必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.133.189.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29376
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.133.189.24.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:20:43 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 24.189.133.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 24.189.133.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.53.88.125 attackspambots
\[2019-07-04 17:58:22\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-04T17:58:22.267-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972595225502",SessionID="0x7f02f81ae088",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.125/52160",ACLName="no_extension_match"
\[2019-07-04 17:58:48\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-04T17:58:48.854-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="3011972598031072",SessionID="0x7f02f8740ce8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.125/54200",ACLName="no_extension_match"
\[2019-07-04 18:00:50\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-04T18:00:50.497-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00972592195700",SessionID="0x7f02f8740ce8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.125/64317",ACLName="no_
2019-07-05 06:15:52
187.56.12.69 attackbots
Port scan and direct access per IP instead of hostname
2019-07-05 06:03:39
123.16.251.12 attackspambots
Unauthorized connection attempt from IP address 123.16.251.12 on Port 445(SMB)
2019-07-05 05:29:24
94.176.77.82 attack
(Jul  5)  LEN=40 TTL=244 ID=54623 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  4)  LEN=40 TTL=244 ID=20400 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  4)  LEN=40 TTL=244 ID=53559 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  4)  LEN=40 TTL=244 ID=32870 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  4)  LEN=40 TTL=244 ID=30366 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  4)  LEN=40 TTL=244 ID=38739 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  4)  LEN=40 TTL=244 ID=48225 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  4)  LEN=40 TTL=244 ID=48942 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  4)  LEN=40 TTL=244 ID=4713 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  3)  LEN=40 TTL=244 ID=5209 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  3)  LEN=40 TTL=244 ID=50920 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  3)  LEN=40 TTL=244 ID=61066 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  3)  LEN=40 TTL=244 ID=38301 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  3)  LEN=40 TTL=244 ID=1420 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul  3)  LEN=40 TTL=244 ID=55265 DF TCP DPT=23 WINDOW=14600 SYN...
2019-07-05 06:06:25
51.91.57.190 attackbots
Jul  4 15:32:07 work-partkepr sshd\[4878\]: Invalid user git from 51.91.57.190 port 45586
Jul  4 15:32:07 work-partkepr sshd\[4878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.57.190
...
2019-07-05 05:51:36
103.103.213.91 attackspam
Unauthorized connection attempt from IP address 103.103.213.91 on Port 445(SMB)
2019-07-05 05:36:56
41.221.91.210 attack
Unauthorized connection attempt from IP address 41.221.91.210 on Port 445(SMB)
2019-07-05 05:40:58
193.201.224.232 attackbots
Jul  5 02:58:14 tanzim-HP-Z238-Microtower-Workstation sshd\[9061\]: Invalid user admin from 193.201.224.232
Jul  5 02:58:14 tanzim-HP-Z238-Microtower-Workstation sshd\[9061\]: Failed none for invalid user admin from 193.201.224.232 port 62548 ssh2
Jul  5 02:58:14 tanzim-HP-Z238-Microtower-Workstation sshd\[9061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.201.224.232
...
2019-07-05 05:28:25
222.188.109.227 attackbots
Jul  4 15:43:00 lnxded64 sshd[18157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.109.227
2019-07-05 05:44:32
156.209.98.150 attack
Jul  4 14:02:53 localhost sshd\[15226\]: Invalid user admin from 156.209.98.150 port 42339
Jul  4 14:02:53 localhost sshd\[15226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.209.98.150
...
2019-07-05 05:27:28
66.96.205.52 attackspambots
Jul  4 22:59:46 vps65 postfix/smtpd\[6435\]: warning: unknown\[66.96.205.52\]: SASL LOGIN authentication failed: authentication failure
Jul  4 22:59:49 vps65 postfix/smtpd\[21273\]: warning: unknown\[66.96.205.52\]: SASL LOGIN authentication failed: authentication failure
Jul  4 22:59:52 vps65 postfix/smtpd\[6435\]: warning: unknown\[66.96.205.52\]: SASL LOGIN authentication failed: authentication failure
...
2019-07-05 05:38:34
157.230.237.76 attackspam
Jul  4 22:01:52 MK-Soft-VM7 sshd\[29459\]: Invalid user petru from 157.230.237.76 port 41660
Jul  4 22:01:52 MK-Soft-VM7 sshd\[29459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.237.76
Jul  4 22:01:54 MK-Soft-VM7 sshd\[29459\]: Failed password for invalid user petru from 157.230.237.76 port 41660 ssh2
...
2019-07-05 06:02:27
182.254.227.147 attack
Apr 13 19:48:44 yesfletchmain sshd\[6570\]: Invalid user asterisk from 182.254.227.147 port 7047
Apr 13 19:48:44 yesfletchmain sshd\[6570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.227.147
Apr 13 19:48:47 yesfletchmain sshd\[6570\]: Failed password for invalid user asterisk from 182.254.227.147 port 7047 ssh2
Apr 13 19:51:52 yesfletchmain sshd\[6661\]: Invalid user info from 182.254.227.147 port 34327
Apr 13 19:51:52 yesfletchmain sshd\[6661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.227.147
...
2019-07-05 06:05:36
167.99.92.141 attackspambots
167.99.92.141 - - [04/Jul/2019:15:02:32 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.92.141 - - [04/Jul/2019:15:02:32 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.92.141 - - [04/Jul/2019:15:02:32 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.92.141 - - [04/Jul/2019:15:02:33 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.92.141 - - [04/Jul/2019:15:02:33 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.92.141 - - [04/Jul/2019:15:02:33 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-05 05:42:43
182.96.185.233 attack
Unauthorized connection attempt from IP address 182.96.185.233 on Port 445(SMB)
2019-07-05 05:58:41

最近上报的IP列表

7.165.221.220 203.32.178.78 199.61.247.32 113.60.12.37
40.168.37.26 160.74.232.153 17.185.98.151 147.142.66.204
32.75.192.175 106.70.87.216 152.117.254.253 241.240.149.217
152.244.95.152 94.3.29.65 207.20.200.138 236.154.203.59
6.115.59.223 115.72.73.251 226.246.212.106 69.22.136.27