必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Russian Federation

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
94.29.124.45 spambotsattack
This server has bad connection, some apps don't even work.
2021-03-01 14:14:02
94.29.124.106 attackspambots
Unauthorized connection attempt from IP address 94.29.124.106 on Port 445(SMB)
2019-11-01 00:55:10
94.29.124.106 attackbots
Unauthorised access (Oct 10) SRC=94.29.124.106 LEN=52 TTL=113 ID=18762 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-11 02:53:13
94.29.124.85 attack
Unauthorized connection attempt from IP address 94.29.124.85 on Port 445(SMB)
2019-09-24 03:47:59
94.29.124.55 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 10:57:44.
2019-09-19 18:50:59
94.29.124.46 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-16 21:12:56,007 INFO [amun_request_handler] PortScan Detected on Port: 445 (94.29.124.46)
2019-09-17 10:43:26
94.29.124.80 attackbotsspam
Unauthorized connection attempt from IP address 94.29.124.80 on Port 445(SMB)
2019-09-11 03:35:35
94.29.124.233 attackspambots
Unauthorized connection attempt from IP address 94.29.124.233 on Port 445(SMB)
2019-09-05 16:41:37
94.29.124.190 attackspam
Unauthorized connection attempt from IP address 94.29.124.190 on Port 445(SMB)
2019-08-14 14:51:37
94.29.124.138 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-08 20:38:13,986 INFO [amun_request_handler] PortScan Detected on Port: 445 (94.29.124.138)
2019-08-09 09:43:39
94.29.124.45 attack
Unauthorized connection attempt from IP address 94.29.124.45 on Port 445(SMB)
2019-07-31 21:31:45
94.29.124.233 attack
Unauthorized connection attempt from IP address 94.29.124.233 on Port 445(SMB)
2019-07-31 19:29:12
94.29.124.55 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 06:10:11,551 INFO [amun_request_handler] PortScan Detected on Port: 445 (94.29.124.55)
2019-07-17 19:25:55
94.29.124.89 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 01:25:07,917 INFO [shellcode_manager] (94.29.124.89) no match, writing hexdump (ddf46e155a23b6dc841fa1cd1322d98a :2262228) - MS17010 (EternalBlue)
2019-06-27 03:02:33
94.29.124.190 attack
445/tcp 445/tcp 445/tcp...
[2019-05-06/06-26]4pkt,1pt.(tcp)
2019-06-27 01:00:48
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.29.124.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.29.124.189.			IN	A

;; AUTHORITY SECTION:
.			345	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 09:31:57 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 189.124.29.94.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.124.29.94.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.162.27.225 attackspam
139.162.27.225
2020-09-01 07:22:35
111.230.221.203 attack
Sep  1 00:18:40 home sshd[3760613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.221.203 
Sep  1 00:18:40 home sshd[3760613]: Invalid user nfe from 111.230.221.203 port 41420
Sep  1 00:18:43 home sshd[3760613]: Failed password for invalid user nfe from 111.230.221.203 port 41420 ssh2
Sep  1 00:22:14 home sshd[3761887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.221.203  user=root
Sep  1 00:22:16 home sshd[3761887]: Failed password for root from 111.230.221.203 port 40422 ssh2
...
2020-09-01 07:28:38
200.119.110.137 attackspambots
Unauthorised access (Sep  1) SRC=200.119.110.137 LEN=52 TTL=112 ID=10927 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-01 06:54:50
176.113.115.132 attack
Aug 31 23:11:09 srv1 dovecot: imap-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=176.113.115.132, lip=94.237.92.191, TLS, session=<3MRS1zKujciwcXOE>
Aug 31 23:11:15 srv1 dovecot: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=176.113.115.132, lip=94.237.92.191, TLS, session=<3LNs1zKu98iwcXOE>
Aug 31 23:11:21 srv1 dovecot: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=176.113.115.132, lip=94.237.92.191, session=
Aug 31 23:11:27 srv1 dovecot: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=176.113.115.132, lip=94.237.92.191, session=<5aMg2DKupMuwcXOE>
Aug 31 23:11:29 srv1 dovecot: pop3-login: Disconnected (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=176
...
2020-09-01 06:53:35
37.208.135.86 attack
Sep  1 00:19:16 minden010 sshd[498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.208.135.86
Sep  1 00:19:19 minden010 sshd[498]: Failed password for invalid user emily from 37.208.135.86 port 37016 ssh2
Sep  1 00:22:00 minden010 sshd[1491]: Failed password for root from 37.208.135.86 port 51656 ssh2
...
2020-09-01 07:09:40
46.101.149.23 attackspambots
Aug 31 23:01:01 dev0-dcde-rnet sshd[370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.149.23
Aug 31 23:01:03 dev0-dcde-rnet sshd[370]: Failed password for invalid user admin from 46.101.149.23 port 60882 ssh2
Aug 31 23:15:36 dev0-dcde-rnet sshd[468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.149.23
2020-09-01 07:08:48
213.217.1.45 attackspam
firewall-block, port(s): 29732/tcp
2020-09-01 07:26:45
177.91.182.162 attack
(smtpauth) Failed SMTP AUTH login from 177.91.182.162 (BR/Brazil/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-01 01:41:14 plain authenticator failed for ([177.91.182.162]) [177.91.182.162]: 535 Incorrect authentication data (set_id=fd2302@nazeranyekta.com)
2020-09-01 07:01:20
219.112.215.167 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-09-01 07:08:34
45.55.189.252 attack
Sep  1 00:45:00 server sshd[9613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.189.252 
Sep  1 00:45:00 server sshd[9613]: Invalid user magno from 45.55.189.252 port 49154
Sep  1 00:45:02 server sshd[9613]: Failed password for invalid user magno from 45.55.189.252 port 49154 ssh2
Sep  1 00:56:23 server sshd[16184]: User root from 45.55.189.252 not allowed because listed in DenyUsers
Sep  1 00:56:23 server sshd[16184]: User root from 45.55.189.252 not allowed because listed in DenyUsers
...
2020-09-01 07:19:52
37.228.227.124 attackbots
Fail2Ban Ban Triggered
Wordpress Sniffing
2020-09-01 06:57:07
173.230.158.167 attackspam
20 attempts against mh_ha-misbehave-ban on air
2020-09-01 07:11:51
192.241.227.97 attackbotsspam
 TCP (SYN) 192.241.227.97:37198 -> port 22, len 40
2020-09-01 07:05:59
202.154.180.51 attackbots
SSH Invalid Login
2020-09-01 07:17:33
59.120.227.134 attack
Aug 31 15:02:55 dignus sshd[7666]: Failed password for invalid user zj from 59.120.227.134 port 33094 ssh2
Aug 31 15:07:01 dignus sshd[8135]: Invalid user vinci from 59.120.227.134 port 39886
Aug 31 15:07:01 dignus sshd[8135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.227.134
Aug 31 15:07:04 dignus sshd[8135]: Failed password for invalid user vinci from 59.120.227.134 port 39886 ssh2
Aug 31 15:11:11 dignus sshd[8683]: Invalid user liyan from 59.120.227.134 port 46684
...
2020-09-01 07:23:29

最近上报的IP列表

94.29.124.251 94.30.217.15 94.29.175.195 94.3.82.8
94.41.138.249 94.41.184.228 94.41.14.169 94.30.212.182
94.43.128.54 94.43.135.35 94.41.228.236 94.41.94.215
94.43.126.14 94.43.126.246 94.46.154.200 94.49.4.253
94.51.51.52 94.52.178.188 94.54.67.189 94.61.204.27