfo.asytech.cn" "DuckDuckBot/1.0; (+http://duckduckgo.com/duckduckbot.html)"
197.234.221.107 - - [03/Jun/2019:11:57:34 +0800] "GET /check-ip/47.35.150.152 HTTP/1.1" 200 10016 "https://ipinfo.asytech.cn" "DuckDuckBot/1.0; (+http://duckduckgo.com/duckduckbot.html)"
197.234.221.107 - - [03/Jun/2019:11:57:37 +0800] "GET /check-ip/189.20.50.251 HTTP/1.1" 200 10071 "https://ipinfo.asytech.cn" "DuckDuckBot/1.0; (+http://duckduckgo.com/duckduckbot.html)"
2019-06-03 11:58:23
118.163.196.1 attack
phpmyadmin db攻击
2019-05-09 20:13:46

最近上报的IP列表

198.218.111.77 101.34.230.150 39.198.17.29 151.18.13.75
221.174.20.2 68.68.188.120 174.190.184.157 52.65.99.61
32.40.71.41 233.207.171.69 28.182.229.57 133.249.56.184
4.96.205.179 204.213.84.25 12.139.1.22 142.82.198.77
231.119.18.205 191.188.96.116 83.85.219.29 90.244.136.254