必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.127.29.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.127.29.214.			IN	A

;; AUTHORITY SECTION:
.			200	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 06:21:31 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
214.29.127.66.in-addr.arpa domain name pointer adsl-66-127-29-214.dsl.lsan03.pacbell.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.29.127.66.in-addr.arpa	name = adsl-66-127-29-214.dsl.lsan03.pacbell.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
131.161.185.67 attackspam
Aug  2 05:39:57 mail.srvfarm.net postfix/smtps/smtpd[1403451]: warning: unknown[131.161.185.67]: SASL PLAIN authentication failed: 
Aug  2 05:39:58 mail.srvfarm.net postfix/smtps/smtpd[1403451]: lost connection after AUTH from unknown[131.161.185.67]
Aug  2 05:43:37 mail.srvfarm.net postfix/smtps/smtpd[1404177]: warning: unknown[131.161.185.67]: SASL PLAIN authentication failed: 
Aug  2 05:43:38 mail.srvfarm.net postfix/smtps/smtpd[1404177]: lost connection after AUTH from unknown[131.161.185.67]
Aug  2 05:45:40 mail.srvfarm.net postfix/smtps/smtpd[1404180]: warning: unknown[131.161.185.67]: SASL PLAIN authentication failed:
2020-08-02 16:31:14
45.165.214.218 attackspambots
Aug  2 05:22:07 mail.srvfarm.net postfix/smtps/smtpd[1400168]: warning: unknown[45.165.214.218]: SASL PLAIN authentication failed: 
Aug  2 05:22:08 mail.srvfarm.net postfix/smtps/smtpd[1400168]: lost connection after AUTH from unknown[45.165.214.218]
Aug  2 05:22:26 mail.srvfarm.net postfix/smtpd[1402076]: warning: unknown[45.165.214.218]: SASL PLAIN authentication failed: 
Aug  2 05:22:26 mail.srvfarm.net postfix/smtpd[1402076]: lost connection after AUTH from unknown[45.165.214.218]
Aug  2 05:22:52 mail.srvfarm.net postfix/smtpd[1400971]: warning: unknown[45.165.214.218]: SASL PLAIN authentication failed:
2020-08-02 16:32:13
106.38.33.70 attackspambots
Aug  2 15:30:42 webhost01 sshd[29307]: Failed password for root from 106.38.33.70 port 58202 ssh2
...
2020-08-02 16:45:18
59.41.39.82 attack
Invalid user trayush from 59.41.39.82 port 17751
2020-08-02 16:57:50
142.4.214.223 attackspambots
Aug  1 23:44:33 propaganda sshd[57149]: Connection from 142.4.214.223 port 49792 on 10.0.0.160 port 22 rdomain ""
Aug  1 23:44:33 propaganda sshd[57149]: Connection closed by 142.4.214.223 port 49792 [preauth]
2020-08-02 16:40:15
123.207.11.65 attackspambots
Aug  2 08:49:26 Ubuntu-1404-trusty-64-minimal sshd\[13313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.11.65  user=root
Aug  2 08:49:28 Ubuntu-1404-trusty-64-minimal sshd\[13313\]: Failed password for root from 123.207.11.65 port 36384 ssh2
Aug  2 08:52:40 Ubuntu-1404-trusty-64-minimal sshd\[15456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.11.65  user=root
Aug  2 08:52:43 Ubuntu-1404-trusty-64-minimal sshd\[15456\]: Failed password for root from 123.207.11.65 port 36912 ssh2
Aug  2 08:55:43 Ubuntu-1404-trusty-64-minimal sshd\[16627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.11.65  user=root
2020-08-02 16:53:13
186.139.194.238 attack
Aug  2 07:56:09 eventyay sshd[25187]: Failed password for root from 186.139.194.238 port 18394 ssh2
Aug  2 07:59:36 eventyay sshd[25289]: Failed password for root from 186.139.194.238 port 50440 ssh2
...
2020-08-02 16:41:51
200.119.138.42 attackspam
Aug  2 05:32:10 mail.srvfarm.net postfix/smtps/smtpd[1404180]: warning: unknown[200.119.138.42]: SASL PLAIN authentication failed: 
Aug  2 05:32:11 mail.srvfarm.net postfix/smtps/smtpd[1404180]: lost connection after AUTH from unknown[200.119.138.42]
Aug  2 05:34:49 mail.srvfarm.net postfix/smtpd[1403823]: warning: unknown[200.119.138.42]: SASL PLAIN authentication failed: 
Aug  2 05:34:49 mail.srvfarm.net postfix/smtpd[1403823]: lost connection after AUTH from unknown[200.119.138.42]
Aug  2 05:35:03 mail.srvfarm.net postfix/smtpd[1404335]: warning: unknown[200.119.138.42]: SASL PLAIN authentication failed:
2020-08-02 16:28:37
156.96.117.200 attackbotsspam
SIPVicious Scanner Detection
2020-08-02 16:56:47
118.70.155.60 attackspam
Aug  2 09:42:29 web-main sshd[770147]: Failed password for root from 118.70.155.60 port 45855 ssh2
Aug  2 09:48:45 web-main sshd[770174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.155.60  user=root
Aug  2 09:48:47 web-main sshd[770174]: Failed password for root from 118.70.155.60 port 43257 ssh2
2020-08-02 16:52:28
106.13.37.164 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-02 16:37:15
37.49.224.49 attack
 TCP (SYN) 37.49.224.49:52624 -> port 5038, len 44
2020-08-02 17:00:30
45.11.129.1 attackbots
Aug  2 05:30:41 mail.srvfarm.net postfix/smtpd[1403824]: lost connection after RSET from unknown[45.11.129.1]
Aug  2 05:32:13 mail.srvfarm.net postfix/smtpd[1401344]: lost connection after RSET from unknown[45.11.129.1]
Aug  2 05:32:38 mail.srvfarm.net postfix/smtpd[1400646]: lost connection after RSET from unknown[45.11.129.1]
Aug  2 05:36:32 mail.srvfarm.net postfix/smtpd[1403822]: lost connection after RSET from unknown[45.11.129.1]
Aug  2 05:39:56 mail.srvfarm.net postfix/smtpd[1404336]: lost connection after RSET from unknown[45.11.129.1]
2020-08-02 16:32:59
106.53.51.138 attackspambots
Lines containing failures of 106.53.51.138
Aug  1 12:17:33 shared02 sshd[10445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.51.138  user=r.r
Aug  1 12:17:35 shared02 sshd[10445]: Failed password for r.r from 106.53.51.138 port 51166 ssh2
Aug  1 12:17:35 shared02 sshd[10445]: Received disconnect from 106.53.51.138 port 51166:11: Bye Bye [preauth]
Aug  1 12:17:35 shared02 sshd[10445]: Disconnected from authenticating user r.r 106.53.51.138 port 51166 [preauth]
Aug  1 12:24:23 shared02 sshd[12697]: Connection closed by 106.53.51.138 port 32986 [preauth]
Aug  1 12:30:42 shared02 sshd[15675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.51.138  user=r.r
Aug  1 12:30:44 shared02 sshd[15675]: Failed password for r.r from 106.53.51.138 port 40160 ssh2
Aug  1 12:30:44 shared02 sshd[15675]: Received disconnect from 106.53.51.138 port 40160:11: Bye Bye [preauth]
Aug  1 12:30:44 sha........
------------------------------
2020-08-02 16:48:44
138.197.171.79 attack
Aug  2 10:20:14 gw1 sshd[1079]: Failed password for root from 138.197.171.79 port 44006 ssh2
...
2020-08-02 17:01:57

最近上报的IP列表

125.72.17.88 115.59.23.87 184.4.184.7 210.177.68.115
3.22.4.59 96.61.180.76 88.185.25.132 201.168.29.218
206.250.35.85 184.80.125.61 118.147.140.34 153.92.5.171
135.157.17.32 215.193.118.59 242.212.81.91 178.1.158.163
62.137.186.51 59.176.141.120 199.190.37.152 210.57.222.175