必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.142.129.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.142.129.34.			IN	A

;; AUTHORITY SECTION:
.			22	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 169 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 01:57:37 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
b';; connection timed out; no servers could be reached
'
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 34.129.142.33.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.91.249.91 attackbotsspam
$f2bV_matches
2019-08-29 10:42:48
81.22.45.150 attackspambots
Aug 29 04:25:24 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.150 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=51803 PROTO=TCP SPT=43466 DPT=3593 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-29 10:38:05
117.185.62.146 attackspambots
Aug 29 05:12:52 localhost sshd\[22458\]: Invalid user admin from 117.185.62.146 port 34581
Aug 29 05:12:52 localhost sshd\[22458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.185.62.146
Aug 29 05:12:54 localhost sshd\[22458\]: Failed password for invalid user admin from 117.185.62.146 port 34581 ssh2
2019-08-29 11:13:42
106.52.251.166 attack
Aug 29 02:01:41 mail sshd\[16900\]: Failed password for invalid user www from 106.52.251.166 port 44434 ssh2
Aug 29 02:04:55 mail sshd\[17263\]: Invalid user git from 106.52.251.166 port 47884
Aug 29 02:04:55 mail sshd\[17263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.251.166
Aug 29 02:04:57 mail sshd\[17263\]: Failed password for invalid user git from 106.52.251.166 port 47884 ssh2
Aug 29 02:08:16 mail sshd\[17715\]: Invalid user suraj from 106.52.251.166 port 51362
Aug 29 02:08:16 mail sshd\[17715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.251.166
2019-08-29 10:45:32
212.154.133.98 attackspambots
firewall-block, port(s): 445/tcp
2019-08-29 11:13:15
177.135.93.227 attack
Feb 10 00:28:44 vtv3 sshd\[27426\]: Invalid user account from 177.135.93.227 port 47678
Feb 10 00:28:44 vtv3 sshd\[27426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.93.227
Feb 10 00:28:46 vtv3 sshd\[27426\]: Failed password for invalid user account from 177.135.93.227 port 47678 ssh2
Feb 10 00:35:47 vtv3 sshd\[29716\]: Invalid user jenkins from 177.135.93.227 port 37790
Feb 10 00:35:47 vtv3 sshd\[29716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.93.227
Feb 19 15:33:25 vtv3 sshd\[21512\]: Invalid user shoutcast from 177.135.93.227 port 54820
Feb 19 15:33:25 vtv3 sshd\[21512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.93.227
Feb 19 15:33:27 vtv3 sshd\[21512\]: Failed password for invalid user shoutcast from 177.135.93.227 port 54820 ssh2
Feb 19 15:38:44 vtv3 sshd\[22914\]: Invalid user alaadeen from 177.135.93.227 port 51250
Feb 19 15:38:44
2019-08-29 10:41:41
192.3.61.145 attack
Aug 28 22:27:10 plusreed sshd[13613]: Invalid user 123456 from 192.3.61.145
...
2019-08-29 11:26:59
35.222.137.80 attackbotsspam
Forbidden directory scan :: 2019/08/29 09:51:07 [error] 7635#7635: *182275 access forbidden by rule, client: 35.222.137.80, server: [censored_1], request: "GET /wp-content/uploads/wp-lister/wplister.log HTTP/1.1", host: "[censored_1]"
2019-08-29 10:54:56
106.12.222.40 attackbots
2019-08-28T23:51:10.264845abusebot-2.cloudsearch.cf sshd\[29755\]: Invalid user oracle from 106.12.222.40 port 38152
2019-08-29 10:52:36
178.128.210.191 attack
2019-08-29T02:50:19.106551abusebot-3.cloudsearch.cf sshd\[1518\]: Invalid user page from 178.128.210.191 port 59046
2019-08-29 10:58:27
37.187.23.116 attackbotsspam
Aug 29 04:09:13 cp sshd[20412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.23.116
2019-08-29 11:32:14
37.139.13.105 attack
2019-08-24T23:31:04.204192wiz-ks3 sshd[25513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105  user=root
2019-08-24T23:31:05.662405wiz-ks3 sshd[25513]: Failed password for root from 37.139.13.105 port 32914 ssh2
2019-08-24T23:35:46.796103wiz-ks3 sshd[25546]: Invalid user radvd from 37.139.13.105 port 57222
2019-08-24T23:35:46.798222wiz-ks3 sshd[25546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105
2019-08-24T23:35:46.796103wiz-ks3 sshd[25546]: Invalid user radvd from 37.139.13.105 port 57222
2019-08-24T23:35:48.637647wiz-ks3 sshd[25546]: Failed password for invalid user radvd from 37.139.13.105 port 57222 ssh2
2019-08-24T23:40:54.503620wiz-ks3 sshd[25580]: Invalid user jean from 37.139.13.105 port 54128
2019-08-24T23:40:54.505670wiz-ks3 sshd[25580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105
2019-08-24T23:40:54.503620wiz-ks3 sshd[25580]: Inva
2019-08-29 11:09:06
77.247.110.125 attackbotsspam
\[2019-08-28 23:12:33\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-28T23:12:33.798-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1022301148243625001",SessionID="0x7f7b30db7498",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.125/55806",ACLName="no_extension_match"
\[2019-08-28 23:12:52\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-28T23:12:52.003-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="2016901148443071002",SessionID="0x7f7b301f31b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.125/50276",ACLName="no_extension_match"
\[2019-08-28 23:12:54\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-28T23:12:54.218-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="16401148614236007",SessionID="0x7f7b3087b658",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.125/57613",AC
2019-08-29 11:14:39
176.214.81.217 attack
Aug 28 16:38:15 hanapaa sshd\[3803\]: Invalid user web from 176.214.81.217
Aug 28 16:38:15 hanapaa sshd\[3803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.81.217
Aug 28 16:38:17 hanapaa sshd\[3803\]: Failed password for invalid user web from 176.214.81.217 port 59623 ssh2
Aug 28 16:42:21 hanapaa sshd\[4339\]: Invalid user sm from 176.214.81.217
Aug 28 16:42:21 hanapaa sshd\[4339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.81.217
2019-08-29 10:45:17
195.9.32.22 attackspambots
Aug 29 05:36:55 yabzik sshd[23577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22
Aug 29 05:36:56 yabzik sshd[23577]: Failed password for invalid user magda from 195.9.32.22 port 52821 ssh2
Aug 29 05:42:39 yabzik sshd[25799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22
2019-08-29 10:52:58

最近上报的IP列表

118.190.94.79 118.190.99.59 118.190.99.72 118.192.42.162
118.193.104.10 118.193.146.212 118.193.32.180 217.41.182.33
118.193.35.205 118.193.39.167 198.55.161.220 118.193.41.203
118.193.46.51 118.193.47.170 118.193.47.231 118.193.58.115
118.193.59.133 118.239.13.238 118.239.13.249 118.239.19.237