必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.138.49.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.138.49.211.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120801 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 02:33:11 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
Host 211.49.138.130.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 130.138.49.211.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.23.1.87 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-07T15:21:52Z and 2020-09-07T15:58:49Z
2020-09-08 02:55:37
103.145.13.111 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-08 02:47:18
103.120.160.178 attack
Wordpress attack
2020-09-08 02:45:04
190.85.163.46 attack
SSH Brute-Force attacks
2020-09-08 02:50:34
217.24.66.199 attackspambots
Cluster member 67.227.229.95 (US/United States/host.cjthedj97.me) said, DENY 217.24.66.199, Reason:[(sshd) Failed SSH login from 217.24.66.199 (LV/Latvia/r199-66-24-217-broadband.btv.lv): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER
2020-09-08 03:03:32
36.72.105.181 attackspam
1599410838 - 09/06/2020 18:47:18 Host: 36.72.105.181/36.72.105.181 Port: 445 TCP Blocked
2020-09-08 02:57:20
137.117.192.55 attackbots
 TCP (SYN) 137.117.192.55:1088 -> port 445, len 44
2020-09-08 02:31:15
123.206.95.243 attackspam
Sep  7 16:21:48 powerpi2 sshd[30182]: Failed password for invalid user ftpuser from 123.206.95.243 port 47470 ssh2
Sep  7 16:26:56 powerpi2 sshd[30396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.95.243  user=root
Sep  7 16:26:58 powerpi2 sshd[30396]: Failed password for root from 123.206.95.243 port 41264 ssh2
...
2020-09-08 02:31:31
134.209.249.204 attackspambots
2020-09-07T21:06:56.097188lavrinenko.info sshd[31508]: Invalid user oracle from 134.209.249.204 port 58864
2020-09-07T21:06:57.905451lavrinenko.info sshd[31508]: Failed password for invalid user oracle from 134.209.249.204 port 58864 ssh2
2020-09-07T21:07:13.395458lavrinenko.info sshd[31510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.249.204  user=root
2020-09-07T21:07:15.528182lavrinenko.info sshd[31510]: Failed password for root from 134.209.249.204 port 50846 ssh2
2020-09-07T21:07:30.018999lavrinenko.info sshd[31518]: Invalid user postgres from 134.209.249.204 port 42828
...
2020-09-08 02:54:43
201.182.180.31 attack
2020-09-07T16:01:38.781326ks3355764 sshd[21460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.180.31  user=root
2020-09-07T16:01:40.720617ks3355764 sshd[21460]: Failed password for root from 201.182.180.31 port 32840 ssh2
...
2020-09-08 02:56:09
148.70.149.39 attackbots
Time:     Mon Sep  7 18:38:15 2020 +0200
IP:       148.70.149.39 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  7 18:33:10 mail-03 sshd[30399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.149.39  user=root
Sep  7 18:33:12 mail-03 sshd[30399]: Failed password for root from 148.70.149.39 port 34256 ssh2
Sep  7 18:36:18 mail-03 sshd[30568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.149.39  user=root
Sep  7 18:36:20 mail-03 sshd[30568]: Failed password for root from 148.70.149.39 port 58714 ssh2
Sep  7 18:38:11 mail-03 sshd[30677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.149.39  user=root
2020-09-08 02:30:22
185.153.196.126 attackspambots
SIP/5060 Probe, BF, Hack -
2020-09-08 02:33:24
104.248.205.67 attackspam
SSH brute-force attempt
2020-09-08 03:00:10
41.251.254.98 attackspambots
Sep 07 03:08:19 askasleikir sshd[92403]: Failed password for root from 41.251.254.98 port 58206 ssh2
2020-09-08 03:04:47
168.151.116.105 attack
Automatic report - Banned IP Access
2020-09-08 02:42:36

最近上报的IP列表

160.20.197.142 237.122.23.131 241.219.174.170 251.144.209.50
172.222.235.172 120.207.6.213 72.193.243.253 74.139.225.162
109.37.150.102 49.5.95.127 229.216.157.2 99.61.225.212
152.143.31.212 154.177.184.175 214.143.116.155 91.143.170.16
41.225.85.183 218.170.28.72 245.30.239.216 48.29.63.5