必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.222.71.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12630
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.222.71.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400

;; Query time: 272 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 19:50:14 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 81.71.222.130.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 130.222.71.81.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.225.84.248 attackbotsspam
GET /add.php HTTP/1.1 404 - -
2019-08-07 16:52:53
223.146.137.169 attack
[portscan] Port scan
2019-08-07 16:55:50
85.209.0.11 attack
Multiport scan : 290 ports scanned 10094 10235 10439 11191 13088 13293 13948 14008 14062 14109 14148 14194 14398 14602 14620 14764 15087 15288 15420 17502 17513 17749 17750 17793 17909 18145 18156 18200 18244 18286 18405 18417 18868 18944 19047 19115 19189 19455 19511 19975 20254 20458 20544 20650 20654 20679 20683 20717 20866 21081 21114 21306 21404 21447 21522 21608 21628 21715 21918 22246 22329 22435 22487 22510 22536 22592 22648 .....
2019-08-07 16:46:00
115.133.52.94 attackbots
$f2bV_matches
2019-08-07 16:53:43
83.169.197.13 attack
Unauthorized connection attempt from IP address 83.169.197.13 on Port 445(SMB)
2019-08-07 16:37:22
124.106.33.13 attackbots
Unauthorized connection attempt from IP address 124.106.33.13 on Port 445(SMB)
2019-08-07 16:09:38
196.52.43.64 attack
Automatic report - Port Scan Attack
2019-08-07 16:32:45
89.100.21.40 attack
Aug  7 09:45:57 ovpn sshd\[17194\]: Invalid user tcpdump from 89.100.21.40
Aug  7 09:45:57 ovpn sshd\[17194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40
Aug  7 09:45:59 ovpn sshd\[17194\]: Failed password for invalid user tcpdump from 89.100.21.40 port 51916 ssh2
Aug  7 10:15:05 ovpn sshd\[22718\]: Invalid user jrun from 89.100.21.40
Aug  7 10:15:05 ovpn sshd\[22718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40
2019-08-07 17:03:53
118.23.163.127 attack
Automatic report - Banned IP Access
2019-08-07 17:11:10
200.46.248.130 attackbotsspam
Aug  7 08:28:33 marvibiene sshd[42538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.46.248.130  user=root
Aug  7 08:28:35 marvibiene sshd[42538]: Failed password for root from 200.46.248.130 port 59960 ssh2
Aug  7 08:33:33 marvibiene sshd[42590]: Invalid user marisa from 200.46.248.130 port 55374
...
2019-08-07 16:57:38
218.92.0.158 attackbotsspam
Aug  7 09:35:54 vps sshd[6281]: Failed password for root from 218.92.0.158 port 17649 ssh2
Aug  7 09:35:59 vps sshd[6281]: Failed password for root from 218.92.0.158 port 17649 ssh2
Aug  7 09:36:02 vps sshd[6281]: Failed password for root from 218.92.0.158 port 17649 ssh2
Aug  7 09:36:06 vps sshd[6281]: Failed password for root from 218.92.0.158 port 17649 ssh2
...
2019-08-07 16:56:22
103.114.107.216 attackbots
>40 unauthorized SSH connections
2019-08-07 16:20:04
188.32.246.161 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-08-07 16:14:48
41.147.117.122 attackspambots
Automatic report - Port Scan Attack
2019-08-07 17:05:35
213.32.122.82 attackbots
Port scan and direct access per IP instead of hostname
2019-08-07 16:14:01

最近上报的IP列表

164.187.44.83 236.88.223.232 2.243.198.47 36.160.174.244
26.78.240.32 246.179.159.171 42.116.37.35 178.28.131.33
167.158.58.40 146.3.253.213 201.161.110.176 47.183.82.230
28.154.5.40 157.217.27.25 65.229.178.74 81.21.151.244
161.88.84.39 142.101.77.169 38.8.223.228 13.213.245.169