必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Huế

省份(region): Tinh Thua Thien-Hue

国家(country): Vietnam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
113.161.219.128 attackspam
1598702993 - 08/29/2020 14:09:53 Host: 113.161.219.128/113.161.219.128 Port: 445 TCP Blocked
2020-08-29 22:54:33
113.161.210.81 attackspambots
SMB Server BruteForce Attack
2020-08-22 16:25:04
113.161.218.110 attackspambots
Unauthorized connection attempt from IP address 113.161.218.110 on Port 445(SMB)
2020-08-21 02:52:39
113.161.212.60 attack
Unauthorized IMAP connection attempt
2020-08-16 23:23:16
113.161.218.118 attackspam
Port scan: Attack repeated for 24 hours
2020-08-03 15:33:37
113.161.218.118 attack
20/7/16@00:12:37: FAIL: Alarm-Network address from=113.161.218.118
...
2020-07-16 15:29:52
113.161.212.131 attack
xmlrpc attack
2020-06-05 21:56:44
113.161.218.186 attackbotsspam
94. On May 18 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 113.161.218.186.
2020-05-20 17:49:43
113.161.211.205 attackspam
 TCP (SYN) 113.161.211.205:35331 -> port 22, len 52
2020-05-20 06:00:41
113.161.210.203 attack
Port probing on unauthorized port 445
2020-05-06 14:37:58
113.161.213.42 attack
Unauthorized connection attempt from IP address 113.161.213.42 on Port 445(SMB)
2020-03-23 21:00:39
113.161.219.128 attackspam
Unauthorized connection attempt from IP address 113.161.219.128 on Port 445(SMB)
2020-03-11 10:46:33
113.161.210.23 attackbots
Unauthorized connection attempt from IP address 113.161.210.23 on Port 445(SMB)
2020-03-05 19:27:14
113.161.211.138 attack
Unauthorized connection attempt detected from IP address 113.161.211.138 to port 23 [J]
2020-03-01 05:42:32
113.161.212.1 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-27 05:18:27
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.161.21.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.161.21.13.			IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020110100 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 100.100.2.138#53(100.100.2.138)
;; WHEN: Sun Nov 01 16:29:26 CST 2020
;; MSG SIZE  rcvd: 117

HOST信息:
13.21.161.113.in-addr.arpa domain name pointer static.vnpt.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 13.21.161.113.in-addr.arpa.: No answer

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.139.1.197 attackbots
Feb  7 14:58:36 Ubuntu-1404-trusty-64-minimal sshd\[19060\]: Invalid user emq from 37.139.1.197
Feb  7 14:58:36 Ubuntu-1404-trusty-64-minimal sshd\[19060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.1.197
Feb  7 14:58:38 Ubuntu-1404-trusty-64-minimal sshd\[19060\]: Failed password for invalid user emq from 37.139.1.197 port 57054 ssh2
Feb  7 15:04:04 Ubuntu-1404-trusty-64-minimal sshd\[31379\]: Invalid user sek from 37.139.1.197
Feb  7 15:04:04 Ubuntu-1404-trusty-64-minimal sshd\[31379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.1.197
2020-02-08 03:23:48
1.160.198.226 attack
Unauthorized connection attempt from IP address 1.160.198.226 on Port 445(SMB)
2020-02-08 03:28:37
222.186.175.23 attackbots
Feb  8 00:51:02 areeb-Workstation sshd[23400]: Failed password for root from 222.186.175.23 port 49742 ssh2
Feb  8 00:51:06 areeb-Workstation sshd[23400]: Failed password for root from 222.186.175.23 port 49742 ssh2
...
2020-02-08 03:26:38
162.14.2.0 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-02-08 03:18:02
69.94.158.109 attackspambots
Feb  7 15:04:32 grey postfix/smtpd\[21917\]: NOQUEUE: reject: RCPT from queue.swingthelamp.com\[69.94.158.109\]: 554 5.7.1 Service unavailable\; Client host \[69.94.158.109\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.158.109\]\; from=\ to=\ proto=ESMTP helo=\Feb  7 15:04:32 grey postfix/smtpd\[22902\]: NOQUEUE: reject: RCPT from queue.swingthelamp.com\[69.94.158.109\]: 554 5.7.1 Service unavailable\; Client host \[69.94.158.109\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.158.109\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-08 02:59:57
14.188.98.53 attackspambots
Feb  7 09:34:05 nandi sshd[19785]: Did not receive identification string from 14.188.98.53
Feb  7 09:34:06 nandi sshd[19790]: Address 14.188.98.53 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb  7 09:34:07 nandi sshd[19790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.188.98.53  user=r.r
Feb  7 09:34:08 nandi sshd[19790]: Failed password for r.r from 14.188.98.53 port 53614 ssh2
Feb  7 09:34:09 nandi sshd[19790]: Connection closed by 14.188.98.53 [preauth]
Feb  7 09:34:10 nandi sshd[19811]: Address 14.188.98.53 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Feb  7 09:34:11 nandi sshd[19811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.188.98.53  user=r.r
Feb  7 09:34:12 nandi sshd[19811]: Failed password for r.r from 14.188.98.53 port 54361 ssh2
Feb  7 09:34:12 nandi sshd[19811]:........
-------------------------------
2020-02-08 02:53:59
118.232.97.255 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-08 03:13:46
129.213.57.125 attackspam
$f2bV_matches
2020-02-08 02:45:45
107.181.174.74 attackspam
Automatic report - SSH Brute-Force Attack
2020-02-08 02:45:16
111.10.43.244 attack
ssh failed login
2020-02-08 02:43:49
213.32.67.160 attack
...
2020-02-08 03:27:21
201.211.151.168 attackbots
Automatic report - Banned IP Access
2020-02-08 02:57:42
185.39.10.69 attackspam
Sql/code injection probe
2020-02-08 03:05:14
222.186.175.151 attackspam
$f2bV_matches
2020-02-08 03:13:10
217.112.128.51 attackspambots
Email spam message
2020-02-08 03:24:07

最近上报的IP列表

46.185.51.124 179.51.119.51 54.199.191.120 31.15.251.98
213.104.127.145 23.228.111.66 113.23.104.109 191.129.90.45
182.65.25.225 130.105.33.27 112.204.46.136 112.204.72.92
14.108.235.148 216.58.207.228 94.44.127.19 182.52.203.225
184.179.114.195 37.120.149.117 114.124.132.241 174.253.64.58