必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.114.202.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10468
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.114.202.129.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 15:56:38 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 129.202.114.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.202.114.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.110.66.66 attackspam
Sep  3 02:00:02 vtv3 sshd\[18359\]: Invalid user rich from 62.110.66.66 port 41650
Sep  3 02:00:02 vtv3 sshd\[18359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.110.66.66
Sep  3 02:00:04 vtv3 sshd\[18359\]: Failed password for invalid user rich from 62.110.66.66 port 41650 ssh2
Sep  3 02:05:08 vtv3 sshd\[21205\]: Invalid user gustavo from 62.110.66.66 port 58052
Sep  3 02:05:08 vtv3 sshd\[21205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.110.66.66
Sep  3 02:21:16 vtv3 sshd\[29610\]: Invalid user foobar from 62.110.66.66 port 50806
Sep  3 02:21:16 vtv3 sshd\[29610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.110.66.66
Sep  3 02:21:18 vtv3 sshd\[29610\]: Failed password for invalid user foobar from 62.110.66.66 port 50806 ssh2
Sep  3 02:26:40 vtv3 sshd\[32360\]: Invalid user user from 62.110.66.66 port 38972
Sep  3 02:26:40 vtv3 sshd\[32360\]: pam_unix\(ssh
2019-09-03 10:45:53
182.61.21.155 attackspambots
Sep  3 01:13:51 ip-172-31-1-72 sshd\[27060\]: Invalid user support from 182.61.21.155
Sep  3 01:13:51 ip-172-31-1-72 sshd\[27060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.21.155
Sep  3 01:13:53 ip-172-31-1-72 sshd\[27060\]: Failed password for invalid user support from 182.61.21.155 port 36476 ssh2
Sep  3 01:18:55 ip-172-31-1-72 sshd\[27134\]: Invalid user willshao from 182.61.21.155
Sep  3 01:18:55 ip-172-31-1-72 sshd\[27134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.21.155
2019-09-03 10:52:48
218.98.26.166 attack
Sep  2 04:59:39 itv-usvr-01 sshd[31139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.166  user=root
Sep  2 04:59:41 itv-usvr-01 sshd[31139]: Failed password for root from 218.98.26.166 port 55046 ssh2
Sep  2 04:59:46 itv-usvr-01 sshd[31170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.166  user=root
Sep  2 04:59:48 itv-usvr-01 sshd[31170]: Failed password for root from 218.98.26.166 port 15377 ssh2
Sep  2 04:59:55 itv-usvr-01 sshd[31172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.166  user=root
Sep  2 04:59:56 itv-usvr-01 sshd[31172]: Failed password for root from 218.98.26.166 port 29245 ssh2
2019-09-03 10:13:19
218.98.26.162 attack
2019-09-03T02:46:44.448465abusebot-7.cloudsearch.cf sshd\[24374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.162  user=root
2019-09-03 10:50:26
106.51.73.204 attackspambots
Sep  3 02:50:07 MainVPS sshd[25327]: Invalid user noc from 106.51.73.204 port 58503
Sep  3 02:50:07 MainVPS sshd[25327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.73.204
Sep  3 02:50:07 MainVPS sshd[25327]: Invalid user noc from 106.51.73.204 port 58503
Sep  3 02:50:09 MainVPS sshd[25327]: Failed password for invalid user noc from 106.51.73.204 port 58503 ssh2
Sep  3 02:55:36 MainVPS sshd[25734]: Invalid user applmgr from 106.51.73.204 port 15142
...
2019-09-03 10:37:06
58.76.223.206 attack
Sep  3 04:48:55 meumeu sshd[17055]: Failed password for root from 58.76.223.206 port 38921 ssh2
Sep  3 04:53:23 meumeu sshd[17564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.76.223.206 
Sep  3 04:53:25 meumeu sshd[17564]: Failed password for invalid user write from 58.76.223.206 port 59985 ssh2
...
2019-09-03 10:54:11
197.247.49.125 attackbotsspam
Sep  3 04:04:00 tux-35-217 sshd\[341\]: Invalid user mongodb from 197.247.49.125 port 37558
Sep  3 04:04:00 tux-35-217 sshd\[341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.247.49.125
Sep  3 04:04:02 tux-35-217 sshd\[341\]: Failed password for invalid user mongodb from 197.247.49.125 port 37558 ssh2
Sep  3 04:08:18 tux-35-217 sshd\[364\]: Invalid user nickname from 197.247.49.125 port 39758
Sep  3 04:08:18 tux-35-217 sshd\[364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.247.49.125
...
2019-09-03 10:53:38
182.61.136.23 attack
Sep  3 04:19:24 v22019058497090703 sshd[32296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.136.23
Sep  3 04:19:26 v22019058497090703 sshd[32296]: Failed password for invalid user ubuntu from 182.61.136.23 port 55262 ssh2
Sep  3 04:24:17 v22019058497090703 sshd[32656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.136.23
...
2019-09-03 10:28:52
185.142.236.34 attackbotsspam
firewall-block, port(s): 3001/tcp
2019-09-03 10:18:53
80.248.6.187 attackspambots
Sep  3 04:29:34 meumeu sshd[14673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.187 
Sep  3 04:29:36 meumeu sshd[14673]: Failed password for invalid user install from 80.248.6.187 port 57464 ssh2
Sep  3 04:35:23 meumeu sshd[15356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.248.6.187 
...
2019-09-03 10:44:03
139.59.135.84 attackspam
Sep  3 04:35:58 mail sshd\[16109\]: Invalid user mc from 139.59.135.84 port 44132
Sep  3 04:35:58 mail sshd\[16109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.135.84
Sep  3 04:36:00 mail sshd\[16109\]: Failed password for invalid user mc from 139.59.135.84 port 44132 ssh2
Sep  3 04:39:55 mail sshd\[16827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.135.84  user=root
Sep  3 04:39:56 mail sshd\[16827\]: Failed password for root from 139.59.135.84 port 59132 ssh2
2019-09-03 10:46:37
106.12.125.139 attack
Sep  2 19:03:26 TORMINT sshd\[32520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.125.139  user=root
Sep  2 19:03:28 TORMINT sshd\[32520\]: Failed password for root from 106.12.125.139 port 52678 ssh2
Sep  2 19:05:43 TORMINT sshd\[32661\]: Invalid user work from 106.12.125.139
Sep  2 19:05:43 TORMINT sshd\[32661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.125.139
...
2019-09-03 10:19:25
36.156.24.78 attack
2019-08-29T05:32:23.498652wiz-ks3 sshd[29747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.78  user=root
2019-08-29T05:32:25.301416wiz-ks3 sshd[29747]: Failed password for root from 36.156.24.78 port 49954 ssh2
2019-08-29T05:32:27.400574wiz-ks3 sshd[29747]: Failed password for root from 36.156.24.78 port 49954 ssh2
2019-08-29T05:32:23.498652wiz-ks3 sshd[29747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.78  user=root
2019-08-29T05:32:25.301416wiz-ks3 sshd[29747]: Failed password for root from 36.156.24.78 port 49954 ssh2
2019-08-29T05:32:27.400574wiz-ks3 sshd[29747]: Failed password for root from 36.156.24.78 port 49954 ssh2
2019-08-29T05:32:23.498652wiz-ks3 sshd[29747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.78  user=root
2019-08-29T05:32:25.301416wiz-ks3 sshd[29747]: Failed password for root from 36.156.24.78 port 49954 ssh2
2019-08-29T05:32:
2019-09-03 10:27:40
81.22.45.252 attackspambots
09/02/2019-21:55:36.711016 81.22.45.252 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 85
2019-09-03 10:47:39
95.110.173.147 attackbots
Sep  2 16:04:57 lcprod sshd\[31864\]: Invalid user tf from 95.110.173.147
Sep  2 16:04:57 lcprod sshd\[31864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.173.147
Sep  2 16:05:00 lcprod sshd\[31864\]: Failed password for invalid user tf from 95.110.173.147 port 57932 ssh2
Sep  2 16:09:10 lcprod sshd\[32357\]: Invalid user jakarta from 95.110.173.147
Sep  2 16:09:10 lcprod sshd\[32357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.110.173.147
2019-09-03 10:15:55

最近上报的IP列表

204.131.99.161 142.218.74.70 224.239.222.40 247.243.0.45
138.239.137.245 66.74.231.94 106.21.22.255 15.97.136.204
125.133.49.21 248.221.242.81 134.133.97.17 66.255.179.41
32.234.225.77 140.2.162.184 71.115.161.213 129.250.197.4
216.32.98.4 91.75.128.208 196.149.107.88 232.109.28.105