必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.66.132.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23917
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.66.132.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 22:18:10 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
29.132.66.57.in-addr.arpa domain name pointer dial-29-D02.FRA1.equant.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.132.66.57.in-addr.arpa	name = dial-29-D02.FRA1.equant.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.174.93.195 attackspam
 UDP 93.174.93.195:58145 -> port 41120, len 57
2020-06-17 13:55:14
101.89.201.250 attackbots
2020-06-17 03:26:37,841 fail2ban.actions        [937]: NOTICE  [sshd] Ban 101.89.201.250
2020-06-17 04:05:31,418 fail2ban.actions        [937]: NOTICE  [sshd] Ban 101.89.201.250
2020-06-17 04:42:33,165 fail2ban.actions        [937]: NOTICE  [sshd] Ban 101.89.201.250
2020-06-17 05:19:08,892 fail2ban.actions        [937]: NOTICE  [sshd] Ban 101.89.201.250
2020-06-17 05:54:35,839 fail2ban.actions        [937]: NOTICE  [sshd] Ban 101.89.201.250
...
2020-06-17 14:11:01
139.155.74.240 attackbots
Jun 17 12:31:02 webhost01 sshd[4010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.74.240
Jun 17 12:31:05 webhost01 sshd[4010]: Failed password for invalid user earth from 139.155.74.240 port 54016 ssh2
...
2020-06-17 13:59:50
194.26.29.250 attackbots
Port scan on 3 port(s): 25528 26668 28166
2020-06-17 14:23:34
168.197.226.235 attack
Invalid user m from 168.197.226.235 port 48288
2020-06-17 14:25:35
189.237.146.84 attack
*Port Scan* detected from 189.237.146.84 (MX/Mexico/Mexico City/Mexico City (Manantial Peña Pobre)/dsl-189-237-146-84-dyn.prod-infinitum.com.mx). 4 hits in the last 270 seconds
2020-06-17 13:52:02
218.90.138.98 attack
Jun 17 11:40:56 dhoomketu sshd[815781]: Failed password for invalid user fedora from 218.90.138.98 port 10939 ssh2
Jun 17 11:44:51 dhoomketu sshd[815817]: Invalid user mario from 218.90.138.98 port 38148
Jun 17 11:44:51 dhoomketu sshd[815817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.90.138.98 
Jun 17 11:44:51 dhoomketu sshd[815817]: Invalid user mario from 218.90.138.98 port 38148
Jun 17 11:44:54 dhoomketu sshd[815817]: Failed password for invalid user mario from 218.90.138.98 port 38148 ssh2
...
2020-06-17 14:16:36
118.24.88.241 attack
Jun 17 06:25:40 ns381471 sshd[30675]: Failed password for root from 118.24.88.241 port 1741 ssh2
2020-06-17 14:20:23
157.230.150.102 attackspam
Jun 17 05:36:01 web8 sshd\[29703\]: Invalid user db2inst from 157.230.150.102
Jun 17 05:36:01 web8 sshd\[29703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.150.102
Jun 17 05:36:03 web8 sshd\[29703\]: Failed password for invalid user db2inst from 157.230.150.102 port 56726 ssh2
Jun 17 05:39:24 web8 sshd\[31519\]: Invalid user ed from 157.230.150.102
Jun 17 05:39:24 web8 sshd\[31519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.150.102
2020-06-17 13:48:11
109.244.101.133 attack
Invalid user jcf from 109.244.101.133 port 38288
2020-06-17 14:22:58
139.162.122.110 attack
SSH fail RA
2020-06-17 13:58:20
189.209.251.116 attackspambots
*Port Scan* detected from 189.209.251.116 (MX/Mexico/Nuevo León/Monterrey/189-209-251-116.static.axtel.net). 4 hits in the last 140 seconds
2020-06-17 13:52:35
117.131.60.58 attackbotsspam
Jun 17 08:16:53 pkdns2 sshd\[24041\]: Invalid user git from 117.131.60.58Jun 17 08:16:55 pkdns2 sshd\[24041\]: Failed password for invalid user git from 117.131.60.58 port 3244 ssh2Jun 17 08:20:26 pkdns2 sshd\[24225\]: Invalid user pbl from 117.131.60.58Jun 17 08:20:28 pkdns2 sshd\[24225\]: Failed password for invalid user pbl from 117.131.60.58 port 12714 ssh2Jun 17 08:24:16 pkdns2 sshd\[24365\]: Invalid user mysqladmin from 117.131.60.58Jun 17 08:24:18 pkdns2 sshd\[24365\]: Failed password for invalid user mysqladmin from 117.131.60.58 port 20640 ssh2
...
2020-06-17 13:57:53
162.243.142.16 attack
Port scan denied
2020-06-17 14:11:54
185.153.197.50 attackspam
TCP port : 6424
2020-06-17 14:08:46

最近上报的IP列表

95.193.137.131 9.64.92.70 24.90.119.99 247.195.155.139
138.43.190.118 169.174.84.186 41.164.75.100 60.172.219.208
98.199.80.211 202.243.222.123 213.136.246.122 238.226.199.11
133.41.39.39 236.153.92.233 198.53.86.194 155.181.187.24
83.184.1.28 180.7.61.140 122.150.231.76 181.99.27.153