必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Kuwait

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.129.84.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.129.84.141.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 15:16:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 141.84.129.94.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.84.129.94.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
130.185.155.34 attackbots
Invalid user testing from 130.185.155.34 port 59712
2020-09-23 19:07:51
206.189.91.244 attack
TCP port : 24547
2020-09-23 19:00:28
123.1.154.200 attackbots
Invalid user david from 123.1.154.200 port 39401
2020-09-23 18:55:35
31.186.8.90 attackspam
[WedSep2311:01:47.6891612020][:error][pid30354:tid47240936216320][client31.186.8.90:57362][client31.186.8.90]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"wp-content/uploads/.\*\\\\\\\\.ph\(\?:p\|tml\|t\)"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf"][line"5804"][id"382238"][rev"2"][msg"Atomicorp.comWAFRules-VirtualJustInTimePatch:PHPfileexecutioninuploadsdirectorydenied"][data"wp-content/uploads/2020/07/ups.php"][severity"CRITICAL"][hostname"safeoncloud.ch"][uri"/wp-content/uploads/2020/07/ups.php"][unique_id"X2sO@8iWkCfbdoSDmAQ@yAAAANY"]\,referer:http://site.ru[WedSep2311:01:57.8890192020][:error][pid30354:tid47240894191360][client31.186.8.90:58314][client31.186.8.90]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"wp-content/uploads/.\*\\\\\\\\.ph\(\?:p\|tml\|t\)"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf"][line"5804"][id"382238"][rev"2"][msg"Atomicorp.comWAFRules-VirtualJustInTimePatch:PHP
2020-09-23 19:20:46
149.202.161.57 attackbots
Sep 23 09:31:48 game-panel sshd[3424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.161.57
Sep 23 09:31:51 game-panel sshd[3424]: Failed password for invalid user tunnel from 149.202.161.57 port 57376 ssh2
Sep 23 09:36:33 game-panel sshd[3582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.161.57
2020-09-23 19:07:34
106.12.33.134 attackspam
$f2bV_matches
2020-09-23 19:30:13
167.114.203.73 attackspam
$f2bV_matches
2020-09-23 19:42:10
119.28.93.152 attackbots
Sep 22 11:10:14 finn sshd[6123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.93.152  user=postgres
Sep 22 11:10:16 finn sshd[6123]: Failed password for postgres from 119.28.93.152 port 28638 ssh2
Sep 22 11:10:16 finn sshd[6123]: Received disconnect from 119.28.93.152 port 28638:11: Bye Bye [preauth]
Sep 22 11:10:16 finn sshd[6123]: Disconnected from 119.28.93.152 port 28638 [preauth]
Sep 22 11:13:53 finn sshd[6674]: Invalid user phil from 119.28.93.152 port 39976
Sep 22 11:13:53 finn sshd[6674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.93.152
Sep 22 11:13:54 finn sshd[6674]: Failed password for invalid user phil from 119.28.93.152 port 39976 ssh2
Sep 22 11:13:55 finn sshd[6674]: Received disconnect from 119.28.93.152 port 39976:11: Bye Bye [preauth]
Sep 22 11:13:55 finn sshd[6674]: Disconnected from 119.28.93.152 port 39976 [preauth]


........
-----------------------------------------------
https://www.bl
2020-09-23 19:08:17
187.112.20.37 attackbots
1600794352 - 09/22/2020 19:05:52 Host: 187.112.20.37/187.112.20.37 Port: 445 TCP Blocked
2020-09-23 19:41:20
179.70.139.103 attackbots
Lines containing failures of 179.70.139.103
Sep 22 06:49:17 nopeasti sshd[12906]: Invalid user start from 179.70.139.103 port 58081
Sep 22 06:49:17 nopeasti sshd[12906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.70.139.103 
Sep 22 06:49:19 nopeasti sshd[12906]: Failed password for invalid user start from 179.70.139.103 port 58081 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.70.139.103
2020-09-23 19:07:12
177.200.2.241 attackspam
Unauthorized connection attempt from IP address 177.200.2.241 on Port 445(SMB)
2020-09-23 19:26:45
186.168.65.93 attackbots
Unauthorized connection attempt from IP address 186.168.65.93 on Port 445(SMB)
2020-09-23 19:36:51
50.230.96.15 attackspam
Invalid user user from 50.230.96.15 port 37368
2020-09-23 18:54:33
60.190.252.21 attackspam
Auto Detect Rule!
proto TCP (SYN), 60.190.252.21:63034->gjan.info:1433, len 48
2020-09-23 19:18:22
192.241.235.214 attackbotsspam
"Found User-Agent associated with security scanner - Matched Data: zgrab found within REQUEST_HEADERS:User-Agent: mozilla/5.0 zgrab/0.x"
2020-09-23 19:02:11

最近上报的IP列表

221.39.34.27 74.201.166.95 70.96.214.86 192.54.134.140
121.119.143.15 220.195.203.215 36.89.78.224 254.196.254.229
57.168.103.183 66.67.251.9 22.233.166.158 155.164.185.231
23.228.1.186 231.1.57.169 117.178.241.185 3.172.171.158
40.144.195.107 245.164.62.87 114.123.15.220 123.27.120.75