必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.129.130.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.129.130.13.			IN	A

;; AUTHORITY SECTION:
.			493	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 15:34:14 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 13.130.129.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.130.129.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.73.230.135 attack
Autoban   185.73.230.135 AUTH/CONNECT
2020-02-03 21:12:02
40.101.76.146 attackbotsspam
firewall-block, port(s): 54388/tcp
2020-02-03 21:47:00
212.64.109.31 attackspambots
Feb  3 10:29:50 firewall sshd[13390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.109.31
Feb  3 10:29:50 firewall sshd[13390]: Invalid user stack from 212.64.109.31
Feb  3 10:29:52 firewall sshd[13390]: Failed password for invalid user stack from 212.64.109.31 port 45964 ssh2
...
2020-02-03 21:55:00
110.49.126.26 attackbots
20/2/3@07:31:04: FAIL: Alarm-Network address from=110.49.126.26
...
2020-02-03 21:15:56
158.69.222.2 attackbotsspam
...
2020-02-03 21:53:12
121.204.171.167 attackbotsspam
Feb  3 16:40:42 server sshd\[2073\]: Invalid user zimbra from 121.204.171.167
Feb  3 16:40:42 server sshd\[2073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.171.167 
Feb  3 16:40:44 server sshd\[2073\]: Failed password for invalid user zimbra from 121.204.171.167 port 36442 ssh2
Feb  3 16:42:46 server sshd\[2397\]: Invalid user informix from 121.204.171.167
Feb  3 16:42:46 server sshd\[2397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.171.167 
...
2020-02-03 21:46:35
101.51.34.210 attackspambots
1580705121 - 02/03/2020 05:45:21 Host: 101.51.34.210/101.51.34.210 Port: 445 TCP Blocked
2020-02-03 21:17:07
216.221.196.221 attackbotsspam
GPON Home Routers Remote Code Execution Vulnerability
2020-02-03 21:20:20
157.230.246.176 attackspambots
2020-02-03T04:19:23.8860851495-001 sshd[25476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.246.176  user=r.r
2020-02-03T04:19:25.9113761495-001 sshd[25476]: Failed password for r.r from 157.230.246.176 port 52272 ssh2
2020-02-03T04:49:32.3936871495-001 sshd[26757]: Invalid user wpyan from 157.230.246.176 port 52722
2020-02-03T04:49:32.4014061495-001 sshd[26757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.246.176
2020-02-03T04:49:32.3936871495-001 sshd[26757]: Invalid user wpyan from 157.230.246.176 port 52722
2020-02-03T04:49:34.4377461495-001 sshd[26757]: Failed password for invalid user wpyan from 157.230.246.176 port 52722 ssh2
2020-02-03T04:52:23.3761261495-001 sshd[26874]: Invalid user mariah1 from 157.230.246.176 port 60104
2020-02-03T04:52:23.3854521495-001 sshd[26874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157........
------------------------------
2020-02-03 21:48:31
186.90.38.30 attackspam
Honeypot attack, port: 445, PTR: 186-90-38-30.genericrev.cantv.net.
2020-02-03 21:13:58
95.111.74.98 attackbots
Feb  3 14:27:05 markkoudstaal sshd[12479]: Failed password for root from 95.111.74.98 port 34642 ssh2
Feb  3 14:30:01 markkoudstaal sshd[13002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98
Feb  3 14:30:03 markkoudstaal sshd[13002]: Failed password for invalid user dspace from 95.111.74.98 port 33390 ssh2
2020-02-03 21:38:56
180.252.96.35 attackspam
1580736601 - 02/03/2020 14:30:01 Host: 180.252.96.35/180.252.96.35 Port: 445 TCP Blocked
2020-02-03 21:41:30
86.252.108.168 attackspambots
SSH invalid-user multiple login try
2020-02-03 21:45:44
192.99.244.225 attack
Feb  3 sshd[22729]: Invalid user dulce from 192.99.244.225 port 48888
2020-02-03 21:44:59
159.203.11.4 attackbots
[munged]::443 159.203.11.4 - - [03/Feb/2020:14:29:20 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.11.4 - - [03/Feb/2020:14:29:22 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.11.4 - - [03/Feb/2020:14:29:23 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.11.4 - - [03/Feb/2020:14:29:30 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.11.4 - - [03/Feb/2020:14:29:41 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 159.203.11.4 - - [03/Feb/2020:14:29:48 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Li
2020-02-03 21:47:42

最近上报的IP列表

38.190.247.207 204.146.231.51 62.210.90.101 105.46.42.156
36.78.203.10 70.122.93.162 120.39.195.213 153.88.34.21
185.20.214.19 253.136.218.5 107.217.195.198 168.148.39.221
153.206.171.236 27.191.42.142 77.158.158.183 84.248.147.164
17.235.151.0 222.15.71.61 253.45.60.124 57.181.189.160