必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ho Chi Minh City

省份(region): Ho Chi Minh

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): The Corporation for Financing & Promoting Technology

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
42.117.29.196 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 21:42:06
42.117.29.79 attack
Telnet Server BruteForce Attack
2020-02-21 18:38:27
42.117.29.5 attackspambots
Port probing on unauthorized port 23
2020-02-16 09:41:39
42.117.29.155 attackbotsspam
Unauthorized connection attempt detected from IP address 42.117.29.155 to port 23 [T]
2020-01-21 00:37:31
42.117.29.223 attack
Telnet/23 MH Probe, BF, Hack -
2020-01-09 00:59:04
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.117.29.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56742
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.117.29.134.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040903 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 10 06:30:37 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 134.29.117.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 67.207.67.3, trying next server
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 134.29.117.42.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
83.226.39.188 attackbots
Unauthorized connection attempt detected from IP address 83.226.39.188 to port 5555
2019-12-20 16:15:34
165.22.186.178 attackspam
Dec 20 07:57:29 web8 sshd\[6633\]: Invalid user backup jian from 165.22.186.178
Dec 20 07:57:29 web8 sshd\[6633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.186.178
Dec 20 07:57:31 web8 sshd\[6633\]: Failed password for invalid user backup jian from 165.22.186.178 port 37014 ssh2
Dec 20 08:02:14 web8 sshd\[9061\]: Invalid user dasya from 165.22.186.178
Dec 20 08:02:14 web8 sshd\[9061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.186.178
2019-12-20 16:17:26
221.140.151.235 attackbots
Dec 20 08:56:38 OPSO sshd\[5856\]: Invalid user aveyron from 221.140.151.235 port 36626
Dec 20 08:56:38 OPSO sshd\[5856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.140.151.235
Dec 20 08:56:40 OPSO sshd\[5856\]: Failed password for invalid user aveyron from 221.140.151.235 port 36626 ssh2
Dec 20 09:02:32 OPSO sshd\[7249\]: Invalid user carew from 221.140.151.235 port 41682
Dec 20 09:02:32 OPSO sshd\[7249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.140.151.235
2019-12-20 16:16:14
129.211.130.66 attackbotsspam
Dec 19 21:36:12 hanapaa sshd\[23804\]: Invalid user theres from 129.211.130.66
Dec 19 21:36:12 hanapaa sshd\[23804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.66
Dec 19 21:36:14 hanapaa sshd\[23804\]: Failed password for invalid user theres from 129.211.130.66 port 36872 ssh2
Dec 19 21:44:14 hanapaa sshd\[24700\]: Invalid user vcsa from 129.211.130.66
Dec 19 21:44:14 hanapaa sshd\[24700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.66
2019-12-20 15:45:53
168.90.89.35 attackbots
Dec 19 22:07:14 eddieflores sshd\[27429\]: Invalid user lehre from 168.90.89.35
Dec 19 22:07:14 eddieflores sshd\[27429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35.megalinkpi.net.br
Dec 19 22:07:16 eddieflores sshd\[27429\]: Failed password for invalid user lehre from 168.90.89.35 port 50260 ssh2
Dec 19 22:14:30 eddieflores sshd\[28134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.90.89.35.megalinkpi.net.br  user=root
Dec 19 22:14:32 eddieflores sshd\[28134\]: Failed password for root from 168.90.89.35 port 53482 ssh2
2019-12-20 16:17:01
104.236.71.107 attack
Automatic report - XMLRPC Attack
2019-12-20 15:42:54
124.195.199.171 attackspam
Host Scan
2019-12-20 16:01:06
88.132.237.187 attackspam
web-1 [ssh_2] SSH Attack
2019-12-20 16:06:32
49.88.112.59 attackbots
Dec 20 08:56:23 localhost sshd\[31119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.59  user=root
Dec 20 08:56:25 localhost sshd\[31119\]: Failed password for root from 49.88.112.59 port 38841 ssh2
Dec 20 08:56:30 localhost sshd\[31119\]: Failed password for root from 49.88.112.59 port 38841 ssh2
2019-12-20 15:58:58
198.108.66.119 attack
firewall-block, port(s): 47808/udp
2019-12-20 16:12:56
180.244.232.192 attack
Host Scan
2019-12-20 16:13:54
198.108.66.120 attackspam
firewall-block, port(s): 47808/udp
2019-12-20 16:10:54
187.72.118.191 attackspam
ssh brute force
2019-12-20 16:14:46
182.61.14.224 attackbotsspam
Dec 20 08:40:20 OPSO sshd\[1962\]: Invalid user garton from 182.61.14.224 port 55424
Dec 20 08:40:20 OPSO sshd\[1962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.224
Dec 20 08:40:22 OPSO sshd\[1962\]: Failed password for invalid user garton from 182.61.14.224 port 55424 ssh2
Dec 20 08:46:17 OPSO sshd\[2984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.224  user=mysql
Dec 20 08:46:19 OPSO sshd\[2984\]: Failed password for mysql from 182.61.14.224 port 44366 ssh2
2019-12-20 15:53:52
222.186.173.238 attackspam
Dec 20 13:19:35 gw1 sshd[31139]: Failed password for root from 222.186.173.238 port 45724 ssh2
Dec 20 13:19:44 gw1 sshd[31139]: Failed password for root from 222.186.173.238 port 45724 ssh2
...
2019-12-20 16:21:34

最近上报的IP列表

197.210.130.186 220.133.221.253 164.77.159.4 51.15.229.217
201.131.244.25 66.85.6.215 63.35.207.29 49.246.37.210
94.191.8.31 188.131.170.119 78.84.202.118 124.13.194.40
206.189.145.160 156.202.89.104 187.76.21.226 138.68.226.175
201.234.253.3 134.209.244.252 141.98.81.183 188.26.93.224