必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Aktau

省份(region): Mangistauskaya Oblast'

国家(country): Kazakhstan

运营商(isp): Kazakhtelecom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.132.137.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32776
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.132.137.229.			IN	A

;; AUTHORITY SECTION:
.			485	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011600 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 16 21:03:16 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
229.137.132.2.in-addr.arpa domain name pointer 2.132.137.229.megaline.telecom.kz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
229.137.132.2.in-addr.arpa	name = 2.132.137.229.megaline.telecom.kz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
186.229.24.194 attackspam
SSH Brute Force
2020-04-21 18:25:38
49.235.122.188 attackspambots
" "
2020-04-21 18:04:18
49.82.193.166 attackbotsspam
Email rejected due to spam filtering
2020-04-21 17:52:31
13.82.129.103 attackspambots
DDos
2020-04-21 18:24:18
106.13.173.12 attack
SSH brute-force: detected 10 distinct usernames within a 24-hour window.
2020-04-21 18:18:16
133.130.89.210 attackbotsspam
SSH bruteforce
2020-04-21 18:07:27
181.30.28.201 attackspambots
Invalid user ge from 181.30.28.201 port 41576
2020-04-21 18:25:18
189.224.20.183 attackbotsspam
20/4/20@23:50:24: FAIL: Alarm-Network address from=189.224.20.183
20/4/20@23:50:24: FAIL: Alarm-Network address from=189.224.20.183
...
2020-04-21 17:57:27
72.167.190.154 attackbots
xmlrpc attack
2020-04-21 18:10:08
123.207.78.83 attack
Apr 21 01:09:04 server1 sshd\[3682\]: Invalid user test1 from 123.207.78.83
Apr 21 01:09:04 server1 sshd\[3682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.78.83 
Apr 21 01:09:05 server1 sshd\[3682\]: Failed password for invalid user test1 from 123.207.78.83 port 48328 ssh2
Apr 21 01:14:33 server1 sshd\[5223\]: Invalid user cf from 123.207.78.83
Apr 21 01:14:33 server1 sshd\[5223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.78.83 
...
2020-04-21 18:07:44
112.113.159.178 attackbots
leo_www
2020-04-21 18:23:13
217.170.206.138 attackbotsspam
firewall-block, port(s): 80/tcp
2020-04-21 17:58:34
206.189.18.40 attack
(sshd) Failed SSH login from 206.189.18.40 (GB/United Kingdom/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 21 09:51:31 amsweb01 sshd[17328]: Invalid user postgresql from 206.189.18.40 port 51704
Apr 21 09:51:33 amsweb01 sshd[17328]: Failed password for invalid user postgresql from 206.189.18.40 port 51704 ssh2
Apr 21 10:03:41 amsweb01 sshd[18410]: Invalid user pq from 206.189.18.40 port 38858
Apr 21 10:03:43 amsweb01 sshd[18410]: Failed password for invalid user pq from 206.189.18.40 port 38858 ssh2
Apr 21 10:08:14 amsweb01 sshd[18822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.18.40  user=root
2020-04-21 17:56:18
187.137.68.83 attack
Unauthorized connection attempt detected from IP address 187.137.68.83 to port 8080
2020-04-21 18:06:05
84.17.51.84 attack
(From apps@connect.software) Please share with your superior: 
 
The world is on quarantine. People stay at home. Lack of eye contact makes consumers frustrated. 
 
Win over the situation! Establish direct contact with your client. get every participant connected into your new digital process with Connect remote collaboration technology! 
 
Upgrade your website with live video & chats allowing every process participant to interact digitally. Launch a brand mobile app of your brand to reach audience with phones and tablets for cross-platform compatibility. 
 
Receive more orders as a result of free app notifications and automated messaging. 
Sell more with built-in chatbots, live operator chats & real-time video calls. 
 
Boost staff effectiveness and improve sales within a matter of weeks from app activation! 
 
Activate a start version of our white-label remote collaboration platform with live chats and instant video calls. 
 
Get an app within a week to open your own secure digital gateway fo
2020-04-21 18:26:50

最近上报的IP列表

53.143.47.112 240.0.248.58 90.35.228.60 182.135.241.19
232.193.141.21 96.120.27.197 7.103.3.87 16.72.82.80
12.46.4.47 182.65.243.225 65.65.100.76 205.203.97.98
20.208.162.252 61.44.109.77 202.129.252.8 11.129.0.3
28.89.2.99 216.126.238.138 238.181.101.135 208.30.77.159