必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.13.158.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.13.158.30.			IN	A

;; AUTHORITY SECTION:
.			303	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102300 1800 900 604800 86400

;; Query time: 229 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 23 20:54:37 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
30.158.13.1.in-addr.arpa has no PTR record
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 30.158.13.1.in-addr.arpa.: No answer

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
211.20.101.36 attackspam
34567/tcp
[2019-09-04]1pkt
2019-09-05 09:57:50
188.165.242.200 attack
Sep  5 03:23:48 XXX sshd[61789]: Invalid user ofsaa from 188.165.242.200 port 35050
2019-09-05 10:06:46
27.72.253.59 attackbotsspam
Unauthorized connection attempt from IP address 27.72.253.59 on Port 445(SMB)
2019-09-05 09:52:15
51.89.224.145 attack
Trying:
/
/xmlrpc.php?rsd
/blog/robots.txt
/blog/
/wordpress/
/wp/
/administrator/index.php
/blog/robots.txt
/blog/administrator/index.php
/joomla/robots.txt
/joomla/administrator/index.php
/
/bitrix/admin/index.php?lang=en
2019-09-05 10:11:17
220.92.16.66 attackbotsspam
Sep  5 03:40:20 XXX sshd[61961]: Invalid user ofsaa from 220.92.16.66 port 51290
2019-09-05 10:17:17
167.71.217.70 attackspambots
Sep  5 04:08:08 v22019058497090703 sshd[9610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.70
Sep  5 04:08:10 v22019058497090703 sshd[9610]: Failed password for invalid user admin from 167.71.217.70 port 57926 ssh2
Sep  5 04:12:30 v22019058497090703 sshd[10048]: Failed password for test from 167.71.217.70 port 44376 ssh2
...
2019-09-05 10:15:29
67.205.135.127 attackspam
Sep  5 00:54:47 ns382633 sshd\[2286\]: Invalid user gitolite from 67.205.135.127 port 56716
Sep  5 00:54:47 ns382633 sshd\[2286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.127
Sep  5 00:54:48 ns382633 sshd\[2286\]: Failed password for invalid user gitolite from 67.205.135.127 port 56716 ssh2
Sep  5 01:01:15 ns382633 sshd\[4063\]: Invalid user odoo from 67.205.135.127 port 59932
Sep  5 01:01:15 ns382633 sshd\[4063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.127
2019-09-05 09:43:39
70.45.219.82 attackbotsspam
Caught in portsentry honeypot
2019-09-05 10:14:56
218.98.26.162 attack
Sep  4 15:45:52 sachi sshd\[22050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.162  user=root
Sep  4 15:45:55 sachi sshd\[22050\]: Failed password for root from 218.98.26.162 port 50590 ssh2
Sep  4 15:46:02 sachi sshd\[22066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.162  user=root
Sep  4 15:46:04 sachi sshd\[22066\]: Failed password for root from 218.98.26.162 port 13631 ssh2
Sep  4 15:46:12 sachi sshd\[22076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.162  user=root
2019-09-05 09:48:03
123.16.196.119 attackbots
Unauthorized connection attempt from IP address 123.16.196.119 on Port 445(SMB)
2019-09-05 09:50:51
167.71.56.82 attackbots
Sep  5 01:54:47 piServer sshd[19673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.56.82
Sep  5 01:54:49 piServer sshd[19673]: Failed password for invalid user admin01 from 167.71.56.82 port 35400 ssh2
Sep  5 01:58:29 piServer sshd[19875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.56.82
...
2019-09-05 10:23:50
5.129.131.63 attack
8080/tcp
[2019-09-04]1pkt
2019-09-05 09:40:47
181.176.185.132 attackspam
Unauthorized connection attempt from IP address 181.176.185.132 on Port 445(SMB)
2019-09-05 09:41:30
183.103.35.194 attack
Sep  5 00:59:45 XXX sshd[55880]: Invalid user ofsaa from 183.103.35.194 port 46710
2019-09-05 09:40:30
177.41.9.65 attackspambots
Unauthorized connection attempt from IP address 177.41.9.65 on Port 445(SMB)
2019-09-05 09:38:48

最近上报的IP列表

117.212.37.48 93.20.57.144 1.129.74.108 1.129.73.140
1.129.47.160 1.129.177.137 1.129.181.134 1.129.232.27
1.129.155.198 1.128.8.11 207.166.212.31 1.128.254.96
1.129.102.196 1.129.104.144 1.128.16.38 1.128.181.130
94.27.1.235 24.78.105.147 33.56.145.141 1.128.118.97