必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
114.119.130.80 attack
badbot
2020-01-14 02:34:31
114.119.130.243 attackbots
badbot
2020-01-13 22:45:58
114.119.130.43 attackspam
badbot
2020-01-13 21:38:49
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.119.130.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26660
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.119.130.57.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:42:33 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
57.130.119.114.in-addr.arpa domain name pointer petalbot-114-119-130-57.petalsearch.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.130.119.114.in-addr.arpa	name = petalbot-114-119-130-57.petalsearch.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.104 attack
Unauthorized connection attempt detected from IP address 112.85.42.104 to port 22 [T]
2020-07-03 23:07:10
106.12.89.173 attackspambots
Jul  3 20:35:56 itv-usvr-01 sshd[31020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.173  user=root
Jul  3 20:35:58 itv-usvr-01 sshd[31020]: Failed password for root from 106.12.89.173 port 46688 ssh2
Jul  3 20:38:57 itv-usvr-01 sshd[31135]: Invalid user comp from 106.12.89.173
Jul  3 20:38:57 itv-usvr-01 sshd[31135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.173
Jul  3 20:38:57 itv-usvr-01 sshd[31135]: Invalid user comp from 106.12.89.173
Jul  3 20:38:59 itv-usvr-01 sshd[31135]: Failed password for invalid user comp from 106.12.89.173 port 53794 ssh2
2020-07-03 22:49:06
209.17.96.26 attackspambots
port scan and connect, tcp 8081 (blackice-icecap)
2020-07-03 23:00:34
49.235.10.240 attackspambots
Jul  3 16:21:16 ift sshd\[649\]: Invalid user mangesh from 49.235.10.240Jul  3 16:21:18 ift sshd\[649\]: Failed password for invalid user mangesh from 49.235.10.240 port 40230 ssh2Jul  3 16:25:08 ift sshd\[1172\]: Invalid user git from 49.235.10.240Jul  3 16:25:10 ift sshd\[1172\]: Failed password for invalid user git from 49.235.10.240 port 55412 ssh2Jul  3 16:28:59 ift sshd\[2042\]: Invalid user qu from 49.235.10.240
...
2020-07-03 23:00:15
103.253.146.142 attackspambots
Jul  3 04:11:49 lnxded64 sshd[12844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.146.142
Jul  3 04:11:49 lnxded64 sshd[12844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.146.142
Jul  3 04:11:51 lnxded64 sshd[12844]: Failed password for invalid user admin from 103.253.146.142 port 49263 ssh2
2020-07-03 22:33:33
223.100.167.105 attackspam
Jul  3 19:47:26 gw1 sshd[6219]: Failed password for root from 223.100.167.105 port 59815 ssh2
Jul  3 19:53:23 gw1 sshd[6353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.100.167.105
...
2020-07-03 22:57:03
58.87.123.166 attackspam
Jul  3 02:09:14 *** sshd[27536]: Invalid user shuang from 58.87.123.166
2020-07-03 23:07:41
46.38.150.94 attackbotsspam
2020-07-03 15:03:31 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=ucp@mail.csmailer.org)
2020-07-03 15:04:03 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=splet@mail.csmailer.org)
2020-07-03 15:04:35 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=endor@mail.csmailer.org)
2020-07-03 15:05:07 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=imano@mail.csmailer.org)
2020-07-03 15:05:39 auth_plain authenticator failed for (User) [46.38.150.94]: 535 Incorrect authentication data (set_id=PayerID@mail.csmailer.org)
...
2020-07-03 23:04:54
222.186.15.158 attack
detected by Fail2Ban
2020-07-03 22:48:43
79.137.33.20 attackspambots
Jul  3 04:10:59 lnxded64 sshd[12679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20
Jul  3 04:10:59 lnxded64 sshd[12679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20
Jul  3 04:11:01 lnxded64 sshd[12679]: Failed password for invalid user chris from 79.137.33.20 port 37402 ssh2
2020-07-03 22:49:31
115.84.76.99 attackbotsspam
2020-07-0304:08:371jrB80-0007Th-D9\<=info@whatsup2013.chH=\(localhost\)[113.172.107.137]:44609P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4944id=0860d6858ea58f871b1ea804e397bda970c88e@whatsup2013.chT="Fuckahoearoundyou"forthmsalbro@outlook.comshivubaria198198@gmail.comwinataforaustral@gmail.com2020-07-0304:07:091jrB6a-0007Ob-Jx\<=info@whatsup2013.chH=\(localhost\)[115.84.76.99]:36871P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4913id=2a9224777c577d75e9ec5af611654f5b704a6b@whatsup2013.chT="Meetrealfemalesforhookupnow"forkarldent@outlook.combpuxi666@gmail.comremixmm@gmail.com2020-07-0304:07:221jrB6n-0007PO-Dx\<=info@whatsup2013.chH=045-238-121-222.provecom.com.br\(localhost\)[45.238.121.222]:41688P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4902id=0dcd03505b70a5a98ecb7d2eda1d979ba0bcf260@whatsup2013.chT="Jointodaytogetpussytonite"forjaywantstoeat@gmail.comroberthinogue
2020-07-03 23:11:14
61.183.151.14 attackbotsspam
2020-07-0304:08:371jrB80-0007Th-D9\<=info@whatsup2013.chH=\(localhost\)[113.172.107.137]:44609P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4944id=0860d6858ea58f871b1ea804e397bda970c88e@whatsup2013.chT="Fuckahoearoundyou"forthmsalbro@outlook.comshivubaria198198@gmail.comwinataforaustral@gmail.com2020-07-0304:07:091jrB6a-0007Ob-Jx\<=info@whatsup2013.chH=\(localhost\)[115.84.76.99]:36871P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4913id=2a9224777c577d75e9ec5af611654f5b704a6b@whatsup2013.chT="Meetrealfemalesforhookupnow"forkarldent@outlook.combpuxi666@gmail.comremixmm@gmail.com2020-07-0304:07:221jrB6n-0007PO-Dx\<=info@whatsup2013.chH=045-238-121-222.provecom.com.br\(localhost\)[45.238.121.222]:41688P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4902id=0dcd03505b70a5a98ecb7d2eda1d979ba0bcf260@whatsup2013.chT="Jointodaytogetpussytonite"forjaywantstoeat@gmail.comroberthinogue
2020-07-03 23:09:54
164.132.47.139 attackspambots
2020-07-03T13:23:47.992008abusebot-4.cloudsearch.cf sshd[32213]: Invalid user jugo from 164.132.47.139 port 46192
2020-07-03T13:23:48.003900abusebot-4.cloudsearch.cf sshd[32213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-164-132-47.eu
2020-07-03T13:23:47.992008abusebot-4.cloudsearch.cf sshd[32213]: Invalid user jugo from 164.132.47.139 port 46192
2020-07-03T13:23:49.777760abusebot-4.cloudsearch.cf sshd[32213]: Failed password for invalid user jugo from 164.132.47.139 port 46192 ssh2
2020-07-03T13:28:06.589590abusebot-4.cloudsearch.cf sshd[32266]: Invalid user postgres from 164.132.47.139 port 54150
2020-07-03T13:28:06.596419abusebot-4.cloudsearch.cf sshd[32266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-164-132-47.eu
2020-07-03T13:28:06.589590abusebot-4.cloudsearch.cf sshd[32266]: Invalid user postgres from 164.132.47.139 port 54150
2020-07-03T13:28:08.456064abusebot-4.cloudsearch.
...
2020-07-03 22:50:15
200.98.132.197 attackspambots
[ssh] SSH attack
2020-07-03 23:12:09
182.71.221.78 attackbotsspam
Jul  3 16:40:41 eventyay sshd[23039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.221.78
Jul  3 16:40:42 eventyay sshd[23039]: Failed password for invalid user user3 from 182.71.221.78 port 35308 ssh2
Jul  3 16:44:33 eventyay sshd[23085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.221.78
...
2020-07-03 22:46:45

最近上报的IP列表

114.119.131.199 114.119.132.103 114.119.134.148 114.119.130.255
114.119.132.57 114.119.133.152 114.119.134.161 114.119.134.41
114.119.133.158 114.119.134.80 114.119.134.226 114.119.136.199
114.119.134.3 114.119.136.138 114.119.136.86 114.119.136.253
114.119.136.72 114.119.138.250 114.119.136.96 114.119.137.180