必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       130.12.180.0 - 130.12.183.255
CIDR:           130.12.180.0/22
NetName:        PRIVATE-NETWORK
NetHandle:      NET-130-12-180-0-1
Parent:         NET130 (NET-130-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Netiface LLC (NL-846)
RegDate:        2025-10-08
Updated:        2025-12-20
Comment:        PRIVATE-NETWORK
Ref:            https://rdap.arin.net/registry/ip/130.12.180.0


OrgName:        Netiface LLC
OrgId:          NL-846
Address:        6844 Bardstown Rd
City:           Louisvile
StateProv:      KY
PostalCode:     40291
Country:        US
RegDate:        2024-04-05
Updated:        2025-05-18
Ref:            https://rdap.arin.net/registry/entity/NL-846


OrgTechHandle: NETIF2-ARIN
OrgTechName:   Netiface NOC
OrgTechPhone:  +1-216-245-7465 
OrgTechEmail:  abuse@abusehandler.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETIF2-ARIN

OrgAbuseHandle: NETIF2-ARIN
OrgAbuseName:   Netiface NOC
OrgAbusePhone:  +1-216-245-7465 
OrgAbuseEmail:  abuse@abusehandler.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETIF2-ARIN

# end


# start

NetRange:       130.12.180.0 - 130.12.180.255
CIDR:           130.12.180.0/24
NetName:        LANEDONET
NetHandle:      NET-130-12-180-0-2
Parent:         PRIVATE-NETWORK (NET-130-12-180-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   Virtualine Technologies (SITL-8)
RegDate:        2025-12-19
Updated:        2025-12-19
Comment:        Abuse email: abuse@virtualine.org
Ref:            https://rdap.arin.net/registry/ip/130.12.180.0


OrgName:        Virtualine Technologies
OrgId:          SITL-8
Address:        71-75 Shelton Street, Covent Garden, London, United Kingdom, WC2H 9JQ
City:           London
StateProv:      
PostalCode:     WC2H 9JQ
Country:        GB
RegDate:        2024-09-05
Updated:        2024-09-11
Comment:        Report your complaint:
Comment:        abuse@virtualine.org
Ref:            https://rdap.arin.net/registry/entity/SITL-8


OrgTechHandle: VAD36-ARIN
OrgTechName:   VIRTUALINE ABUSE DEPARTMENT
OrgTechPhone:  +447458164463 
OrgTechEmail:  abuse@virtualine.org
OrgTechRef:    https://rdap.arin.net/registry/entity/VAD36-ARIN

OrgAbuseHandle: VAD36-ARIN
OrgAbuseName:   VIRTUALINE ABUSE DEPARTMENT
OrgAbusePhone:  +447458164463 
OrgAbuseEmail:  abuse@virtualine.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/VAD36-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.12.180.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56216
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.12.180.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030200 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 14:00:09 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 34.180.12.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.180.12.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.172.85 attack
5521/tcp 9833/tcp 9889/tcp...
[2020-03-01/05-01]3616pkt,1290pt.(tcp)
2020-05-02 03:06:05
109.145.129.206 attack
May 01 07:30:17 tcp        0      0 r.ca:22            109.145.129.206:58934       SYN_RECV
2020-05-02 03:14:26
118.22.90.253 attack
May 01 07:35:17 tcp        0      0 r.ca:22            118.22.90.253:18669         SYN_RECV
2020-05-02 02:58:50
175.207.13.22 attackspam
May  1 14:18:18 piServer sshd[6392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.22 
May  1 14:18:20 piServer sshd[6392]: Failed password for invalid user administrador from 175.207.13.22 port 49408 ssh2
May  1 14:22:47 piServer sshd[6698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.22 
...
2020-05-02 03:07:26
103.31.178.235 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 03:11:41
92.169.67.98 attackspambots
May  1 16:47:02 vpn01 sshd[6601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.169.67.98
May  1 16:47:03 vpn01 sshd[6601]: Failed password for invalid user ftp from 92.169.67.98 port 43086 ssh2
...
2020-05-02 03:26:19
111.229.206.193 attack
2020-05-01T14:28:07.710086Z dca9dc567d96 New connection: 111.229.206.193:33170 (172.17.0.5:2222) [session: dca9dc567d96]
2020-05-01T14:32:42.057287Z bdbb6a8fd103 New connection: 111.229.206.193:43014 (172.17.0.5:2222) [session: bdbb6a8fd103]
2020-05-02 02:59:07
112.161.238.255 attackspambots
May 01 07:35:17 tcp        0      0 r.ca:22            112.161.238.255:18228       SYN_RECV
2020-05-02 03:05:24
118.125.192.169 attack
23/tcp
[2020-05-01]1pkt
2020-05-02 03:18:17
177.99.206.10 attackbots
May  1 10:29:44 dns1 sshd[782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.206.10 
May  1 10:29:47 dns1 sshd[782]: Failed password for invalid user sandy from 177.99.206.10 port 48250 ssh2
May  1 10:33:39 dns1 sshd[1097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.206.10
2020-05-02 02:46:30
119.230.27.43 attackspambots
May 01 07:35:17 tcp        0      0 r.ca:22            119.230.27.43:48119         SYN_RECV
2020-05-02 02:55:58
183.89.215.188 attack
(imapd) Failed IMAP login from 183.89.215.188 (TH/Thailand/mx-ll-183.89.215-188.dynamic.3bb.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May  1 16:16:13 ir1 dovecot[264309]: imap-login: Disconnected (auth failed, 1 attempts in 10 secs): user=, method=PLAIN, rip=183.89.215.188, lip=5.63.12.44, TLS: Connection closed, session=
2020-05-02 03:10:31
61.48.20.118 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 02:51:16
122.176.21.2 attack
Automatic report - Port Scan Attack
2020-05-02 03:17:45
190.145.65.66 attack
Unauthorized connection attempt from IP address 190.145.65.66 on Port 445(SMB)
2020-05-02 03:23:29

最近上报的IP列表

74.48.74.87 193.32.162.11 174.138.89.122 2606:4700:10::6814:8895
2606:4700:10::6816:2939 2606:4700:10::6816:4848 2606:4700:10::6814:8037 2606:4700:10::6816:1138
88.214.24.75 2408:8215:7a19:80f1::42a 206.41.66.149 2606:4700:10::6816:2832
2606:4700:10::6814:7593 121.234.219.82 2606:4700:10::ac43:634 2606:4700:10::6816:2329
2606:4700:10::6814:7507 164.155.74.44 20.163.6.253 10.143.228.88