必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tsukuba

省份(region): Ibaraki

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       130.158.0.0 - 130.158.255.255
CIDR:           130.158.0.0/16
NetName:        APNIC-ERX-130-158-0-0
NetHandle:      NET-130-158-0-0-1
Parent:         NET130 (NET-130-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2003-11-12
Updated:        2018-02-02
Comment:        This IP address range is not registered in the ARIN database. This range was transferred to the APNIC Whois Database as part of the ERX (Early Registration Transfer) project. For details, refer to the APNIC Whois Database via WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl ** IMPORTANT NOTE: APNIC is the Regional Internet Registry for the Asia Pacific region. APNIC does not operate networks using this IP address range and is not able to investigate spam or abuse reports relating to these addresses. For more help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/130.158.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '130.158.0.0 - 130.158.255.255'

% Abuse contact for '130.158.0.0 - 130.158.255.255' is 'hostmaster@nic.ad.jp'

inetnum:        130.158.0.0 - 130.158.255.255
netname:        UTINS
country:        JP
descr:          University of Tsukuba
admin-c:        KK17-AP
tech-c:         KK17-AP
status:         ALLOCATED PORTABLE
notify:         katagisi@cc.tsukuba.ac.jp
notify:         akira@cc.tsukuba.ac.jp
mnt-by:         MAINT-JPNIC
mnt-irt:        IRT-JPNIC-JP
mnt-lower:      MAINT-JPNIC
last-modified:  2015-12-01T22:24:25Z
source:         APNIC

irt:            IRT-JPNIC-JP
address:        Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address:        Chiyoda-ku, Tokyo 101-0047, japan
e-mail:         hostmaster@nic.ad.jp
abuse-mailbox:  hostmaster@nic.ad.jp
phone:          +81-3-5297-2311
fax-no:         +81-3-5297-2312
admin-c:        JNIC1-AP
tech-c:         JNIC1-AP
auth:           # Filtered
remarks:        hostmaster@nic.ad.jp was validated on 2024-11-27
mnt-by:         MAINT-JPNIC
last-modified:  2025-09-04T01:00:00Z
source:         APNIC

person:         Kazuki Katagishi
address:        University of Tsukuba
                1-1-1 Tennoudai, Tsukuba305-8577
country:        JP
phone:          +81-298-53-6221
fax-no:         +81-298-53-2983
e-mail:         katagisi@cc.tsukuba.ac.jp
nic-hdl:        KK17-AP
remarks:        ----------
remarks:        imported from ARIN object:
remarks:
remarks:        poc-handle:  KK631-ARIN
remarks:        is-role:     N
remarks:        last-name:   Katagishi
remarks:        first-name:  Kazuki
remarks:        street:      University of Tsukuba
                1-1-1 Tennoudai, Tsukuba305-8577
remarks:        country:     JP
remarks:        mailbox:     katagisi@cc.tsukuba.ac.jp
remarks:        fax-phone:   +81-298-53-2983
remarks:        bus-phone:   +81-298-53-6221
remarks:        reg-date:    2001-05-29
remarks:        changed:     hostmaster@arin.poc 20010529
remarks:        source:      ARIN
remarks:
remarks:        ----------
notify:         katagisi@cc.tsukuba.ac.jp
mnt-by:         MNT-ERX-TSUKUBAUNI-NON-JP
last-modified:  2008-09-04T07:29:34Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.158.130.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64209
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.158.130.211.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032801 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 04:42:11 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
Host 211.130.158.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 211.130.158.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.242.157.84 normal
Can thiệp riêng tư
2020-02-05 00:48:32
51.75.125.222 attackbotsspam
Unauthorized connection attempt detected from IP address 51.75.125.222 to port 2220 [J]
2020-02-05 01:04:53
139.180.212.134 attackbotsspam
2020-01-18 01:08:58 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.212.134\]:50978 I=\[193.107.88.166\]:25 input="CONNECT 104.25.136.22:80 HTTP/1."
2020-01-18 01:08:58 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.212.134\]:50987 I=\[193.107.88.166\]:25 input="\004\001"
2020-01-18 01:08:58 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.212.134\]:50994 I=\[193.107.88.166\]:25 input="\005\001"
2020-01-18 01:08:59 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.212.134\]:50998 I=\[193.107.88.166\]:25 input="GET http://www.stopforumspam.com"
2020-01-18 01:08:59 SMTP protocol synchronization error \(input sent without waiting for greeting\): rejected connection from H=\[139.180.212.134\]:51009 I=\[193.107.88.166
...
2020-02-05 01:08:40
139.255.134.111 attackbots
2019-02-07 02:50:00 H=\(ln-static-139-255-134-111.link.net.id\) \[139.255.134.111\]:14607 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-07 02:50:15 H=\(ln-static-139-255-134-111.link.net.id\) \[139.255.134.111\]:14726 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-07 02:50:24 H=\(ln-static-139-255-134-111.link.net.id\) \[139.255.134.111\]:14788 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-05 00:48:55
139.228.161.11 attackspambots
2019-06-21 08:27:32 1heD1D-0003lC-5N SMTP connection from \(fm-dyn-139-228-161-11.fast.net.id\) \[139.228.161.11\]:49615 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-21 08:27:46 1heD1S-0003lN-4j SMTP connection from \(fm-dyn-139-228-161-11.fast.net.id\) \[139.228.161.11\]:49664 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-21 08:27:54 1heD1b-0003lV-Ip SMTP connection from \(fm-dyn-139-228-161-11.fast.net.id\) \[139.228.161.11\]:49707 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 00:49:46
176.113.115.102 attack
Brute force VPN server
2020-02-05 00:44:18
137.63.129.2 attack
2019-03-11 18:23:27 H=\(\[137.63.129.2\]\) \[137.63.129.2\]:16736 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 18:23:28 H=\(\[137.63.129.2\]\) \[137.63.129.2\]:16748 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 18:23:29 H=\(\[137.63.129.2\]\) \[137.63.129.2\]:16756 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-05 01:23:39
138.68.131.109 attackspambots
2019-05-08 07:11:56 H=sack.bridgecoaa.com \(pinnacle.ghslegislation.icu\) \[138.68.131.109\]:50306 I=\[193.107.88.166\]:25 sender verify fail for \: Unrouteable address
2019-05-08 07:11:56 H=sack.bridgecoaa.com \(pinnacle.ghslegislation.icu\) \[138.68.131.109\]:50306 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-05-08 07:13:33 H=sack.bridgecoaa.com \(division.ghslegislation.icu\) \[138.68.131.109\]:56836 I=\[193.107.90.29\]:25 sender verify fail for \: Unrouteable address
2019-05-08 07:13:33 H=sack.bridgecoaa.com \(division.ghslegislation.icu\) \[138.68.131.109\]:56836 I=\[193.107.90.29\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-05 01:16:06
198.108.66.155 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-05 01:14:07
139.28.219.56 attack
2019-04-15 16:13:00 1hG2M0-0006N5-LT SMTP connection from gaff.doapex.com \(gaff.oregonvoicemag.icu\) \[139.28.219.56\]:55774 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-15 16:14:57 1hG2Nt-0006SF-EG SMTP connection from gaff.doapex.com \(gaff.oregonvoicemag.icu\) \[139.28.219.56\]:41815 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-15 16:15:02 1hG2Ny-0006Th-HY SMTP connection from gaff.doapex.com \(gaff.oregonvoicemag.icu\) \[139.28.219.56\]:53581 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 00:40:59
139.194.173.191 attack
2019-06-22 04:32:31 1heVpN-00083g-KV SMTP connection from \(fm-dyn-139-194-173-191.fast.net.id\) \[139.194.173.191\]:37483 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 04:32:48 1heVpd-00083z-Md SMTP connection from \(fm-dyn-139-194-173-191.fast.net.id\) \[139.194.173.191\]:37613 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 04:33:00 1heVpp-000848-EF SMTP connection from \(fm-dyn-139-194-173-191.fast.net.id\) \[139.194.173.191\]:37704 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 00:59:35
144.217.34.148 attackbots
02/04/2020-10:49:20.709966 144.217.34.148 Protocol: 17 GPL EXPLOIT ntpdx overflow attempt
2020-02-05 01:15:14
139.192.41.240 attack
2019-03-11 11:28:06 H=\(\[139.192.41.240\]\) \[139.192.41.240\]:49015 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 11:28:15 H=\(\[139.192.41.240\]\) \[139.192.41.240\]:49097 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 11:28:22 H=\(\[139.192.41.240\]\) \[139.192.41.240\]:49156 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-05 01:06:31
139.199.113.140 attackbotsspam
Feb  4 16:54:17 v22018076622670303 sshd\[20656\]: Invalid user weblogic from 139.199.113.140 port 37650
Feb  4 16:54:17 v22018076622670303 sshd\[20656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.113.140
Feb  4 16:54:19 v22018076622670303 sshd\[20656\]: Failed password for invalid user weblogic from 139.199.113.140 port 37650 ssh2
...
2020-02-05 01:02:58
139.192.86.126 attackspam
2019-09-17 04:35:30 1iA3Kx-0007Dm-9k SMTP connection from \(\[139.192.86.126\]\) \[139.192.86.126\]:10903 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-17 04:35:39 1iA3L6-0007E9-Hl SMTP connection from \(\[139.192.86.126\]\) \[139.192.86.126\]:10957 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-17 04:35:46 1iA3LD-0007EK-TO SMTP connection from \(\[139.192.86.126\]\) \[139.192.86.126\]:10985 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 01:06:00

最近上报的IP列表

137.189.160.186 13.222.246.187 110.77.187.41 2606:4700:10::6816:3816
110.78.150.182 2606:4700:10::ac43:1870 2606:4700:10::ac43:2504 2606:4700:10::6814:6666
2606:4700:10::6816:1784 164.155.74.54 10.130.77.139 125.123.71.111
206.21.204.215 54.86.179.2 54.196.240.224 10.159.24.96
108.218.175.97 121.234.101.22 43.240.15.138 2606:4700:10::6814:6331