必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.0.29.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.0.29.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:14:53 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
150.29.0.34.in-addr.arpa domain name pointer 150.29.0.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.29.0.34.in-addr.arpa	name = 150.29.0.34.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
2.141.66.247 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/2.141.66.247/ 
 ES - 1H : (52)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN3352 
 
 IP : 2.141.66.247 
 
 CIDR : 2.141.0.0/16 
 
 PREFIX COUNT : 662 
 
 UNIQUE IP COUNT : 10540800 
 
 
 WYKRYTE ATAKI Z ASN3352 :  
  1H - 1 
  3H - 4 
  6H - 6 
 12H - 11 
 24H - 21 
 
 DateTime : 2019-10-17 21:50:43 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-18 06:30:57
178.128.81.60 attackspam
Oct 17 12:03:24 hanapaa sshd\[4131\]: Invalid user idckj from 178.128.81.60
Oct 17 12:03:24 hanapaa sshd\[4131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.60
Oct 17 12:03:26 hanapaa sshd\[4131\]: Failed password for invalid user idckj from 178.128.81.60 port 46960 ssh2
Oct 17 12:07:57 hanapaa sshd\[4501\]: Invalid user bernadine from 178.128.81.60
Oct 17 12:07:57 hanapaa sshd\[4501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.60
2019-10-18 06:24:08
178.128.59.109 attackspam
Unauthorized SSH login attempts
2019-10-18 06:15:46
222.186.190.2 attackspam
Oct 18 01:34:27 server sshd\[24959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 18 01:34:28 server sshd\[24966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 18 01:34:29 server sshd\[24959\]: Failed password for root from 222.186.190.2 port 35746 ssh2
Oct 18 01:34:29 server sshd\[24964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Oct 18 01:34:29 server sshd\[24966\]: Failed password for root from 222.186.190.2 port 42422 ssh2
...
2019-10-18 06:51:54
201.20.36.4 attack
Oct 18 18:41:33 odroid64 sshd\[12123\]: Invalid user harry from 201.20.36.4
Oct 18 18:41:33 odroid64 sshd\[12123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.36.4
Oct 18 18:41:35 odroid64 sshd\[12123\]: Failed password for invalid user harry from 201.20.36.4 port 61010 ssh2
Oct 22 02:21:56 odroid64 sshd\[27326\]: Invalid user william from 201.20.36.4
Oct 22 02:21:56 odroid64 sshd\[27326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.36.4
Oct 22 02:21:58 odroid64 sshd\[27326\]: Failed password for invalid user william from 201.20.36.4 port 21056 ssh2
Nov  6 15:24:46 odroid64 sshd\[12179\]: Invalid user kfserver from 201.20.36.4
Nov  6 15:24:46 odroid64 sshd\[12179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.36.4
Nov  6 15:24:47 odroid64 sshd\[12179\]: Failed password for invalid user kfserver from 201.20.36.4 port 41987 ss
...
2019-10-18 06:14:42
114.239.149.255 attackbots
Oct 17 21:32:01 smtp sshd[20832]: Invalid user user3 from 114.239.149.255
Oct 17 21:32:03 smtp sshd[20832]: Failed password for invalid user user3 from 114.239.149.255 port 33997 ssh2
Oct 17 21:34:14 smtp sshd[21127]: Invalid user parkyr from 114.239.149.255


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.239.149.255
2019-10-18 06:54:15
199.195.249.6 attackbotsspam
Oct 18 00:10:06 eventyay sshd[21869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.249.6
Oct 18 00:10:08 eventyay sshd[21869]: Failed password for invalid user nk from 199.195.249.6 port 42716 ssh2
Oct 18 00:14:02 eventyay sshd[21898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.249.6
...
2019-10-18 06:27:23
201.184.169.106 attackbots
May 25 11:39:48 odroid64 sshd\[2483\]: Invalid user guest from 201.184.169.106
May 25 11:39:48 odroid64 sshd\[2483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106
May 25 11:39:50 odroid64 sshd\[2483\]: Failed password for invalid user guest from 201.184.169.106 port 36584 ssh2
May 29 12:45:08 odroid64 sshd\[18074\]: Invalid user httpd from 201.184.169.106
May 29 12:45:08 odroid64 sshd\[18074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106
May 29 12:45:10 odroid64 sshd\[18074\]: Failed password for invalid user httpd from 201.184.169.106 port 34057 ssh2
Jun  6 12:01:28 odroid64 sshd\[19612\]: User root from 201.184.169.106 not allowed because not listed in AllowUsers
Jun  6 12:01:28 odroid64 sshd\[19612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.169.106  user=root
Jun  6 12:01:30 odroid64 sshd\[19612\]: Fai
...
2019-10-18 06:31:28
201.190.153.11 attack
Jun 22 17:53:04 odroid64 sshd\[27628\]: Invalid user ubuntu from 201.190.153.11
Jun 22 17:53:04 odroid64 sshd\[27628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.190.153.11
Jun 22 17:53:06 odroid64 sshd\[27628\]: Failed password for invalid user ubuntu from 201.190.153.11 port 1954 ssh2
Jun 22 17:53:04 odroid64 sshd\[27628\]: Invalid user ubuntu from 201.190.153.11
Jun 22 17:53:04 odroid64 sshd\[27628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.190.153.11
Jun 22 17:53:06 odroid64 sshd\[27628\]: Failed password for invalid user ubuntu from 201.190.153.11 port 1954 ssh2
...
2019-10-18 06:21:00
201.176.27.160 attack
May 20 01:35:30 odroid64 sshd\[8758\]: User root from 201.176.27.160 not allowed because not listed in AllowUsers
May 20 01:35:30 odroid64 sshd\[8758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.176.27.160  user=root
May 20 01:35:32 odroid64 sshd\[8758\]: Failed password for invalid user root from 201.176.27.160 port 56636 ssh2
...
2019-10-18 06:40:06
201.20.29.212 attackspambots
May 12 16:06:51 odroid64 sshd\[27237\]: User backup from 201.20.29.212 not allowed because not listed in AllowUsers
May 12 16:06:51 odroid64 sshd\[27237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.29.212  user=backup
May 12 16:06:53 odroid64 sshd\[27237\]: Failed password for invalid user backup from 201.20.29.212 port 21001 ssh2
...
2019-10-18 06:15:18
47.74.190.56 attack
Oct 15 05:51:13 odroid64 sshd\[16956\]: User root from 47.74.190.56 not allowed because not listed in AllowUsers
Oct 15 05:51:13 odroid64 sshd\[16956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.190.56  user=root
Oct 15 05:51:15 odroid64 sshd\[16956\]: Failed password for invalid user root from 47.74.190.56 port 45940 ssh2
Oct 15 06:20:16 odroid64 sshd\[4004\]: Invalid user qwert from 47.74.190.56
Oct 15 06:20:16 odroid64 sshd\[4004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.190.56
Oct 15 06:20:17 odroid64 sshd\[4004\]: Failed password for invalid user qwert from 47.74.190.56 port 46184 ssh2
Oct 15 06:24:27 odroid64 sshd\[6248\]: Invalid user git from 47.74.190.56
Oct 15 06:24:27 odroid64 sshd\[6248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.190.56
Oct 15 06:24:29 odroid64 sshd\[6248\]: Failed password for invalid user 
...
2019-10-18 06:36:38
201.190.143.243 attackbots
Jan 29 01:27:41 odroid64 sshd\[23084\]: Invalid user webmail from 201.190.143.243
Jan 29 01:27:41 odroid64 sshd\[23084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.190.143.243
Jan 29 01:27:43 odroid64 sshd\[23084\]: Failed password for invalid user webmail from 201.190.143.243 port 50358 ssh2
...
2019-10-18 06:22:47
144.217.6.107 attackbots
Oct 17 23:31:24 master sshd[8789]: Failed password for root from 144.217.6.107 port 35956 ssh2
Oct 17 23:31:28 master sshd[8791]: Failed password for invalid user admin from 144.217.6.107 port 40908 ssh2
Oct 17 23:31:33 master sshd[8793]: Failed password for root from 144.217.6.107 port 44968 ssh2
Oct 17 23:31:37 master sshd[8795]: Failed password for invalid user admin from 144.217.6.107 port 49858 ssh2
Oct 17 23:31:41 master sshd[8797]: Failed password for invalid user user from 144.217.6.107 port 53564 ssh2
Oct 17 23:31:46 master sshd[8799]: Failed password for invalid user admin from 144.217.6.107 port 57944 ssh2
2019-10-18 06:51:03
97.88.202.45 attackbotsspam
Oct 17 15:51:04 mail sshd\[64923\]: Invalid user admin from 97.88.202.45
Oct 17 15:51:04 mail sshd\[64923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.88.202.45
...
2019-10-18 06:14:16

最近上报的IP列表

33.109.1.200 145.11.23.8 250.5.79.150 32.129.103.103
3.201.171.147 142.243.45.155 37.29.143.131 13.193.9.21
136.23.159.217 16.171.203.159 82.180.16.136 145.147.104.94
60.187.129.200 59.201.200.66 119.131.197.114 142.133.187.188
3.7.108.54 249.128.206.49 59.154.234.131 14.159.183.150