必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.0.29.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.0.29.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:14:53 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
150.29.0.34.in-addr.arpa domain name pointer 150.29.0.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.29.0.34.in-addr.arpa	name = 150.29.0.34.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.114.98.96 attack
Mar  4 04:20:46 odroid64 sshd\[8790\]: Invalid user adam from 167.114.98.96
Mar  4 04:20:46 odroid64 sshd\[8790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.96
Mar  4 04:20:46 odroid64 sshd\[8790\]: Invalid user adam from 167.114.98.96
Mar  4 04:20:46 odroid64 sshd\[8790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.96
Mar  4 04:20:48 odroid64 sshd\[8790\]: Failed password for invalid user adam from 167.114.98.96 port 40504 ssh2
...
2020-03-05 23:39:12
171.100.18.251 attackbotsspam
9530/tcp
[2020-03-05]1pkt
2020-03-06 00:11:22
167.114.226.137 attackspam
Mar  5 14:47:45 prox sshd[21989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.226.137 
Mar  5 14:47:47 prox sshd[21989]: Failed password for invalid user zhugf from 167.114.226.137 port 48730 ssh2
2020-03-06 00:00:55
37.187.122.195 attackbots
Mar  5 15:48:01 MK-Soft-VM7 sshd[15989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195 
Mar  5 15:48:03 MK-Soft-VM7 sshd[15989]: Failed password for invalid user user01 from 37.187.122.195 port 43440 ssh2
...
2020-03-05 23:49:02
112.6.231.114 attackbotsspam
web-1 [ssh] SSH Attack
2020-03-05 23:38:14
83.31.243.31 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/83.31.243.31/ 
 
 PL - 1H : (88)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 83.31.243.31 
 
 CIDR : 83.24.0.0/13 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 1 
  3H - 10 
  6H - 16 
 12H - 33 
 24H - 56 
 
 DateTime : 2020-03-05 15:37:05 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2020-03-06 00:09:59
81.45.56.199 attackspambots
2020-03-05T15:08:08.076551shield sshd\[10735\]: Invalid user v from 81.45.56.199 port 55374
2020-03-05T15:08:08.080590shield sshd\[10735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.red-81-45-56.staticip.rima-tde.net
2020-03-05T15:08:10.085909shield sshd\[10735\]: Failed password for invalid user v from 81.45.56.199 port 55374 ssh2
2020-03-05T15:13:51.015215shield sshd\[12050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.red-81-45-56.staticip.rima-tde.net  user=root
2020-03-05T15:13:52.968282shield sshd\[12050\]: Failed password for root from 81.45.56.199 port 34682 ssh2
2020-03-05 23:48:46
79.1.210.60 attackbotsspam
57910/udp
[2020-03-05]1pkt
2020-03-06 00:01:56
167.114.98.229 attackbotsspam
Jan 18 18:18:41 odroid64 sshd\[23328\]: Invalid user ubnt from 167.114.98.229
Jan 18 18:18:41 odroid64 sshd\[23328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229
...
2020-03-05 23:42:42
103.254.198.67 attackspambots
Mar  5 12:00:28 firewall sshd[30124]: Invalid user packer from 103.254.198.67
Mar  5 12:00:30 firewall sshd[30124]: Failed password for invalid user packer from 103.254.198.67 port 44098 ssh2
Mar  5 12:08:27 firewall sshd[30299]: Invalid user torus from 103.254.198.67
...
2020-03-05 23:55:40
188.165.148.25 attackbotsspam
Mar  5 15:14:17 localhost sshd[6145]: Invalid user billy from 188.165.148.25 port 52626
Mar  5 15:14:17 localhost sshd[6145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip25.ip-188-165-148.eu
Mar  5 15:14:17 localhost sshd[6145]: Invalid user billy from 188.165.148.25 port 52626
Mar  5 15:14:20 localhost sshd[6145]: Failed password for invalid user billy from 188.165.148.25 port 52626 ssh2
Mar  5 15:23:48 localhost sshd[7109]: Invalid user ling from 188.165.148.25 port 50096
...
2020-03-05 23:50:46
101.91.160.243 attack
Mar  5 16:28:37 MK-Soft-VM3 sshd[6103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.160.243 
Mar  5 16:28:39 MK-Soft-VM3 sshd[6103]: Failed password for invalid user nicolas from 101.91.160.243 port 34932 ssh2
...
2020-03-05 23:58:37
125.214.48.187 attack
9530/tcp
[2020-03-05]1pkt
2020-03-05 23:48:17
45.55.157.147 attackbots
Mar  5 15:31:13 lukav-desktop sshd\[11352\]: Invalid user user from 45.55.157.147
Mar  5 15:31:13 lukav-desktop sshd\[11352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.157.147
Mar  5 15:31:15 lukav-desktop sshd\[11352\]: Failed password for invalid user user from 45.55.157.147 port 52330 ssh2
Mar  5 15:34:23 lukav-desktop sshd\[11406\]: Invalid user user from 45.55.157.147
Mar  5 15:34:23 lukav-desktop sshd\[11406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.157.147
2020-03-06 00:10:31
186.32.16.76 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-05 23:32:48

最近上报的IP列表

33.109.1.200 145.11.23.8 250.5.79.150 32.129.103.103
3.201.171.147 142.243.45.155 37.29.143.131 13.193.9.21
136.23.159.217 16.171.203.159 82.180.16.136 145.147.104.94
60.187.129.200 59.201.200.66 119.131.197.114 142.133.187.188
3.7.108.54 249.128.206.49 59.154.234.131 14.159.183.150