必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.207.51.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47515
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.207.51.14.			IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050301 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 03:56:52 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
14.51.207.130.in-addr.arpa domain name pointer PBF-PRM-051-198.ad.gatech.edu.
14.51.207.130.in-addr.arpa domain name pointer borg5114.pbf.gatech.edu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.51.207.130.in-addr.arpa	name = PBF-PRM-051-198.ad.gatech.edu.
14.51.207.130.in-addr.arpa	name = borg5114.pbf.gatech.edu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
146.120.184.48 attack
port scan and connect, tcp 23 (telnet)
2019-12-07 18:33:05
112.85.42.185 attackspam
Dec  7 10:55:00 srv206 sshd[29184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
Dec  7 10:55:02 srv206 sshd[29184]: Failed password for root from 112.85.42.185 port 32659 ssh2
...
2019-12-07 17:56:24
106.12.22.73 attackspambots
Dec  7 11:22:16 lnxded64 sshd[31694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.22.73
2019-12-07 18:29:27
104.248.121.67 attackspam
Dec  7 00:12:08 wbs sshd\[4431\]: Invalid user tatiana from 104.248.121.67
Dec  7 00:12:08 wbs sshd\[4431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67
Dec  7 00:12:09 wbs sshd\[4431\]: Failed password for invalid user tatiana from 104.248.121.67 port 54848 ssh2
Dec  7 00:17:49 wbs sshd\[4914\]: Invalid user roehling from 104.248.121.67
Dec  7 00:17:49 wbs sshd\[4914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67
2019-12-07 18:24:17
206.189.165.94 attack
Dec  6 23:43:15 hanapaa sshd\[14259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.94  user=root
Dec  6 23:43:17 hanapaa sshd\[14259\]: Failed password for root from 206.189.165.94 port 47348 ssh2
Dec  6 23:49:18 hanapaa sshd\[14770\]: Invalid user whelan from 206.189.165.94
Dec  6 23:49:19 hanapaa sshd\[14770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.94
Dec  6 23:49:20 hanapaa sshd\[14770\]: Failed password for invalid user whelan from 206.189.165.94 port 40218 ssh2
2019-12-07 18:05:59
178.32.219.209 attackbotsspam
Dec  6 23:43:28 tdfoods sshd\[29230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3306296.ip-178-32-219.eu  user=mysql
Dec  6 23:43:30 tdfoods sshd\[29230\]: Failed password for mysql from 178.32.219.209 port 52764 ssh2
Dec  6 23:48:15 tdfoods sshd\[29682\]: Invalid user solomonidis from 178.32.219.209
Dec  6 23:48:15 tdfoods sshd\[29682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3306296.ip-178-32-219.eu
Dec  6 23:48:17 tdfoods sshd\[29682\]: Failed password for invalid user solomonidis from 178.32.219.209 port 59386 ssh2
2019-12-07 18:02:33
128.199.240.120 attackspam
Dec  7 10:47:43 hosting sshd[13402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.240.120  user=root
Dec  7 10:47:45 hosting sshd[13402]: Failed password for root from 128.199.240.120 port 52972 ssh2
...
2019-12-07 17:57:15
222.186.175.154 attackspam
Dec  7 11:15:33 vpn01 sshd[25933]: Failed password for root from 222.186.175.154 port 19172 ssh2
Dec  7 11:15:49 vpn01 sshd[25933]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 19172 ssh2 [preauth]
...
2019-12-07 18:25:42
54.39.99.236 attackspam
Dec  5 01:02:19 giraffe sshd[10099]: Invalid user thuthuy from 54.39.99.236
Dec  5 01:02:19 giraffe sshd[10099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.99.236
Dec  5 01:02:22 giraffe sshd[10099]: Failed password for invalid user thuthuy from 54.39.99.236 port 37938 ssh2
Dec  5 01:02:22 giraffe sshd[10099]: Received disconnect from 54.39.99.236 port 37938:11: Bye Bye [preauth]
Dec  5 01:02:22 giraffe sshd[10099]: Disconnected from 54.39.99.236 port 37938 [preauth]
Dec  5 01:10:49 giraffe sshd[10383]: Invalid user reboot from 54.39.99.236
Dec  5 01:10:49 giraffe sshd[10383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.99.236
Dec  5 01:10:52 giraffe sshd[10383]: Failed password for invalid user reboot from 54.39.99.236 port 38428 ssh2
Dec  5 01:10:52 giraffe sshd[10383]: Received disconnect from 54.39.99.236 port 38428:11: Bye Bye [preauth]
Dec  5 01:10:52 giraffe sshd[........
-------------------------------
2019-12-07 18:19:47
171.8.9.198 attack
firewall-block, port(s): 23/tcp
2019-12-07 18:02:58
52.162.253.241 attackspam
Dec  7 10:41:00 MK-Soft-VM6 sshd[16132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.162.253.241 
Dec  7 10:41:02 MK-Soft-VM6 sshd[16132]: Failed password for invalid user bounmy from 52.162.253.241 port 1024 ssh2
...
2019-12-07 18:05:25
45.228.32.100 attack
UTC: 2019-12-06 port: 23/tcp
2019-12-07 18:01:43
103.248.85.244 attackbots
Unauthorized connection attempt from IP address 103.248.85.244
2019-12-07 18:00:24
187.141.128.42 attackbotsspam
2019-12-07T10:11:32.418532abusebot-5.cloudsearch.cf sshd\[5309\]: Invalid user guest from 187.141.128.42 port 60572
2019-12-07 18:14:27
192.144.158.118 attack
Dec  7 08:51:22 lnxweb61 sshd[1796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.158.118
2019-12-07 18:08:06

最近上报的IP列表

13.82.87.18 111.251.138.4 64.203.85.170 61.64.2.134
128.199.107.39 148.102.115.66 79.253.205.155 159.203.33.14
194.26.29.255 85.67.154.164 94.226.90.252 45.172.108.89
122.116.219.214 85.105.15.70 88.234.185.89 103.100.208.33
1.6.181.79 87.123.159.38 62.234.17.74 218.25.171.125