必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): s2s Ltd

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.29.56.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55469
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.29.56.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080601 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 07 03:57:01 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 21.56.29.81.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 21.56.29.81.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.29.236.131 attackspam
SSH Bruteforce attempt
2019-08-18 07:05:04
103.54.250.103 attackspambots
Invalid user roy from 103.54.250.103 port 59768
2019-08-18 07:45:17
36.7.144.234 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-08-18 07:08:07
5.54.195.165 attack
Telnet Server BruteForce Attack
2019-08-18 07:17:32
18.209.157.19 attackspam
Unauthorized connection attempt from IP address 18.209.157.19 on Port 3389(RDP)
2019-08-18 07:20:19
27.208.220.219 attack
Invalid user service from 27.208.220.219 port 61114
2019-08-18 07:26:19
141.98.9.195 attackbotsspam
Aug 18 00:58:54 ncomp postfix/smtpd[3089]: warning: unknown[141.98.9.195]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 00:59:55 ncomp postfix/smtpd[3089]: warning: unknown[141.98.9.195]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 01:00:57 ncomp postfix/smtpd[3089]: warning: unknown[141.98.9.195]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-18 07:04:12
42.200.208.158 attackspam
Aug 17 13:25:55 kapalua sshd\[27835\]: Invalid user sll from 42.200.208.158
Aug 17 13:25:55 kapalua sshd\[27835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-208-158.static.imsbiz.com
Aug 17 13:25:58 kapalua sshd\[27835\]: Failed password for invalid user sll from 42.200.208.158 port 55968 ssh2
Aug 17 13:30:43 kapalua sshd\[28289\]: Invalid user icosftp from 42.200.208.158
Aug 17 13:30:43 kapalua sshd\[28289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-208-158.static.imsbiz.com
2019-08-18 07:33:12
221.131.68.210 attackspam
Aug 17 18:25:16 vps200512 sshd\[5271\]: Invalid user dexter from 221.131.68.210
Aug 17 18:25:16 vps200512 sshd\[5271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.131.68.210
Aug 17 18:25:18 vps200512 sshd\[5271\]: Failed password for invalid user dexter from 221.131.68.210 port 59894 ssh2
Aug 17 18:28:04 vps200512 sshd\[5349\]: Invalid user daicy from 221.131.68.210
Aug 17 18:28:04 vps200512 sshd\[5349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.131.68.210
2019-08-18 07:08:38
96.241.47.214 attack
Aug 17 09:30:35 sachi sshd\[8382\]: Invalid user flopy from 96.241.47.214
Aug 17 09:30:35 sachi sshd\[8382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-96-241-47-214.washdc.fios.verizon.net
Aug 17 09:30:37 sachi sshd\[8382\]: Failed password for invalid user flopy from 96.241.47.214 port 34754 ssh2
Aug 17 09:35:09 sachi sshd\[8797\]: Invalid user m1 from 96.241.47.214
Aug 17 09:35:09 sachi sshd\[8797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pool-96-241-47-214.washdc.fios.verizon.net
2019-08-18 07:16:47
190.85.145.162 attack
Aug 17 23:09:58 DAAP sshd[8259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.145.162  user=root
Aug 17 23:10:01 DAAP sshd[8259]: Failed password for root from 190.85.145.162 port 51512 ssh2
Aug 17 23:14:34 DAAP sshd[8321]: Invalid user opuser from 190.85.145.162 port 42642
Aug 17 23:14:34 DAAP sshd[8321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.145.162
Aug 17 23:14:34 DAAP sshd[8321]: Invalid user opuser from 190.85.145.162 port 42642
Aug 17 23:14:37 DAAP sshd[8321]: Failed password for invalid user opuser from 190.85.145.162 port 42642 ssh2
...
2019-08-18 07:32:38
185.220.100.253 attackspambots
Aug 18 00:59:53 lnxded63 sshd[13257]: Failed password for root from 185.220.100.253 port 58105 ssh2
Aug 18 00:59:53 lnxded63 sshd[13257]: Failed password for root from 185.220.100.253 port 58105 ssh2
Aug 18 00:59:55 lnxded63 sshd[13257]: Failed password for root from 185.220.100.253 port 58105 ssh2
2019-08-18 07:13:06
182.61.181.138 attackbots
$f2bV_matches
2019-08-18 07:17:55
113.54.155.223 attackspam
Aug 17 13:04:48 lcprod sshd\[2463\]: Invalid user abe from 113.54.155.223
Aug 17 13:04:48 lcprod sshd\[2463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.54.155.223
Aug 17 13:04:50 lcprod sshd\[2463\]: Failed password for invalid user abe from 113.54.155.223 port 54362 ssh2
Aug 17 13:09:50 lcprod sshd\[3158\]: Invalid user ka from 113.54.155.223
Aug 17 13:09:50 lcprod sshd\[3158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.54.155.223
2019-08-18 07:19:28
113.160.154.94 attackspam
Unauthorized connection attempt from IP address 113.160.154.94 on Port 445(SMB)
2019-08-18 07:05:32

最近上报的IP列表

148.153.124.211 216.85.161.194 218.63.66.183 219.68.233.240
147.47.207.213 188.214.93.88 99.229.235.142 91.221.66.72
35.154.189.248 115.220.10.24 95.16.18.255 176.160.52.15
113.121.95.189 147.118.218.217 188.243.253.154 52.83.234.159
202.148.4.99 45.108.32.247 27.103.93.100 82.142.121.4