必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): The University of Auckland

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.216.236.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41288
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.216.236.49.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062300 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 23 14:39:28 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
49.236.216.130.in-addr.arpa domain name pointer en-cer00247.uoa.auckland.ac.nz.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
49.236.216.130.in-addr.arpa	name = en-cer00247.uoa.auckland.ac.nz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
151.50.233.224 attackspambots
23/tcp
[2019-11-20]1pkt
2019-11-21 05:30:42
185.176.27.2 attackbotsspam
185.176.27.2 was recorded 64 times by 30 hosts attempting to connect to the following ports: 4511,7455,9079,2548,7162,7808,1112,3462,5848,1324,9162,6424,5403,390,740,7673,6474,2076,7478,406,1842,3265,5231,1809,2059,4715,1406,9532,1294,4051,9142,5535,7598,8757,5912,7067,1715,8937,3148,1323,9451,9178,1352,7937,5758,8362,7753,2109,9497,8385,4871,7394,2865,697,834,6178,1183,6379,5501,7498,633,1056,3633. Incident counter (4h, 24h, all-time): 64, 449, 1826
2019-11-21 05:11:36
51.77.140.111 attackspam
Nov 20 16:11:55 icinga sshd[26960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111
Nov 20 16:11:57 icinga sshd[26960]: Failed password for invalid user server from 51.77.140.111 port 49550 ssh2
...
2019-11-21 05:10:18
103.2.248.134 attackbotsspam
3588/tcp 3588/tcp 3588/tcp...
[2019-11-20]9pkt,1pt.(tcp)
2019-11-21 05:37:36
49.235.88.104 attackbots
2019-11-20T20:58:39.389971abusebot-7.cloudsearch.cf sshd\[26547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.88.104  user=nobody
2019-11-21 05:19:28
137.25.101.102 attack
Nov 20 10:48:52 wbs sshd\[13562\]: Invalid user 6yhn7ujm from 137.25.101.102
Nov 20 10:48:52 wbs sshd\[13562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137-025-101-102.res.spectrum.com
Nov 20 10:48:54 wbs sshd\[13562\]: Failed password for invalid user 6yhn7ujm from 137.25.101.102 port 59758 ssh2
Nov 20 10:52:34 wbs sshd\[13912\]: Invalid user passpass from 137.25.101.102
Nov 20 10:52:34 wbs sshd\[13912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137-025-101-102.res.spectrum.com
2019-11-21 05:16:41
112.17.78.210 attack
Automatic report - Port Scan Attack
2019-11-21 05:34:25
59.115.193.248 attack
23/tcp
[2019-11-20]1pkt
2019-11-21 05:28:13
189.125.2.234 attackspambots
Nov 21 01:50:40 vibhu-HP-Z238-Microtower-Workstation sshd\[23779\]: Invalid user settle from 189.125.2.234
Nov 21 01:50:40 vibhu-HP-Z238-Microtower-Workstation sshd\[23779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.2.234
Nov 21 01:50:42 vibhu-HP-Z238-Microtower-Workstation sshd\[23779\]: Failed password for invalid user settle from 189.125.2.234 port 49737 ssh2
Nov 21 01:54:34 vibhu-HP-Z238-Microtower-Workstation sshd\[24812\]: Invalid user reggy from 189.125.2.234
Nov 21 01:54:34 vibhu-HP-Z238-Microtower-Workstation sshd\[24812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.2.234
...
2019-11-21 05:05:00
114.234.66.53 attackbotsspam
Nov 20 21:40:26 host proftpd[58892]: 0.0.0.0 (114.234.66.53[114.234.66.53]) - USER anonymous: no such user found from 114.234.66.53 [114.234.66.53] to 62.210.146.38:21
...
2019-11-21 05:09:05
106.12.12.7 attackbots
Automatic report - Banned IP Access
2019-11-21 05:34:57
51.38.186.207 attackbotsspam
Repeated brute force against a port
2019-11-21 05:33:47
1.162.148.44 attack
23/tcp
[2019-11-20]1pkt
2019-11-21 05:15:52
139.199.171.45 attackspam
SSH Brute-Force reported by Fail2Ban
2019-11-21 05:13:39
115.159.122.190 attackspambots
Nov 21 03:08:51 areeb-Workstation sshd[25963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.122.190
Nov 21 03:08:52 areeb-Workstation sshd[25963]: Failed password for invalid user Telecom@2008 from 115.159.122.190 port 35684 ssh2
...
2019-11-21 05:39:36

最近上报的IP列表

184.253.189.169 103.4.66.254 39.138.71.63 43.160.202.223
39.105.180.15 193.47.35.130 178.103.250.130 191.53.197.78
52.34.232.19 82.224.168.50 142.160.18.33 210.64.44.204
42.203.167.221 14.68.27.175 1.211.6.99 128.97.44.227
104.235.73.124 129.100.32.41 196.104.17.227 177.95.26.94