必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.11.211.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;29.11.211.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 09:02:40 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 20.211.11.29.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.211.11.29.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
196.38.70.24 attackbots
Dec 26 08:04:31 vmanager6029 sshd\[7288\]: Invalid user bulletins from 196.38.70.24 port 46592
Dec 26 08:04:31 vmanager6029 sshd\[7288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.38.70.24
Dec 26 08:04:33 vmanager6029 sshd\[7288\]: Failed password for invalid user bulletins from 196.38.70.24 port 46592 ssh2
2019-12-26 17:21:37
184.105.139.106 attackbotsspam
firewall-block, port(s): 123/udp
2019-12-26 17:00:27
123.207.167.233 attackspambots
$f2bV_matches
2019-12-26 17:26:38
36.90.209.142 attackbotsspam
Unauthorized connection attempt detected from IP address 36.90.209.142 to port 445
2019-12-26 17:24:41
23.95.115.216 attack
Invalid user hermes from 23.95.115.216 port 39968
2019-12-26 17:14:31
2.184.33.225 attackspam
1577341585 - 12/26/2019 07:26:25 Host: 2.184.33.225/2.184.33.225 Port: 23 TCP Blocked
2019-12-26 17:26:08
141.98.81.38 attackbots
Dec 26 09:07:35 vpn01 sshd[27796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.38
Dec 26 09:07:37 vpn01 sshd[27796]: Failed password for invalid user admin from 141.98.81.38 port 62423 ssh2
...
2019-12-26 17:27:10
109.168.76.53 attackspambots
Dec 26 10:18:26 dedicated sshd[22232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.168.76.53  user=root
Dec 26 10:18:28 dedicated sshd[22232]: Failed password for root from 109.168.76.53 port 57075 ssh2
2019-12-26 17:18:37
118.24.71.83 attackspam
Dec 26 12:01:37 server sshd\[31109\]: Invalid user test from 118.24.71.83
Dec 26 12:01:37 server sshd\[31109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.71.83 
Dec 26 12:01:39 server sshd\[31109\]: Failed password for invalid user test from 118.24.71.83 port 38190 ssh2
Dec 26 12:08:16 server sshd\[32263\]: Invalid user piene from 118.24.71.83
Dec 26 12:08:16 server sshd\[32263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.71.83 
...
2019-12-26 17:10:47
185.176.27.54 attackspam
Dec 26 10:03:21 debian-2gb-nbg1-2 kernel: \[1003731.124713\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.54 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=37039 PROTO=TCP SPT=50291 DPT=39055 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-26 17:23:26
79.124.62.34 attackspambots
12/26/2019-04:10:39.142800 79.124.62.34 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-26 17:27:38
170.84.106.41 attack
Port 22 Scan, PTR: 170.84.106.41.hpnet.com.br.
2019-12-26 17:25:18
180.101.125.162 attack
Dec 26 08:31:28 ArkNodeAT sshd\[4181\]: Invalid user maiz from 180.101.125.162
Dec 26 08:31:28 ArkNodeAT sshd\[4181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.125.162
Dec 26 08:31:30 ArkNodeAT sshd\[4181\]: Failed password for invalid user maiz from 180.101.125.162 port 55892 ssh2
2019-12-26 17:23:57
83.48.30.198 attackbots
1577341624 - 12/26/2019 07:27:04 Host: 83.48.30.198/83.48.30.198 Port: 445 TCP Blocked
2019-12-26 17:00:13
151.80.140.166 attack
Invalid user rabbitmq from 151.80.140.166 port 55230
2019-12-26 17:00:45

最近上报的IP列表

132.74.157.222 145.198.159.238 116.118.11.153 83.91.160.52
169.255.207.228 208.198.178.35 5.84.255.32 207.1.140.250
63.197.200.111 136.91.46.8 48.42.254.79 205.190.248.171
114.58.6.133 185.66.93.58 17.168.94.57 249.247.234.170
31.44.245.207 228.55.151.191 49.138.29.153 233.20.48.170