必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.190.13.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.190.13.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 21:19:44 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 13.13.190.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.13.190.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.54.242.46 attackspam
Unauthorized connection attempt detected from IP address 200.54.242.46 to port 2220 [J]
2020-01-20 15:14:46
222.186.180.142 attackspambots
SSH Brute Force, server-1 sshd[4780]: Failed password for root from 222.186.180.142 port 43190 ssh2
2020-01-20 15:15:32
159.89.1.142 attackbotsspam
Jan 20 08:27:49 vps691689 sshd[25190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.1.142
Jan 20 08:27:51 vps691689 sshd[25190]: Failed password for invalid user stephen from 159.89.1.142 port 51582 ssh2
...
2020-01-20 15:35:04
218.78.46.81 attackbotsspam
Jan 20 08:07:01 pornomens sshd\[1139\]: Invalid user quake from 218.78.46.81 port 57809
Jan 20 08:07:01 pornomens sshd\[1139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81
Jan 20 08:07:03 pornomens sshd\[1139\]: Failed password for invalid user quake from 218.78.46.81 port 57809 ssh2
...
2020-01-20 15:16:25
42.62.2.130 attack
Unauthorized connection attempt detected from IP address 42.62.2.130 to port 1433 [J]
2020-01-20 15:34:18
58.210.119.186 attackbotsspam
Jan 20 08:42:19 server sshd\[3373\]: Invalid user sshuser from 58.210.119.186
Jan 20 08:42:19 server sshd\[3373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.119.186 
Jan 20 08:42:21 server sshd\[3373\]: Failed password for invalid user sshuser from 58.210.119.186 port 57860 ssh2
Jan 20 08:44:43 server sshd\[3829\]: Invalid user ubuntu from 58.210.119.186
Jan 20 08:44:43 server sshd\[3829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.119.186 
...
2020-01-20 15:19:46
185.156.177.146 attackspam
RDP Bruteforce
2020-01-20 15:29:11
122.51.48.52 attackbots
Unauthorized connection attempt detected from IP address 122.51.48.52 to port 2220 [J]
2020-01-20 15:17:41
180.244.232.33 attack
20/1/19@23:56:33: FAIL: Alarm-Network address from=180.244.232.33
...
2020-01-20 15:12:45
222.186.175.23 attackspam
Unauthorized connection attempt detected from IP address 222.186.175.23 to port 22 [T]
2020-01-20 15:30:00
110.78.23.133 attackspam
Jan 20 09:21:07 vtv3 sshd[32312]: Failed password for root from 110.78.23.133 port 54984 ssh2
Jan 20 09:24:28 vtv3 sshd[1250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.23.133 
Jan 20 09:24:30 vtv3 sshd[1250]: Failed password for invalid user typo3 from 110.78.23.133 port 19757 ssh2
Jan 20 09:39:53 vtv3 sshd[9150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.23.133 
Jan 20 09:39:54 vtv3 sshd[9150]: Failed password for invalid user master from 110.78.23.133 port 26554 ssh2
Jan 20 09:44:03 vtv3 sshd[11440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.23.133 
Jan 20 09:55:03 vtv3 sshd[16711]: Failed password for root from 110.78.23.133 port 56147 ssh2
Jan 20 09:58:24 vtv3 sshd[18450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.23.133 
Jan 20 09:58:26 vtv3 sshd[18450]: Failed password for invalid user java fro
2020-01-20 15:05:36
183.213.26.26 attack
1433/tcp
[2020-01-20]1pkt
2020-01-20 15:09:57
157.55.39.111 attack
Automatic report - Banned IP Access
2020-01-20 15:30:16
58.213.48.219 attackspam
Unauthorized connection attempt detected from IP address 58.213.48.219 to port 1433 [J]
2020-01-20 15:11:12
36.71.114.181 attackbotsspam
Unauthorised access (Jan 20) SRC=36.71.114.181 LEN=52 TTL=119 ID=22367 DF TCP DPT=445 WINDOW=8192 SYN
2020-01-20 15:06:31

最近上报的IP列表

233.61.58.194 9.136.151.194 208.111.125.66 225.8.182.168
176.80.5.115 59.131.113.81 216.229.241.162 235.184.237.232
121.41.122.118 164.47.199.196 186.106.239.166 171.193.238.47
89.193.85.62 188.154.94.201 54.30.93.86 74.185.208.97
237.61.55.30 253.165.67.21 177.106.233.163 199.39.188.172