必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.2.226.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.2.226.130.			IN	A

;; AUTHORITY SECTION:
.			329	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 19:18:36 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
130.226.2.1.in-addr.arpa domain name pointer node-jgi.pool-1-2.dynamic.totinternet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.226.2.1.in-addr.arpa	name = node-jgi.pool-1-2.dynamic.totinternet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.211 attackbots
Sep 16 17:49:54 mx sshd[726363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Sep 16 17:49:57 mx sshd[726363]: Failed password for root from 218.92.0.211 port 52867 ssh2
Sep 16 17:49:54 mx sshd[726363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Sep 16 17:49:57 mx sshd[726363]: Failed password for root from 218.92.0.211 port 52867 ssh2
Sep 16 17:49:59 mx sshd[726363]: Failed password for root from 218.92.0.211 port 52867 ssh2
...
2020-09-16 20:33:12
24.143.242.14 attackspambots
Port scan on 2 port(s) from 24.143.242.14 detected:
22 (07:00:38)
22 (07:00:41)
2020-09-16 20:47:22
139.59.57.64 attackspambots
139.59.57.64 - - [16/Sep/2020:04:48:19 +0100] "POST /wp-login.php HTTP/1.1" 200 1967 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.57.64 - - [16/Sep/2020:04:48:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.57.64 - - [16/Sep/2020:04:48:21 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-16 20:27:08
45.233.244.200 attack
Unauthorized connection attempt from IP address 45.233.244.200 on Port 445(SMB)
2020-09-16 20:54:42
190.145.162.138 attackbots
Sep 14 18:36:41 cumulus sshd[26418]: Invalid user file from 190.145.162.138 port 46101
Sep 14 18:36:41 cumulus sshd[26418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.162.138
Sep 14 18:36:43 cumulus sshd[26418]: Failed password for invalid user file from 190.145.162.138 port 46101 ssh2
Sep 14 18:36:43 cumulus sshd[26418]: Received disconnect from 190.145.162.138 port 46101:11: Bye Bye [preauth]
Sep 14 18:36:43 cumulus sshd[26418]: Disconnected from 190.145.162.138 port 46101 [preauth]
Sep 14 18:44:45 cumulus sshd[27204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.162.138  user=r.r
Sep 14 18:44:47 cumulus sshd[27204]: Failed password for r.r from 190.145.162.138 port 46210 ssh2
Sep 14 18:44:47 cumulus sshd[27204]: Received disconnect from 190.145.162.138 port 46210:11: Bye Bye [preauth]
Sep 14 18:44:47 cumulus sshd[27204]: Disconnected from 190.145.162.138 port 46210........
-------------------------------
2020-09-16 20:56:24
178.207.242.216 attack
Unauthorized connection attempt from IP address 178.207.242.216 on Port 445(SMB)
2020-09-16 20:45:56
164.90.217.12 attack
Invalid user admin from 164.90.217.12 port 11394
2020-09-16 20:21:40
122.165.194.191 attackbotsspam
$f2bV_matches
2020-09-16 20:49:21
212.64.95.187 attack
Sep 16 07:15:02 Tower sshd[6429]: Connection from 212.64.95.187 port 40004 on 192.168.10.220 port 22 rdomain ""
Sep 16 07:15:03 Tower sshd[6429]: Failed password for root from 212.64.95.187 port 40004 ssh2
Sep 16 07:15:04 Tower sshd[6429]: Received disconnect from 212.64.95.187 port 40004:11: Bye Bye [preauth]
Sep 16 07:15:04 Tower sshd[6429]: Disconnected from authenticating user root 212.64.95.187 port 40004 [preauth]
2020-09-16 20:35:20
5.253.26.139 attackbots
5.253.26.139 - - [16/Sep/2020:13:47:21 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.253.26.139 - - [16/Sep/2020:13:47:23 +0200] "POST /wp-login.php HTTP/1.1" 200 8809 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
5.253.26.139 - - [16/Sep/2020:13:47:24 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-16 20:30:59
116.68.205.186 attackspambots
Unauthorized connection attempt from IP address 116.68.205.186 on Port 445(SMB)
2020-09-16 20:32:32
67.211.208.83 attack
SSH auth scanning - multiple failed logins
2020-09-16 20:19:39
49.205.9.91 attack
Unauthorized connection attempt from IP address 49.205.9.91 on Port 445(SMB)
2020-09-16 20:26:03
157.245.200.233 attackspam
Sep 16 13:15:32 gospond sshd[20951]: Failed password for root from 157.245.200.233 port 51268 ssh2
Sep 16 13:15:30 gospond sshd[20951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.200.233  user=root
Sep 16 13:15:32 gospond sshd[20951]: Failed password for root from 157.245.200.233 port 51268 ssh2
...
2020-09-16 20:29:18
62.234.193.119 attackspambots
Sep 16 10:03:56 localhost sshd[936881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.193.119 
Sep 16 10:03:56 localhost sshd[936881]: Invalid user oracle from 62.234.193.119 port 49198
Sep 16 10:03:58 localhost sshd[936881]: Failed password for invalid user oracle from 62.234.193.119 port 49198 ssh2
Sep 16 10:04:48 localhost sshd[938654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.193.119  user=root
Sep 16 10:04:50 localhost sshd[938654]: Failed password for root from 62.234.193.119 port 59016 ssh2
...
2020-09-16 20:22:43

最近上报的IP列表

1.2.226.127 1.2.226.133 1.2.226.136 1.2.226.138
1.2.226.141 1.2.226.176 1.2.226.180 1.2.226.189
1.2.226.190 1.2.226.2 1.2.226.206 1.2.226.223
1.2.226.230 1.2.226.244 1.2.226.26 1.2.226.48
1.2.226.53 1.2.226.59 1.2.226.63 1.2.226.72