必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Austria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.130.49.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8724
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.130.49.67.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:10:07 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 67.49.130.128.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.49.130.128.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.105.41.101 attack
Email rejected due to spam filtering
2020-06-05 21:06:13
50.224.240.154 attack
Lines containing failures of 50.224.240.154
Jun  2 09:57:13 shared04 sshd[2456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.224.240.154  user=r.r
Jun  2 09:57:16 shared04 sshd[2456]: Failed password for r.r from 50.224.240.154 port 54168 ssh2
Jun  2 09:57:16 shared04 sshd[2456]: Received disconnect from 50.224.240.154 port 54168:11: Bye Bye [preauth]
Jun  2 09:57:16 shared04 sshd[2456]: Disconnected from authenticating user r.r 50.224.240.154 port 54168 [preauth]
Jun  2 10:10:49 shared04 sshd[7921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.224.240.154  user=r.r
Jun  2 10:10:51 shared04 sshd[7921]: Failed password for r.r from 50.224.240.154 port 56896 ssh2
Jun  2 10:10:51 shared04 sshd[7921]: Received disconnect from 50.224.240.154 port 56896:11: Bye Bye [preauth]
Jun  2 10:10:51 shared04 sshd[7921]: Disconnected from authenticating user r.r 50.224.240.154 port 56896 [preaut........
------------------------------
2020-06-05 20:45:14
89.248.160.150 attack
Fail2Ban Ban Triggered
2020-06-05 20:32:18
36.111.182.133 attackspambots
Jun  5 14:33:02 piServer sshd[1593]: Failed password for root from 36.111.182.133 port 43648 ssh2
Jun  5 14:36:47 piServer sshd[1981]: Failed password for root from 36.111.182.133 port 57982 ssh2
...
2020-06-05 20:49:55
194.187.249.55 attackspambots
(From hacker@pandora.com) PLEASE FORWARD THIS EMAIL TO SOMEONE IN YOUR COMPANY WHO IS ALLOWED TO MAKE IMPORTANT DECISIONS!

We have hacked your website http://www.hotzchiropractic.com and extracted your databases.

How did this happen?
Our team has found a vulnerability within your site that we were able to exploit. After finding the vulnerability we were able to get your database credentials and extract your entire database and move the information to an offshore server.

What does this mean?

We will systematically go through a series of steps of totally damaging your reputation. First your database will be leaked or sold to the highest bidder which they will use with whatever their intentions are. Next if there are e-mails found they will be e-mailed that their information has been sold or leaked and your site http://www.hotzchiropractic.com was at fault thusly damaging your reputation and having angry customers/associates with whatever angry customers/associates do. Lastly any links that you have
2020-06-05 20:26:45
142.93.56.57 attackspam
Jun  5 14:34:14 server sshd[28692]: Failed password for root from 142.93.56.57 port 56354 ssh2
Jun  5 14:38:09 server sshd[28947]: Failed password for root from 142.93.56.57 port 55884 ssh2
...
2020-06-05 20:48:27
13.78.39.16 attack
Jun  5 13:53:48 km20725 sshd[21057]: Did not receive identification string from 13.78.39.16 port 50504
Jun  5 13:54:01 km20725 sshd[21060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.78.39.16  user=r.r
Jun  5 13:54:03 km20725 sshd[21060]: Failed password for r.r from 13.78.39.16 port 44570 ssh2
Jun  5 13:54:04 km20725 sshd[21060]: Received disconnect from 13.78.39.16 port 44570:11: Normal Shutdown, Thank you for playing [preauth]
Jun  5 13:54:04 km20725 sshd[21060]: Disconnected from authenticating user r.r 13.78.39.16 port 44570 [preauth]
Jun  5 13:54:12 km20725 sshd[21132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.78.39.16  user=r.r
Jun  5 13:54:15 km20725 sshd[21132]: Failed password for r.r from 13.78.39.16 port 32984 ssh2
Jun  5 13:54:16 km20725 sshd[21132]: Received disconnect from 13.78.39.16 port 32984:11: Normal Shutdown, Thank you for playing [preauth]
Jun  5 13:5........
-------------------------------
2020-06-05 20:49:31
58.212.197.220 attackspambots
Jun  5 12:00:39 jumpserver sshd[82765]: Failed password for root from 58.212.197.220 port 65297 ssh2
Jun  5 12:03:57 jumpserver sshd[82794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.212.197.220  user=root
Jun  5 12:03:59 jumpserver sshd[82794]: Failed password for root from 58.212.197.220 port 59140 ssh2
...
2020-06-05 20:21:13
168.194.13.19 attackspambots
Jun  5 13:55:11 eventyay sshd[5253]: Failed password for root from 168.194.13.19 port 45618 ssh2
Jun  5 13:59:23 eventyay sshd[5396]: Failed password for root from 168.194.13.19 port 49702 ssh2
...
2020-06-05 20:42:19
103.113.90.226 attack
2020-06-05 06:57:21.721269-0500  localhost smtpd[21357]: NOQUEUE: reject: RCPT from unknown[103.113.90.226]: 450 4.7.25 Client host rejected: cannot find your hostname, [103.113.90.226]; from= to= proto=ESMTP helo=<00fd7eba.megamega.xyz>
2020-06-05 21:05:21
192.151.152.178 attackbotsspam
[Fri Jun 05 13:03:43.537363 2020] [authz_core:error] [pid 18100] [client 192.151.152.178:58755] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/Dialog
[Fri Jun 05 13:03:44.738920 2020] [authz_core:error] [pid 17379] [client 192.151.152.178:55912] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/Dialog
[Fri Jun 05 13:03:44.984334 2020] [authz_core:error] [pid 17380] [client 192.151.152.178:54284] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/Dialog
...
2020-06-05 20:33:15
51.158.171.38 attackbots
Jun  5 12:26:32 mxgate1 postfix/postscreen[29601]: CONNECT from [51.158.171.38]:51995 to [176.31.12.44]:25
Jun  5 12:26:38 mxgate1 postfix/postscreen[29601]: PASS NEW [51.158.171.38]:51995
Jun  5 12:26:39 mxgate1 postfix/smtpd[29628]: connect from riquezaetica.com[51.158.171.38]
Jun x@x
Jun  5 12:26:40 mxgate1 postfix/smtpd[29628]: disconnect from riquezaetica.com[51.158.171.38] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 commands=5/6
Jun  5 12:36:40 mxgate1 postfix/postscreen[30170]: CONNECT from [51.158.171.38]:41863 to [176.31.12.44]:25
Jun  5 12:36:42 mxgate1 postfix/postscreen[30170]: PASS OLD [51.158.171.38]:41863
Jun  5 12:36:42 mxgate1 postfix/smtpd[30176]: connect from riquezaetica.com[51.158.171.38]
Jun x@x
Jun  5 12:36:42 mxgate1 postfix/smtpd[30176]: disconnect from riquezaetica.com[51.158.171.38] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 commands=5/6
Jun  5 12:46:41 mxgate1 postfix/postscreen[30212]: CONNECT from [51.158.171.38]:33300 to [176.31.12.........
-------------------------------
2020-06-05 20:51:32
191.53.198.255 attackspambots
Currently 7 failed/unauthorized logins attempts via SMTP/IMAP whostnameh 7 different usernames and wrong password:
2020-06-05T13:54:13+02:00 x@x
2020-06-03T19:17:42+02:00 x@x
2019-08-04T01:59:06+02:00 x@x
2019-08-03T01:03:04+02:00 x@x
2019-07-17T08:28:23+02:00 x@x
2019-07-07T01:51:54+02:00 x@x
2019-07-01T13:31:08+02:00 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=191.53.198.255
2020-06-05 20:40:04
45.231.12.37 attackbotsspam
Jun  5 12:54:04 pi sshd[30902]: Failed password for root from 45.231.12.37 port 34376 ssh2
2020-06-05 20:49:15
222.186.30.112 attack
Jun  5 14:55:45 abendstille sshd\[19110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Jun  5 14:55:47 abendstille sshd\[19110\]: Failed password for root from 222.186.30.112 port 48007 ssh2
Jun  5 14:55:48 abendstille sshd\[19110\]: Failed password for root from 222.186.30.112 port 48007 ssh2
Jun  5 14:55:51 abendstille sshd\[19110\]: Failed password for root from 222.186.30.112 port 48007 ssh2
Jun  5 14:55:53 abendstille sshd\[19458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
...
2020-06-05 20:58:16

最近上报的IP列表

27.182.159.56 79.253.231.224 50.221.0.78 193.147.73.247
173.127.126.111 80.154.206.189 83.190.203.144 236.255.128.72
238.231.69.181 41.154.168.94 240.34.135.65 236.115.133.109
49.135.5.200 249.113.203.60 238.205.14.45 242.40.4.199
214.33.29.135 154.179.203.228 65.247.189.36 141.44.191.35