必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.129.206.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;97.129.206.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:30:47 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
149.206.129.97.in-addr.arpa domain name pointer 149.sub-97-129-206.myvzw.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.206.129.97.in-addr.arpa	name = 149.sub-97-129-206.myvzw.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.36.216.125 attack
web-1 [ssh] SSH Attack
2019-10-16 15:38:03
176.31.128.45 attackspambots
Oct 16 07:09:58 xeon sshd[63565]: Failed password for invalid user uftp from 176.31.128.45 port 46082 ssh2
2019-10-16 15:39:05
37.17.173.39 attackspambots
2019-10-16T06:41:41.055367shield sshd\[30898\]: Invalid user qwerty from 37.17.173.39 port 59926
2019-10-16T06:41:41.060945shield sshd\[30898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-173-39.szerverem.hu
2019-10-16T06:41:43.121232shield sshd\[30898\]: Failed password for invalid user qwerty from 37.17.173.39 port 59926 ssh2
2019-10-16T06:46:18.736593shield sshd\[32269\]: Invalid user gale from 37.17.173.39 port 42768
2019-10-16T06:46:18.740901shield sshd\[32269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-173-39.szerverem.hu
2019-10-16 15:23:36
197.248.0.222 attackspam
Lines containing failures of 197.248.0.222
Oct 16 02:48:25 install sshd[12890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.0.222  user=r.r
Oct 16 02:48:27 install sshd[12890]: Failed password for r.r from 197.248.0.222 port 34758 ssh2
Oct 16 02:48:27 install sshd[12890]: Received disconnect from 197.248.0.222 port 34758:11: Bye Bye [preauth]
Oct 16 02:48:27 install sshd[12890]: Disconnected from authenticating user r.r 197.248.0.222 port 34758 [preauth]
Oct 16 02:58:15 install sshd[14205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.0.222  user=r.r
Oct 16 02:58:17 install sshd[14205]: Failed password for r.r from 197.248.0.222 port 50876 ssh2
Oct 16 02:58:18 install sshd[14205]: Received disconnect from 197.248.0.222 port 50876:11: Bye Bye [preauth]
Oct 16 02:58:18 install sshd[14205]: Disconnected from authenticating user r.r 197.248.0.222 port 50876 [preauth]


........
----------------------------------
2019-10-16 15:25:51
91.241.13.33 attackspambots
Oct 16 08:57:53 vpn01 sshd[1420]: Failed password for root from 91.241.13.33 port 37146 ssh2
...
2019-10-16 15:08:33
31.220.42.115 attackspambots
Oct 16 09:32:00 DAAP sshd[3102]: Invalid user openzj from 31.220.42.115 port 59904
Oct 16 09:32:00 DAAP sshd[3102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.42.115
Oct 16 09:32:00 DAAP sshd[3102]: Invalid user openzj from 31.220.42.115 port 59904
Oct 16 09:32:02 DAAP sshd[3102]: Failed password for invalid user openzj from 31.220.42.115 port 59904 ssh2
Oct 16 09:35:22 DAAP sshd[3131]: Invalid user test from 31.220.42.115 port 43360
...
2019-10-16 15:37:23
144.217.214.25 attackspam
Oct 16 05:26:23 MK-Soft-VM4 sshd[9641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.214.25 
Oct 16 05:26:25 MK-Soft-VM4 sshd[9641]: Failed password for invalid user ccrong from 144.217.214.25 port 36344 ssh2
...
2019-10-16 15:41:32
198.108.67.46 attackspambots
firewall-block, port(s): 8585/tcp
2019-10-16 15:40:24
151.80.98.17 attackbots
Invalid user web2 from 151.80.98.17 port 34738
2019-10-16 15:10:23
137.74.199.180 attackbots
Oct 16 07:54:31 sauna sshd[231072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.199.180
Oct 16 07:54:33 sauna sshd[231072]: Failed password for invalid user qv from 137.74.199.180 port 52346 ssh2
...
2019-10-16 15:05:58
201.39.233.40 attackbotsspam
2019-10-16T07:00:13.381637hub.schaetter.us sshd\[17743\]: Invalid user supp0rt55 from 201.39.233.40 port 43534
2019-10-16T07:00:13.394950hub.schaetter.us sshd\[17743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.39.233.40
2019-10-16T07:00:15.106227hub.schaetter.us sshd\[17743\]: Failed password for invalid user supp0rt55 from 201.39.233.40 port 43534 ssh2
2019-10-16T07:05:21.118756hub.schaetter.us sshd\[17792\]: Invalid user jltele\&my@146 from 201.39.233.40 port 35020
2019-10-16T07:05:21.127719hub.schaetter.us sshd\[17792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.39.233.40
...
2019-10-16 15:35:49
36.112.137.55 attackspambots
2019-10-16T05:32:35.831198abusebot-5.cloudsearch.cf sshd\[16858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55  user=root
2019-10-16 15:32:18
222.186.180.8 attackspambots
F2B jail: sshd. Time: 2019-10-16 09:00:42, Reported by: VKReport
2019-10-16 15:10:06
188.254.0.183 attackspam
Oct 16 09:03:16 eventyay sshd[15598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183
Oct 16 09:03:18 eventyay sshd[15598]: Failed password for invalid user aruan from 188.254.0.183 port 60850 ssh2
Oct 16 09:07:21 eventyay sshd[15653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183
...
2019-10-16 15:13:02
77.40.11.218 attack
IP: 77.40.11.218
ASN: AS12389 Rostelecom
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 16/10/2019 4:22:29 AM UTC
2019-10-16 15:22:54

最近上报的IP列表

252.248.59.73 242.6.132.162 8.54.252.79 93.69.255.35
117.150.34.135 104.29.68.21 49.27.240.112 57.202.116.101
229.37.208.222 187.225.247.252 252.245.58.129 80.157.170.120
90.153.39.176 134.9.120.115 150.13.153.45 168.148.49.211
27.204.190.1 9.51.104.71 50.191.3.201 47.227.228.106