必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.114.135.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 231
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.114.135.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 05:06:30 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
129.135.114.61.in-addr.arpa domain name pointer 61-114-135-129.ppp.bbiq.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.135.114.61.in-addr.arpa	name = 61-114-135-129.ppp.bbiq.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
34.64.218.102 attackbotsspam
34.64.218.102 - - [28/Jul/2020:13:06:01 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
34.64.218.102 - - [28/Jul/2020:13:06:05 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
34.64.218.102 - - [28/Jul/2020:13:06:07 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-28 22:38:47
106.12.148.170 attackspambots
2020-07-28T14:45:51.488783ns386461 sshd\[23825\]: Invalid user awade from 106.12.148.170 port 33872
2020-07-28T14:45:51.494753ns386461 sshd\[23825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.148.170
2020-07-28T14:45:53.386410ns386461 sshd\[23825\]: Failed password for invalid user awade from 106.12.148.170 port 33872 ssh2
2020-07-28T15:04:27.172979ns386461 sshd\[8444\]: Invalid user sinusbot from 106.12.148.170 port 45360
2020-07-28T15:04:27.177364ns386461 sshd\[8444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.148.170
...
2020-07-28 22:32:12
118.163.180.4 attackspambots
Port Scan detected!
...
2020-07-28 22:22:46
54.37.14.3 attackspambots
Automatic report BANNED IP
2020-07-28 21:59:46
54.39.151.64 attackspambots
fail2ban
2020-07-28 22:23:07
5.135.165.51 attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-28 22:16:12
222.168.18.227 attackspam
Jul 28 16:27:34 prox sshd[6028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.168.18.227 
Jul 28 16:27:36 prox sshd[6028]: Failed password for invalid user tmpu02 from 222.168.18.227 port 44686 ssh2
2020-07-28 22:33:39
157.245.211.120 attackspam
2020-07-28T12:32:36.524620shield sshd\[5700\]: Invalid user nicole from 157.245.211.120 port 59638
2020-07-28T12:32:36.533592shield sshd\[5700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.211.120
2020-07-28T12:32:37.949632shield sshd\[5700\]: Failed password for invalid user nicole from 157.245.211.120 port 59638 ssh2
2020-07-28T12:35:32.903744shield sshd\[6330\]: Invalid user kyonken from 157.245.211.120 port 53498
2020-07-28T12:35:32.913042shield sshd\[6330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.211.120
2020-07-28 21:57:24
106.12.113.27 attackspam
$f2bV_matches
2020-07-28 22:06:09
131.100.136.211 attackbots
Automatic report - Port Scan Attack
2020-07-28 22:30:19
61.177.172.54 attackspam
2020-07-28T14:13:46.685793shield sshd\[26454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54  user=root
2020-07-28T14:13:48.743800shield sshd\[26454\]: Failed password for root from 61.177.172.54 port 28162 ssh2
2020-07-28T14:13:51.818837shield sshd\[26454\]: Failed password for root from 61.177.172.54 port 28162 ssh2
2020-07-28T14:13:55.098814shield sshd\[26454\]: Failed password for root from 61.177.172.54 port 28162 ssh2
2020-07-28T14:13:58.748764shield sshd\[26454\]: Failed password for root from 61.177.172.54 port 28162 ssh2
2020-07-28 22:19:27
157.48.4.68 attackbotsspam
1595937999 - 07/28/2020 14:06:39 Host: 157.48.4.68/157.48.4.68 Port: 445 TCP Blocked
2020-07-28 21:56:03
176.31.128.45 attackbots
2020-07-28T15:02:53.957751afi-git.jinr.ru sshd[7914]: Invalid user huangcaijian from 176.31.128.45 port 41634
2020-07-28T15:02:53.961047afi-git.jinr.ru sshd[7914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps06.bubbleswave.com
2020-07-28T15:02:53.957751afi-git.jinr.ru sshd[7914]: Invalid user huangcaijian from 176.31.128.45 port 41634
2020-07-28T15:02:56.603692afi-git.jinr.ru sshd[7914]: Failed password for invalid user huangcaijian from 176.31.128.45 port 41634 ssh2
2020-07-28T15:06:24.606275afi-git.jinr.ru sshd[8905]: Invalid user www from 176.31.128.45 port 46140
...
2020-07-28 22:10:05
54.37.154.113 attack
Jul 28 12:04:17 124388 sshd[23294]: Invalid user sjt from 54.37.154.113 port 37106
Jul 28 12:04:17 124388 sshd[23294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.154.113
Jul 28 12:04:17 124388 sshd[23294]: Invalid user sjt from 54.37.154.113 port 37106
Jul 28 12:04:19 124388 sshd[23294]: Failed password for invalid user sjt from 54.37.154.113 port 37106 ssh2
Jul 28 12:06:37 124388 sshd[23383]: Invalid user siqi from 54.37.154.113 port 43582
2020-07-28 21:59:26
118.25.23.208 attackspambots
Jul 28 19:06:13 itv-usvr-01 sshd[11309]: Invalid user fyx from 118.25.23.208
2020-07-28 22:28:20

最近上报的IP列表

116.178.31.90 252.22.115.133 88.154.139.133 180.60.194.124
192.14.130.21 240.234.100.78 38.1.41.196 153.61.45.6
136.135.100.153 143.189.22.136 25.118.248.168 227.214.143.243
17.220.163.252 139.39.54.31 3.3.78.252 193.212.73.101
250.75.26.62 117.169.31.143 117.241.79.243 249.47.107.168