必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Beijing

省份(region): Beijing

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.130.139.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.130.139.207.		IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 28 09:04:17 CST 2021
;; MSG SIZE  rcvd: 108
HOST信息:
b'Host 207.139.130.116.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 116.130.139.207.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.15.122 attack
SSH Brute-Force attacks
2020-04-02 20:00:18
217.182.68.93 attackbotsspam
Invalid user es from 217.182.68.93 port 39118
2020-04-02 19:45:06
210.245.92.228 attack
Apr  1 16:51:20 hostnameproxy sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.228  user=r.r
Apr  1 16:51:22 hostnameproxy sshd[2184]: Failed password for r.r from 210.245.92.228 port 37051 ssh2
Apr  1 16:53:06 hostnameproxy sshd[2230]: Invalid user aq from 210.245.92.228 port 48494
Apr  1 16:53:06 hostnameproxy sshd[2230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.228
Apr  1 16:53:08 hostnameproxy sshd[2230]: Failed password for invalid user aq from 210.245.92.228 port 48494 ssh2
Apr  1 16:55:58 hostnameproxy sshd[2307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.228  user=r.r
Apr  1 16:56:00 hostnameproxy sshd[2307]: Failed password for r.r from 210.245.92.228 port 55988 ssh2
Apr  1 16:57:01 hostnameproxy sshd[2331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser=........
------------------------------
2020-04-02 20:08:43
181.22.3.169 attackbotsspam
Brute force attempt
2020-04-02 19:35:23
175.6.35.166 attackspambots
Brute-force attempt banned
2020-04-02 20:07:45
111.165.183.250 attackspambots
CN China dns250.online.tj.cn Failures: 20 ftpd
2020-04-02 19:38:39
54.36.54.24 attackbotsspam
Apr  2 14:30:03 pkdns2 sshd\[8741\]: Address 54.36.54.24 maps to ip-54-36-54.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Apr  2 14:30:03 pkdns2 sshd\[8741\]: Invalid user wangxuan from 54.36.54.24Apr  2 14:30:04 pkdns2 sshd\[8741\]: Failed password for invalid user wangxuan from 54.36.54.24 port 45094 ssh2Apr  2 14:33:55 pkdns2 sshd\[8905\]: Address 54.36.54.24 maps to ip-54-36-54.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Apr  2 14:33:56 pkdns2 sshd\[8905\]: Failed password for root from 54.36.54.24 port 57768 ssh2Apr  2 14:37:43 pkdns2 sshd\[9096\]: Address 54.36.54.24 maps to ip-54-36-54.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
...
2020-04-02 19:48:07
218.145.208.236 attack
Unauthorized connection attempt detected from IP address 218.145.208.236 to port 23
2020-04-02 19:43:28
222.186.175.202 attackbotsspam
DATE:2020-04-02 14:05:57, IP:222.186.175.202, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-04-02 20:11:53
180.127.94.109 attackbotsspam
Email rejected due to spam filtering
2020-04-02 20:15:52
118.174.109.192 attackbotsspam
Unauthorized connection attempt detected from IP address 118.174.109.192 to port 445
2020-04-02 20:11:08
138.68.95.204 attackspambots
Apr  2 13:49:33 xeon sshd[657]: Failed password for root from 138.68.95.204 port 48836 ssh2
2020-04-02 20:09:02
59.125.7.195 attackspam
TW Taiwan 59-125-7-195.HINET-IP.hinet.net Hits: 11
2020-04-02 19:36:30
153.36.110.47 attack
SSH Authentication Attempts Exceeded
2020-04-02 19:37:19
106.13.207.159 attack
ssh brute force
2020-04-02 19:52:02

最近上报的IP列表

204.110.160.211 144.25.145.108 0.189.232.225 62.180.3.130
69.47.143.143 44.83.71.69 151.187.233.85 76.204.138.210
186.73.33.29 79.218.192.73 114.9.171.167 37.246.190.127
29.61.34.113 133.250.7.66 124.136.189.207 189.198.112.156
184.250.106.2 151.51.125.135 69.196.191.239 123.5.3.249