必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.100.157.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57522
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.100.157.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:50:34 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 29.157.100.204.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.157.100.204.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.102.51.58 attack
May 20 21:43:47 debian-2gb-nbg1-2 kernel: \[12262652.653154\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.58 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=27814 PROTO=TCP SPT=45989 DPT=3275 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-21 04:33:30
82.64.32.76 attackspam
Failed password for git from 82.64.32.76 port 47832 ssh2
2020-05-21 04:22:23
83.97.20.35 attack
Port scan: Attack repeated for 24 hours
2020-05-21 04:21:59
103.126.172.6 attackspambots
May 20 20:48:19 ns392434 sshd[31295]: Invalid user muo from 103.126.172.6 port 59282
May 20 20:48:19 ns392434 sshd[31295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.172.6
May 20 20:48:19 ns392434 sshd[31295]: Invalid user muo from 103.126.172.6 port 59282
May 20 20:48:21 ns392434 sshd[31295]: Failed password for invalid user muo from 103.126.172.6 port 59282 ssh2
May 20 20:57:27 ns392434 sshd[31436]: Invalid user agl from 103.126.172.6 port 60988
May 20 20:57:27 ns392434 sshd[31436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.172.6
May 20 20:57:27 ns392434 sshd[31436]: Invalid user agl from 103.126.172.6 port 60988
May 20 20:57:28 ns392434 sshd[31436]: Failed password for invalid user agl from 103.126.172.6 port 60988 ssh2
May 20 21:01:32 ns392434 sshd[31591]: Invalid user kfd from 103.126.172.6 port 38454
2020-05-21 04:14:24
113.57.114.171 attackspambots
Web Server Scan. RayID: 592a49a14e85ed7b, UA: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50, Country: CN
2020-05-21 04:09:50
110.80.155.234 attack
Web Server Scan. RayID: 58f6e03b4fd2e7fd, UA: Mozilla/5.051975669 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36, Country: CN
2020-05-21 04:13:34
113.128.105.21 attackspambots
Web Server Scan. RayID: 593b33f6fcf2e50e, UA: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36, Country: CN
2020-05-21 04:09:02
113.58.227.32 attackspambots
Web Server Scan. RayID: 59280c72ff71ed9b, UA: Mozilla/5.096783921 Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko, Country: CN
2020-05-21 04:09:30
2001:da8:20b:200:100::99 attackspam
Web Server Scan. RayID: 5957effbccd7eaf0, UA: Mozilla/5.051975669 Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36, Country: CN
2020-05-21 04:29:00
153.126.209.200 attack
2020-05-21T02:53:14.374636vivaldi2.tree2.info sshd[13791]: Invalid user jtj from 153.126.209.200
2020-05-21T02:53:14.385783vivaldi2.tree2.info sshd[13791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ik1-340-30446.vs.sakura.ne.jp
2020-05-21T02:53:14.374636vivaldi2.tree2.info sshd[13791]: Invalid user jtj from 153.126.209.200
2020-05-21T02:53:16.001005vivaldi2.tree2.info sshd[13791]: Failed password for invalid user jtj from 153.126.209.200 port 60390 ssh2
2020-05-21T02:55:38.052841vivaldi2.tree2.info sshd[13907]: Invalid user ead from 153.126.209.200
...
2020-05-21 03:57:15
175.152.28.70 attack
Web Server Scan. RayID: 5918b7e5280de805, UA: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36, Country: CN
2020-05-21 03:53:08
94.102.51.28 attackspam
Port scan: Attack repeated for 24 hours
2020-05-21 04:15:36
87.120.136.168 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-21 04:20:25
36.32.3.162 attackbotsspam
Web Server Scan. RayID: 592cee07896ded0f, UA: python-requests/2.21.0, Country: CN
2020-05-21 04:27:14
89.248.162.131 attack
Fail2Ban Ban Triggered
2020-05-21 04:18:26

最近上报的IP列表

28.184.215.206 146.161.235.110 87.246.35.40 223.92.250.93
58.220.24.224 226.97.251.246 230.89.44.190 54.33.208.10
152.107.105.174 48.225.184.22 155.64.22.0 101.168.10.175
141.110.66.109 52.76.16.152 46.219.209.177 34.119.55.237
226.136.129.158 124.178.57.194 253.29.68.169 51.242.60.20