必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.29.168.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;44.29.168.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 08:38:24 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 142.168.29.44.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.168.29.44.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.70.96.195 attack
Sep 27 03:58:53 server sshd\[13319\]: Invalid user heitor from 77.70.96.195 port 57188
Sep 27 03:58:53 server sshd\[13319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.70.96.195
Sep 27 03:58:55 server sshd\[13319\]: Failed password for invalid user heitor from 77.70.96.195 port 57188 ssh2
Sep 27 04:02:36 server sshd\[18031\]: Invalid user fz from 77.70.96.195 port 41184
Sep 27 04:02:36 server sshd\[18031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.70.96.195
2019-09-27 09:22:13
67.55.92.90 attackspam
Sep 26 21:06:50 xtremcommunity sshd\[6658\]: Invalid user monitor from 67.55.92.90 port 60700
Sep 26 21:06:50 xtremcommunity sshd\[6658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.90
Sep 26 21:06:52 xtremcommunity sshd\[6658\]: Failed password for invalid user monitor from 67.55.92.90 port 60700 ssh2
Sep 26 21:10:51 xtremcommunity sshd\[6808\]: Invalid user admin from 67.55.92.90 port 43826
Sep 26 21:10:51 xtremcommunity sshd\[6808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.90
...
2019-09-27 09:19:48
218.246.5.112 attack
Sep 26 14:52:10 tdfoods sshd\[1577\]: Invalid user ftpuser from 218.246.5.112
Sep 26 14:52:10 tdfoods sshd\[1577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.246.5.112
Sep 26 14:52:12 tdfoods sshd\[1577\]: Failed password for invalid user ftpuser from 218.246.5.112 port 41176 ssh2
Sep 26 14:56:48 tdfoods sshd\[2069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.246.5.112  user=root
Sep 26 14:56:50 tdfoods sshd\[2069\]: Failed password for root from 218.246.5.112 port 51020 ssh2
2019-09-27 09:01:11
129.204.58.180 attackspam
Sep 26 15:00:12 lcprod sshd\[10507\]: Invalid user ftpuser from 129.204.58.180
Sep 26 15:00:12 lcprod sshd\[10507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.58.180
Sep 26 15:00:14 lcprod sshd\[10507\]: Failed password for invalid user ftpuser from 129.204.58.180 port 50504 ssh2
Sep 26 15:05:50 lcprod sshd\[11056\]: Invalid user wiki from 129.204.58.180
Sep 26 15:05:50 lcprod sshd\[11056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.58.180
2019-09-27 09:08:35
45.82.153.37 attackspambots
2019-09-27 02:58:04 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data \(set_id=hostmaster@nopcommerce.it\)
2019-09-27 02:58:12 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data \(set_id=hostmaster\)
2019-09-27 02:58:28 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data
2019-09-27 02:58:44 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data
2019-09-27 02:58:54 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data
2019-09-27 09:03:09
139.99.144.191 attackspam
Sep 26 20:49:56 plusreed sshd[6943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.144.191  user=root
Sep 26 20:49:58 plusreed sshd[6943]: Failed password for root from 139.99.144.191 port 47464 ssh2
...
2019-09-27 08:55:56
67.222.106.185 attackbotsspam
Sep 26 15:09:20 friendsofhawaii sshd\[29825\]: Invalid user sex from 67.222.106.185
Sep 26 15:09:20 friendsofhawaii sshd\[29825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.222.106.185
Sep 26 15:09:22 friendsofhawaii sshd\[29825\]: Failed password for invalid user sex from 67.222.106.185 port 53228 ssh2
Sep 26 15:13:53 friendsofhawaii sshd\[30193\]: Invalid user xavier from 67.222.106.185
Sep 26 15:13:53 friendsofhawaii sshd\[30193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.222.106.185
2019-09-27 09:15:20
122.52.197.171 attackbots
2019-09-27T01:03:32.499507abusebot-2.cloudsearch.cf sshd\[23635\]: Invalid user nxpgsql from 122.52.197.171 port 61216
2019-09-27 09:09:05
211.142.116.198 attackspambots
ssh failed login
2019-09-27 08:59:56
81.30.212.14 attackbots
Sep 27 03:23:25 core sshd[1724]: Invalid user vbox from 81.30.212.14 port 33492
Sep 27 03:23:26 core sshd[1724]: Failed password for invalid user vbox from 81.30.212.14 port 33492 ssh2
...
2019-09-27 09:28:42
115.28.44.252 attack
(mod_security) mod_security (id:240335) triggered by 115.28.44.252 (CN/China/-): 5 in the last 3600 secs
2019-09-27 09:22:31
103.253.42.34 attackbotsspam
103.253.42.34 has been banned from MailServer for Abuse
...
2019-09-27 08:56:37
139.199.3.207 attackspambots
Sep 26 14:57:44 web9 sshd\[5478\]: Invalid user ubnt from 139.199.3.207
Sep 26 14:57:44 web9 sshd\[5478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.3.207
Sep 26 14:57:46 web9 sshd\[5478\]: Failed password for invalid user ubnt from 139.199.3.207 port 34010 ssh2
Sep 26 15:01:43 web9 sshd\[6291\]: Invalid user serwis from 139.199.3.207
Sep 26 15:01:43 web9 sshd\[6291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.3.207
2019-09-27 09:07:51
144.217.234.174 attackbotsspam
Sep 27 02:41:12 SilenceServices sshd[30490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.234.174
Sep 27 02:41:14 SilenceServices sshd[30490]: Failed password for invalid user va from 144.217.234.174 port 49083 ssh2
Sep 27 02:45:21 SilenceServices sshd[619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.234.174
2019-09-27 09:03:25
222.186.190.92 attackbotsspam
2019-09-27T02:35:23.234844stark.klein-stark.info sshd\[3715\]: Failed none for root from 222.186.190.92 port 4464 ssh2
2019-09-27T02:35:24.517269stark.klein-stark.info sshd\[3715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
2019-09-27T02:35:26.090157stark.klein-stark.info sshd\[3715\]: Failed password for root from 222.186.190.92 port 4464 ssh2
...
2019-09-27 09:31:13

最近上报的IP列表

172.160.234.72 138.5.68.249 132.243.48.39 15.37.170.108
203.8.93.176 175.202.205.198 201.238.72.248 84.150.224.230
157.132.33.102 55.25.212.241 162.61.50.241 192.223.94.40
198.87.251.188 214.84.235.165 158.121.234.57 47.141.19.75
48.112.239.178 79.97.232.178 96.147.124.111 127.27.197.19