必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.130.105.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.130.105.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 01:14:05 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
53.105.130.122.in-addr.arpa domain name pointer flh2-122-130-105-53.tky.mesh.ad.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.105.130.122.in-addr.arpa	name = flh2-122-130-105-53.tky.mesh.ad.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.192.11.126 attack
Unauthorized connection attempt detected from IP address 181.192.11.126 to port 8081
2020-07-09 07:24:45
61.177.172.102 attack
Jul  9 01:11:56 vps639187 sshd\[9456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102  user=root
Jul  9 01:11:58 vps639187 sshd\[9456\]: Failed password for root from 61.177.172.102 port 47196 ssh2
Jul  9 01:12:00 vps639187 sshd\[9456\]: Failed password for root from 61.177.172.102 port 47196 ssh2
...
2020-07-09 07:15:10
45.51.182.177 attack
Unauthorized connection attempt detected from IP address 45.51.182.177 to port 22
2020-07-09 07:17:54
222.184.163.247 attackspambots
Unauthorized connection attempt detected from IP address 222.184.163.247 to port 80
2020-07-09 07:19:47
61.177.172.142 attack
2020-07-08T23:31:56.948545shield sshd\[25858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.142  user=root
2020-07-08T23:31:59.298093shield sshd\[25858\]: Failed password for root from 61.177.172.142 port 62597 ssh2
2020-07-08T23:32:02.759127shield sshd\[25858\]: Failed password for root from 61.177.172.142 port 62597 ssh2
2020-07-08T23:32:05.297370shield sshd\[25858\]: Failed password for root from 61.177.172.142 port 62597 ssh2
2020-07-08T23:32:08.583597shield sshd\[25858\]: Failed password for root from 61.177.172.142 port 62597 ssh2
2020-07-09 07:35:09
68.39.86.3 attack
Unauthorized connection attempt detected from IP address 68.39.86.3 to port 22
2020-07-09 07:34:28
106.13.235.29 attackspam
Unauthorized connection attempt detected from IP address 106.13.235.29 to port 445
2020-07-09 07:31:20
195.54.160.135 attackbots
 TCP (SYN) 195.54.160.135:56179 -> port 6379, len 44
2020-07-09 07:22:10
123.248.45.40 attack
Unauthorized connection attempt detected from IP address 123.248.45.40 to port 81
2020-07-09 07:47:23
73.21.4.103 attackbotsspam
Unauthorized connection attempt detected from IP address 73.21.4.103 to port 22
2020-07-09 07:33:46
39.129.116.126 attackbotsspam
Unauthorized connection attempt detected from IP address 39.129.116.126 to port 5555
2020-07-09 07:38:10
84.51.87.33 attack
Unauthorized connection attempt detected from IP address 84.51.87.33 to port 445
2020-07-09 07:11:57
72.226.16.116 attack
Unauthorized connection attempt detected from IP address 72.226.16.116 to port 8000
2020-07-09 07:34:03
177.85.116.141 attackspam
Unauthorized connection attempt detected from IP address 177.85.116.141 to port 23
2020-07-09 07:27:22
45.179.180.20 attackspam
Unauthorized connection attempt detected from IP address 45.179.180.20 to port 23
2020-07-09 07:36:50

最近上报的IP列表

80.82.205.190 109.197.22.207 6.109.175.199 240.242.138.62
103.95.15.91 45.62.142.50 7.93.217.248 196.51.133.167
75.109.112.217 223.220.113.189 225.5.50.49 104.24.227.132
191.27.89.58 99.234.166.66 214.221.61.67 28.140.130.90
200.73.190.126 176.105.155.177 189.189.30.175 250.157.210.233