必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.4.161.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.4.161.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:23:52 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
94.161.4.130.in-addr.arpa domain name pointer nothing.attdns.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.161.4.130.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.31.53.147 attackbots
Long Request
2020-07-06 13:12:29
123.1.189.250 attack
Jul  6 06:23:06 srv-ubuntu-dev3 sshd[42275]: Invalid user kmk from 123.1.189.250
Jul  6 06:23:06 srv-ubuntu-dev3 sshd[42275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.1.189.250
Jul  6 06:23:06 srv-ubuntu-dev3 sshd[42275]: Invalid user kmk from 123.1.189.250
Jul  6 06:23:08 srv-ubuntu-dev3 sshd[42275]: Failed password for invalid user kmk from 123.1.189.250 port 55934 ssh2
Jul  6 06:26:51 srv-ubuntu-dev3 sshd[47397]: Invalid user lcd from 123.1.189.250
Jul  6 06:26:51 srv-ubuntu-dev3 sshd[47397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.1.189.250
Jul  6 06:26:51 srv-ubuntu-dev3 sshd[47397]: Invalid user lcd from 123.1.189.250
Jul  6 06:26:53 srv-ubuntu-dev3 sshd[47397]: Failed password for invalid user lcd from 123.1.189.250 port 53650 ssh2
Jul  6 06:30:39 srv-ubuntu-dev3 sshd[51396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.1.189.250  
...
2020-07-06 13:50:22
87.251.74.18 attackspambots
 TCP (SYN) 87.251.74.18:53725 -> port 3393, len 44
2020-07-06 13:45:11
159.203.72.14 attack
Jul  6 13:54:23 localhost sshd[2709887]: Invalid user postgres from 159.203.72.14 port 33854
...
2020-07-06 13:04:22
125.88.169.233 attackspam
Lines containing failures of 125.88.169.233 (max 1000)
Jul  5 23:00:08 localhost sshd[3601]: User r.r from 125.88.169.233 not allowed because listed in DenyUsers
Jul  5 23:00:08 localhost sshd[3601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.88.169.233  user=r.r
Jul  5 23:00:10 localhost sshd[3601]: Failed password for invalid user r.r from 125.88.169.233 port 40107 ssh2
Jul  5 23:00:12 localhost sshd[3601]: Received disconnect from 125.88.169.233 port 40107:11: Bye Bye [preauth]
Jul  5 23:00:12 localhost sshd[3601]: Disconnected from invalid user r.r 125.88.169.233 port 40107 [preauth]
Jul  5 23:12:39 localhost sshd[7201]: User r.r from 125.88.169.233 not allowed because listed in DenyUsers
Jul  5 23:12:39 localhost sshd[7201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.88.169.233  user=r.r
Jul  5 23:12:41 localhost sshd[7201]: Failed password for invalid user r.r from 125........
------------------------------
2020-07-06 13:16:39
106.51.78.18 attackbotsspam
2020-07-06T05:20:43.326727shield sshd\[7294\]: Invalid user bill from 106.51.78.18 port 45098
2020-07-06T05:20:43.331382shield sshd\[7294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.78.18
2020-07-06T05:20:45.609915shield sshd\[7294\]: Failed password for invalid user bill from 106.51.78.18 port 45098 ssh2
2020-07-06T05:24:21.556080shield sshd\[8557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.78.18  user=root
2020-07-06T05:24:23.428681shield sshd\[8557\]: Failed password for root from 106.51.78.18 port 42754 ssh2
2020-07-06 13:26:51
151.80.67.240 attackbots
Repeated brute force against a port
2020-07-06 13:40:06
175.24.105.133 attackspam
Jul  6 06:31:44 sso sshd[7775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.105.133
Jul  6 06:31:46 sso sshd[7775]: Failed password for invalid user gentoo from 175.24.105.133 port 40574 ssh2
...
2020-07-06 13:51:38
5.88.132.235 attackbotsspam
$f2bV_matches
2020-07-06 13:51:06
218.92.0.252 attack
Jul  6 07:26:09 santamaria sshd\[10063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.252  user=root
Jul  6 07:26:10 santamaria sshd\[10063\]: Failed password for root from 218.92.0.252 port 30731 ssh2
Jul  6 07:26:13 santamaria sshd\[10063\]: Failed password for root from 218.92.0.252 port 30731 ssh2
...
2020-07-06 13:45:39
192.241.224.185 attackbots
Unauthorized connection attempt detected from IP address 192.241.224.185 to port 8181 [T]
2020-07-06 13:54:17
35.244.25.124 attackbots
Jul  6 01:05:37 ny01 sshd[16043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.244.25.124
Jul  6 01:05:39 ny01 sshd[16043]: Failed password for invalid user finance from 35.244.25.124 port 57010 ssh2
Jul  6 01:10:22 ny01 sshd[16605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.244.25.124
2020-07-06 13:20:17
83.24.238.176 attackbots
Jul  5 19:43:30 auw2 sshd\[28425\]: Invalid user jay from 83.24.238.176
Jul  5 19:43:30 auw2 sshd\[28425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.238.176
Jul  5 19:43:31 auw2 sshd\[28425\]: Failed password for invalid user jay from 83.24.238.176 port 38336 ssh2
Jul  5 19:49:09 auw2 sshd\[28859\]: Invalid user stacy from 83.24.238.176
Jul  5 19:49:09 auw2 sshd\[28859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.24.238.176
2020-07-06 13:52:43
221.156.126.1 attack
Jul  6 05:03:46 rush sshd[3420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.126.1
Jul  6 05:03:48 rush sshd[3420]: Failed password for invalid user git from 221.156.126.1 port 42444 ssh2
Jul  6 05:06:58 rush sshd[3489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.126.1
...
2020-07-06 13:08:51
41.160.119.218 attackspam
Jul  6 10:54:01 itv-usvr-01 sshd[31711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.160.119.218  user=root
Jul  6 10:54:03 itv-usvr-01 sshd[31711]: Failed password for root from 41.160.119.218 port 51722 ssh2
2020-07-06 13:14:27

最近上报的IP列表

59.129.177.131 34.196.103.11 134.14.69.171 51.243.133.109
97.14.14.131 44.132.158.139 76.7.0.96 187.103.11.67
71.200.200.92 9.103.153.188 119.146.194.73 30.42.147.66
54.134.67.18 19.74.204.215 40.23.45.153 13.147.181.99
241.94.61.94 69.1.140.135 59.1.112.153 109.146.39.59