必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.230.148.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34278
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.230.148.217.			IN	A

;; AUTHORITY SECTION:
.			384	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:14:12 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
217.148.230.13.in-addr.arpa domain name pointer ec2-13-230-148-217.ap-northeast-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
217.148.230.13.in-addr.arpa	name = ec2-13-230-148-217.ap-northeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.55.39.129 attack
Automatic report - Banned IP Access
2019-08-05 18:08:00
36.229.84.250 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=54463)(08050931)
2019-08-05 18:14:27
88.204.242.54 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 18:33:51
114.39.128.54 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=10041)(08050931)
2019-08-05 18:10:02
175.115.53.73 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 17:48:18
27.72.73.16 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 18:41:12
36.79.252.20 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 17:39:17
175.18.196.227 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=29991)(08050931)
2019-08-05 17:23:34
23.238.175.148 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 17:39:54
42.118.49.211 attackspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 17:37:00
14.162.176.131 attackspambots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 18:16:41
185.100.87.177 attackbots
[portscan] tcp/1433 [MsSQL]
[scan/connect: 2 time(s)]
*(RWIN=65535)(08050931)
2019-08-05 17:46:31
77.235.19.4 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 18:35:13
31.180.240.233 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=41894)(08050931)
2019-08-05 18:40:31
105.208.59.102 attack
[portscan] tcp/23 [TELNET]
*(RWIN=14600)(08050931)
2019-08-05 18:33:13

最近上报的IP列表

13.230.138.127 13.230.13.27 13.230.164.134 13.230.149.224
13.230.145.14 13.230.157.234 13.230.193.177 13.230.198.156
13.230.183.168 13.230.204.60 13.230.149.252 13.230.227.118
13.230.177.178 13.230.187.48 13.230.245.187 13.230.249.17
13.230.211.124 13.230.46.62 13.230.57.178 13.230.250.7