必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Guangdong

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.2.246.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1451
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.2.246.130.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 06 01:02:08 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 130.246.2.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 130.246.2.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.245.204.161 attack
Hit on /wp/wp-login.php
2019-10-25 05:26:31
210.13.83.135 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/210.13.83.135/ 
 
 CN - 1H : (882)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN9929 
 
 IP : 210.13.83.135 
 
 CIDR : 210.13.80.0/20 
 
 PREFIX COUNT : 414 
 
 UNIQUE IP COUNT : 537856 
 
 
 ATTACKS DETECTED ASN9929 :  
  1H - 2 
  3H - 3 
  6H - 3 
 12H - 3 
 24H - 3 
 
 DateTime : 2019-10-24 22:16:41 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-25 05:15:20
180.68.177.209 attackspam
Oct 24 23:22:25 * sshd[14338]: Failed password for root from 180.68.177.209 port 39084 ssh2
2019-10-25 05:30:57
23.100.232.233 attackspambots
Excessive requests.
2019-10-25 05:19:24
121.198.113.96 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/121.198.113.96/ 
 
 CN - 1H : (897)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN37963 
 
 IP : 121.198.113.96 
 
 CIDR : 121.198.0.0/16 
 
 PREFIX COUNT : 303 
 
 UNIQUE IP COUNT : 6062848 
 
 
 ATTACKS DETECTED ASN37963 :  
  1H - 16 
  3H - 25 
  6H - 30 
 12H - 32 
 24H - 40 
 
 DateTime : 2019-10-24 22:16:52 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-25 05:09:09
45.136.110.41 attackbotsspam
Oct 24 22:27:00 mc1 kernel: \[3235163.075734\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.110.41 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=53965 PROTO=TCP SPT=54720 DPT=22522 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 24 22:27:21 mc1 kernel: \[3235184.258138\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.110.41 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=37117 PROTO=TCP SPT=54720 DPT=373 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 24 22:33:31 mc1 kernel: \[3235553.633701\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.110.41 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=29144 PROTO=TCP SPT=54720 DPT=633 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-25 05:42:34
81.84.235.209 attackbotsspam
Failed password for invalid user on ssh2
2019-10-25 05:19:08
140.143.69.34 attackspam
Failed password for invalid user on ssh2
2019-10-25 05:22:50
222.186.175.154 attackbotsspam
Oct 25 02:32:11 areeb-Workstation sshd[16334]: Failed password for root from 222.186.175.154 port 57718 ssh2
Oct 25 02:32:15 areeb-Workstation sshd[16334]: Failed password for root from 222.186.175.154 port 57718 ssh2
...
2019-10-25 05:08:27
190.13.173.67 attack
SSH bruteforce
2019-10-25 05:20:47
79.7.241.94 attack
Oct 24 22:11:34 vps01 sshd[12962]: Failed password for root from 79.7.241.94 port 60904 ssh2
2019-10-25 05:14:18
191.189.30.241 attackbots
Automatic report - Banned IP Access
2019-10-25 05:38:49
54.38.36.210 attackspam
Oct 24 22:38:51 dedicated sshd[10060]: Invalid user test10 from 54.38.36.210 port 58460
2019-10-25 05:17:18
177.23.196.77 attack
Oct 24 23:29:01 localhost sshd\[6494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.196.77  user=root
Oct 24 23:29:03 localhost sshd\[6494\]: Failed password for root from 177.23.196.77 port 43180 ssh2
Oct 24 23:34:05 localhost sshd\[6932\]: Invalid user ubuntu from 177.23.196.77 port 54908
2019-10-25 05:36:41
202.59.166.148 attackspam
2019-10-24T21:17:34.817265hub.schaetter.us sshd\[15984\]: Invalid user 70 from 202.59.166.148 port 42564
2019-10-24T21:17:34.827934hub.schaetter.us sshd\[15984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=smtp.waytodeal.com
2019-10-24T21:17:36.912333hub.schaetter.us sshd\[15984\]: Failed password for invalid user 70 from 202.59.166.148 port 42564 ssh2
2019-10-24T21:24:23.153603hub.schaetter.us sshd\[16028\]: Invalid user user from 202.59.166.148 port 33173
2019-10-24T21:24:23.163162hub.schaetter.us sshd\[16028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=smtp.waytodeal.com
...
2019-10-25 05:41:04

最近上报的IP列表

56.162.144.31 195.88.78.157 27.45.171.160 221.239.167.41
203.245.105.146 23.61.170.157 184.116.19.48 139.190.43.145
82.215.204.94 168.251.113.221 120.92.153.47 157.133.68.22
113.188.177.50 85.189.183.220 57.175.85.185 210.199.82.85
218.203.36.57 179.143.58.138 108.178.228.191 119.3.160.221