必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.206.13.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.206.13.20.			IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:31:23 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
20.13.206.130.in-addr.arpa domain name pointer www.rediris.es.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.13.206.130.in-addr.arpa	name = www.rediris.es.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
67.205.153.16 attack
2019-10-29T07:28:10.6833621495-001 sshd\[62425\]: Invalid user jethro from 67.205.153.16 port 52782
2019-10-29T07:28:10.6943971495-001 sshd\[62425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=imap.vtigermail.com
2019-10-29T07:28:13.2983351495-001 sshd\[62425\]: Failed password for invalid user jethro from 67.205.153.16 port 52782 ssh2
2019-10-29T07:32:00.8070021495-001 sshd\[62559\]: Invalid user tomcat5 from 67.205.153.16 port 35384
2019-10-29T07:32:00.8174031495-001 sshd\[62559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=imap.vtigermail.com
2019-10-29T07:32:02.6615561495-001 sshd\[62559\]: Failed password for invalid user tomcat5 from 67.205.153.16 port 35384 ssh2
...
2019-10-29 20:01:26
114.67.90.149 attack
Oct 29 12:36:54 minden010 sshd[25079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.90.149
Oct 29 12:36:55 minden010 sshd[25079]: Failed password for invalid user ncs from 114.67.90.149 port 37514 ssh2
Oct 29 12:41:54 minden010 sshd[28110]: Failed password for root from 114.67.90.149 port 46878 ssh2
...
2019-10-29 20:09:30
161.10.238.226 attackspambots
Oct 29 12:42:08 vps01 sshd[3685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.10.238.226
Oct 29 12:42:10 vps01 sshd[3685]: Failed password for invalid user nandu from 161.10.238.226 port 48493 ssh2
2019-10-29 20:00:31
139.59.72.135 attack
POST /index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&method=form
GET /XxX.php?XxX
POST /index.php?option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload
GET /raiz0.html
GET /miNuS.php
POST /modules/mod_simplefileuploadv1.3/elements/udd.php
2019-10-29 19:38:25
222.186.180.9 attack
Oct 29 12:42:15 herz-der-gamer sshd[25300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Oct 29 12:42:17 herz-der-gamer sshd[25300]: Failed password for root from 222.186.180.9 port 20794 ssh2
...
2019-10-29 19:54:14
107.180.120.70 attackspam
Automatic report - XMLRPC Attack
2019-10-29 19:50:17
79.103.59.60 attackspambots
Unauthorised access (Oct 29) SRC=79.103.59.60 LEN=40 TTL=52 ID=29003 TCP DPT=23 WINDOW=1348 SYN
2019-10-29 20:04:49
95.6.87.174 attackbots
DATE:2019-10-29 12:42:16, IP:95.6.87.174, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-10-29 19:56:36
208.97.137.152 attack
[28/Oct/2019:14:08:26 -0400] "GET /cgi-bin/ccbill/whereami.cgi?g=cd /tmp;" Blank UA
[28/Oct/2019:14:08:35 -0400] "GET /cgi-bin/ccbill/whereami.cgi?g=cd /tmp;" Blank UA
2019-10-29 20:06:45
222.186.173.154 attackbotsspam
Oct 29 13:17:05 SilenceServices sshd[17004]: Failed password for root from 222.186.173.154 port 10698 ssh2
Oct 29 13:17:09 SilenceServices sshd[17004]: Failed password for root from 222.186.173.154 port 10698 ssh2
Oct 29 13:17:13 SilenceServices sshd[17004]: Failed password for root from 222.186.173.154 port 10698 ssh2
Oct 29 13:17:22 SilenceServices sshd[17004]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 10698 ssh2 [preauth]
2019-10-29 20:18:52
45.136.110.26 attackspambots
Oct 29 11:57:25 h2177944 kernel: \[5222406.325868\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=37162 PROTO=TCP SPT=45649 DPT=12001 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 29 12:07:47 h2177944 kernel: \[5223028.167165\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=14418 PROTO=TCP SPT=45649 DPT=28000 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 29 12:11:47 h2177944 kernel: \[5223267.440470\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=24442 PROTO=TCP SPT=45649 DPT=33000 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 29 12:21:49 h2177944 kernel: \[5223869.860893\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=64015 PROTO=TCP SPT=45649 DPT=11001 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 29 12:41:43 h2177944 kernel: \[5225063.781969\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.1
2019-10-29 20:03:09
14.116.253.142 attackbots
Oct 29 01:56:27 php1 sshd\[23195\]: Invalid user qwerty from 14.116.253.142
Oct 29 01:56:27 php1 sshd\[23195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.253.142
Oct 29 01:56:29 php1 sshd\[23195\]: Failed password for invalid user qwerty from 14.116.253.142 port 34139 ssh2
Oct 29 02:01:26 php1 sshd\[23747\]: Invalid user qqtech from 14.116.253.142
Oct 29 02:01:26 php1 sshd\[23747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.253.142
2019-10-29 20:08:11
157.230.240.34 attack
Oct 29 12:38:08 meumeu sshd[2691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.240.34 
Oct 29 12:38:10 meumeu sshd[2691]: Failed password for invalid user vidya@123 from 157.230.240.34 port 41230 ssh2
Oct 29 12:42:22 meumeu sshd[3228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.240.34 
...
2019-10-29 19:52:10
200.116.195.122 attackbotsspam
Oct 29 13:07:44 lnxded64 sshd[26319]: Failed password for root from 200.116.195.122 port 42900 ssh2
Oct 29 13:07:44 lnxded64 sshd[26319]: Failed password for root from 200.116.195.122 port 42900 ssh2
2019-10-29 20:18:04
37.59.58.142 attackspam
Oct 29 07:58:37 plusreed sshd[28832]: Invalid user lu from 37.59.58.142
...
2019-10-29 20:12:54

最近上报的IP列表

130.193.68.152 130.198.66.253 130.206.31.20 130.195.2.29
130.198.89.242 130.211.10.110 130.206.91.22 130.206.64.225
130.211.10.17 130.209.16.93 130.208.54.10 130.211.100.21
130.208.165.186 130.211.106.218 130.211.105.233 130.208.54.36
130.211.11.17 130.211.10.251 130.211.12.55 130.211.133.253