必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.169.29.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.169.29.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 08:07:37 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 22.29.169.214.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 214.169.29.22.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
105.156.24.190 attackbotsspam
firewall-block, port(s): 81/tcp
2020-02-09 05:24:51
112.85.42.178 attack
v+ssh-bruteforce
2020-02-09 05:31:50
37.221.214.29 attackbotsspam
2020-02-08T07:32:12.8800481495-001 sshd[573]: Invalid user gqg from 37.221.214.29 port 39188
2020-02-08T07:32:12.8874531495-001 sshd[573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.221.214.29
2020-02-08T07:32:12.8800481495-001 sshd[573]: Invalid user gqg from 37.221.214.29 port 39188
2020-02-08T07:32:14.8794261495-001 sshd[573]: Failed password for invalid user gqg from 37.221.214.29 port 39188 ssh2
2020-02-08T07:45:25.5677881495-001 sshd[1317]: Invalid user tju from 37.221.214.29 port 52872
2020-02-08T07:45:25.5788011495-001 sshd[1317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.221.214.29
2020-02-08T07:45:25.5677881495-001 sshd[1317]: Invalid user tju from 37.221.214.29 port 52872
2020-02-08T07:45:27.4354111495-001 sshd[1317]: Failed password for invalid user tju from 37.221.214.29 port 52872 ssh2
2020-02-08T07:50:18.7036541495-001 sshd[1621]: Invalid user ahp from 37.221.2........
------------------------------
2020-02-09 05:41:40
82.200.192.58 attackbotsspam
" "
2020-02-09 05:15:28
82.80.176.84 attackbotsspam
Honeypot attack, port: 81, PTR: bzq-82-80-176-84.static.bezeqint.net.
2020-02-09 05:34:42
23.129.64.189 attackspam
Automatic report - Banned IP Access
2020-02-09 05:29:20
14.139.187.171 attack
Feb  8 06:49:42 hgb10301 sshd[27399]: Invalid user jrt from 14.139.187.171 port 15620
Feb  8 06:49:44 hgb10301 sshd[27399]: Failed password for invalid user jrt from 14.139.187.171 port 15620 ssh2
Feb  8 06:49:44 hgb10301 sshd[27399]: Received disconnect from 14.139.187.171 port 15620:11: Bye Bye [preauth]
Feb  8 06:49:44 hgb10301 sshd[27399]: Disconnected from 14.139.187.171 port 15620 [preauth]
Feb  8 06:54:11 hgb10301 sshd[27491]: Invalid user pld from 14.139.187.171 port 3343
Feb  8 06:54:12 hgb10301 sshd[27491]: Failed password for invalid user pld from 14.139.187.171 port 3343 ssh2
Feb  8 06:54:13 hgb10301 sshd[27491]: Received disconnect from 14.139.187.171 port 3343:11: Bye Bye [preauth]
Feb  8 06:54:13 hgb10301 sshd[27491]: Disconnected from 14.139.187.171 port 3343 [preauth]
Feb  8 06:55:10 hgb10301 sshd[27512]: Invalid user ar from 14.139.187.171 port 12690
Feb  8 06:55:12 hgb10301 sshd[27512]: Failed password for invalid user ar from 14.139.187.171 port 1269........
-------------------------------
2020-02-09 05:26:21
36.26.239.171 attackspam
$f2bV_matches
2020-02-09 05:39:40
218.255.139.205 attack
Honeypot attack, port: 445, PTR: static.reserve.wtt.net.hk.
2020-02-09 05:29:38
112.85.42.229 attackspam
k+ssh-bruteforce
2020-02-09 05:08:54
45.227.253.148 attack
22 attempts against mh-misbehave-ban on float
2020-02-09 05:33:14
182.61.45.42 attackspam
Feb  8 20:25:01 * sshd[19313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.45.42
Feb  8 20:25:03 * sshd[19313]: Failed password for invalid user rcg from 182.61.45.42 port 27406 ssh2
2020-02-09 05:02:44
113.53.46.234 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-09 05:17:42
62.152.32.104 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-09 05:17:14
212.64.77.182 attackbotsspam
Feb  8 19:21:42 gw1 sshd[5862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.77.182
Feb  8 19:21:44 gw1 sshd[5862]: Failed password for invalid user zmo from 212.64.77.182 port 41952 ssh2
...
2020-02-09 05:35:49

最近上报的IP列表

188.232.252.50 20.64.185.68 197.114.79.102 147.32.151.37
29.255.9.17 5.215.218.246 96.187.28.211 232.95.180.37
176.193.40.122 174.154.64.133 243.125.118.243 213.138.206.195
141.223.231.162 244.35.29.192 175.134.207.88 240.70.4.140
103.88.255.85 156.252.51.132 227.35.177.136 82.20.8.57