必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.53.58.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.53.58.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:30:25 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 21.58.53.130.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 130.53.58.21.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
101.32.28.88 attack
Aug 21 10:35:54 firewall sshd[17528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.28.88
Aug 21 10:35:54 firewall sshd[17528]: Invalid user kirill from 101.32.28.88
Aug 21 10:35:56 firewall sshd[17528]: Failed password for invalid user kirill from 101.32.28.88 port 35688 ssh2
...
2020-08-21 21:46:41
51.158.190.54 attackbotsspam
Aug 21 15:16:19 vps639187 sshd\[22497\]: Invalid user genesis from 51.158.190.54 port 41168
Aug 21 15:16:19 vps639187 sshd\[22497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54
Aug 21 15:16:20 vps639187 sshd\[22497\]: Failed password for invalid user genesis from 51.158.190.54 port 41168 ssh2
...
2020-08-21 21:37:55
36.37.180.59 attackbots
Dovecot Invalid User Login Attempt.
2020-08-21 21:49:49
167.71.146.237 attack
Aug 21 16:25:11 journals sshd\[88588\]: Invalid user st from 167.71.146.237
Aug 21 16:25:11 journals sshd\[88588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.146.237
Aug 21 16:25:13 journals sshd\[88588\]: Failed password for invalid user st from 167.71.146.237 port 40974 ssh2
Aug 21 16:28:05 journals sshd\[88863\]: Invalid user n from 167.71.146.237
Aug 21 16:28:05 journals sshd\[88863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.146.237
...
2020-08-21 21:54:05
103.57.80.51 attack
srvr1: (mod_security) mod_security (id:942100) triggered by 103.57.80.51 (IN/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:06:41 [error] 482759#0: *840645 [client 103.57.80.51] ModSecurity: Access denied with code 406 (phase 2).  [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801160188.230054"] [ref ""], client: 103.57.80.51, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%27%29+OR+++%28%27lwvX%27%3D%27XZXZ HTTP/1.1" [redacted]
2020-08-21 21:42:55
51.195.166.192 attackbotsspam
2020-08-21T15:25:42.195094ns386461 sshd\[12608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip192.ip-51-195-166.eu  user=root
2020-08-21T15:25:44.494711ns386461 sshd\[12608\]: Failed password for root from 51.195.166.192 port 43822 ssh2
2020-08-21T15:25:46.874356ns386461 sshd\[12608\]: Failed password for root from 51.195.166.192 port 43822 ssh2
2020-08-21T15:25:49.006545ns386461 sshd\[12608\]: Failed password for root from 51.195.166.192 port 43822 ssh2
2020-08-21T15:25:51.453803ns386461 sshd\[12608\]: Failed password for root from 51.195.166.192 port 43822 ssh2
...
2020-08-21 21:26:41
172.94.23.30 attackbotsspam
(From skertchly.terese22@gmail.com) hi there

Do you want to increase your business revenue while improving your SEO and ranks for your website?

Get approved in the GOOGLE News for michelchiropracticcenter.com and start getting the traffic and visibility that you need.

Read more
https://www.ghostdigital.co/google-news-listing/

Best Regards
Ghost Digital Team
2020-08-21 21:43:45
178.62.238.152 attackbots
Aug 21 02:56:13 vm1 sshd[8052]: Did not receive identification string from 178.62.238.152 port 38122
Aug 21 02:56:22 vm1 sshd[8053]: Received disconnect from 178.62.238.152 port 44138:11: Normal Shutdown, Thank you for playing [preauth]
Aug 21 02:56:22 vm1 sshd[8053]: Disconnected from 178.62.238.152 port 44138 [preauth]
Aug 21 02:56:35 vm1 sshd[8055]: Invalid user oracle from 178.62.238.152 port 43878
Aug 21 02:56:35 vm1 sshd[8055]: Received disconnect from 178.62.238.152 port 43878:11: Normal Shutdown, Thank you for playing [preauth]
Aug 21 02:56:35 vm1 sshd[8055]: Disconnected from 178.62.238.152 port 43878 [preauth]
Aug 21 02:56:48 vm1 sshd[8057]: Received disconnect from 178.62.238.152 port 43336:11: Normal Shutdown, Thank you for playing [preauth]
Aug 21 02:56:48 vm1 sshd[8057]: Disconnected from 178.62.238.152 port 43336 [preauth]
Aug 21 02:57:02 vm1 sshd[8059]: Invalid user postgres from 178.62.238.152 port 43036
Aug 21 02:57:02 vm1 sshd[8059]: Received disconne........
-------------------------------
2020-08-21 22:07:39
103.129.223.136 attackbots
$f2bV_matches
2020-08-21 21:42:37
45.95.168.130 attack
serveres are UTC -0400
Lines containing failures of 45.95.168.130
Aug 20 16:10:41 tux2 sshd[20045]: Did not receive identification string from 45.95.168.130 port 48926
Aug 20 16:10:58 tux2 sshd[20055]: Failed password for r.r from 45.95.168.130 port 37620 ssh2
Aug 20 16:10:58 tux2 sshd[20055]: Received disconnect from 45.95.168.130 port 37620:11: Normal Shutdown, Thank you for playing [preauth]
Aug 20 16:10:58 tux2 sshd[20055]: Disconnected from authenticating user r.r 45.95.168.130 port 37620 [preauth]
Aug 20 16:11:12 tux2 sshd[20079]: Failed password for r.r from 45.95.168.130 port 39680 ssh2
Aug 20 16:11:13 tux2 sshd[20079]: Received disconnect from 45.95.168.130 port 39680:11: Normal Shutdown, Thank you for playing [preauth]
Aug 20 16:11:13 tux2 sshd[20079]: Disconnected from authenticating user r.r 45.95.168.130 port 39680 [preauth]
Aug 20 16:12:43 tux2 sshd[20156]: Failed password for r.r from 45.95.168.130 port 51830 ssh2
Aug 20 16:12:43 tux2 sshd[20156]: Received........
------------------------------
2020-08-21 21:52:51
54.37.65.3 attackbotsspam
2020-08-21T13:23:03.253399shield sshd\[22289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.ip-54-37-65.eu  user=root
2020-08-21T13:23:05.732020shield sshd\[22289\]: Failed password for root from 54.37.65.3 port 49608 ssh2
2020-08-21T13:27:11.847406shield sshd\[23290\]: Invalid user test from 54.37.65.3 port 59568
2020-08-21T13:27:11.856805shield sshd\[23290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.ip-54-37-65.eu
2020-08-21T13:27:14.049225shield sshd\[23290\]: Failed password for invalid user test from 54.37.65.3 port 59568 ssh2
2020-08-21 21:31:22
159.65.163.59 attackspam
Aug 21 15:55:31 ift sshd\[21069\]: Failed password for invalid user admin from 159.65.163.59 port 36534 ssh2Aug 21 15:59:44 ift sshd\[21718\]: Invalid user ed from 159.65.163.59Aug 21 15:59:46 ift sshd\[21718\]: Failed password for invalid user ed from 159.65.163.59 port 41084 ssh2Aug 21 16:03:50 ift sshd\[22799\]: Invalid user juan from 159.65.163.59Aug 21 16:03:52 ift sshd\[22799\]: Failed password for invalid user juan from 159.65.163.59 port 45636 ssh2
...
2020-08-21 21:49:21
182.61.18.154 attackspam
Aug 21 14:56:45 pkdns2 sshd\[15459\]: Invalid user omnix from 182.61.18.154Aug 21 14:56:47 pkdns2 sshd\[15459\]: Failed password for invalid user omnix from 182.61.18.154 port 50028 ssh2Aug 21 15:00:01 pkdns2 sshd\[15551\]: Invalid user admin from 182.61.18.154Aug 21 15:00:03 pkdns2 sshd\[15551\]: Failed password for invalid user admin from 182.61.18.154 port 59434 ssh2Aug 21 15:03:18 pkdns2 sshd\[15731\]: Failed password for root from 182.61.18.154 port 40596 ssh2Aug 21 15:06:35 pkdns2 sshd\[15862\]: Failed password for root from 182.61.18.154 port 50012 ssh2
...
2020-08-21 21:50:04
202.77.105.98 attackspam
Aug 21 15:06:52 home sshd[2703759]: Failed password for invalid user cam from 202.77.105.98 port 58216 ssh2
Aug 21 15:11:15 home sshd[2705444]: Invalid user testmail from 202.77.105.98 port 60496
Aug 21 15:11:15 home sshd[2705444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.98 
Aug 21 15:11:15 home sshd[2705444]: Invalid user testmail from 202.77.105.98 port 60496
Aug 21 15:11:17 home sshd[2705444]: Failed password for invalid user testmail from 202.77.105.98 port 60496 ssh2
...
2020-08-21 21:45:40
178.116.216.159 attackbots
2020-08-21T12:06:03.261342abusebot-4.cloudsearch.cf sshd[9169]: Invalid user admin from 178.116.216.159 port 56336
2020-08-21T12:06:19.631523abusebot-4.cloudsearch.cf sshd[9169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178-116-216-159.access.telenet.be
2020-08-21T12:06:03.261342abusebot-4.cloudsearch.cf sshd[9169]: Invalid user admin from 178.116.216.159 port 56336
2020-08-21T12:06:21.735913abusebot-4.cloudsearch.cf sshd[9169]: Failed password for invalid user admin from 178.116.216.159 port 56336 ssh2
2020-08-21T12:07:00.053008abusebot-4.cloudsearch.cf sshd[9172]: Invalid user admin from 178.116.216.159 port 42287
2020-08-21T12:07:00.086017abusebot-4.cloudsearch.cf sshd[9172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178-116-216-159.access.telenet.be
2020-08-21T12:07:00.053008abusebot-4.cloudsearch.cf sshd[9172]: Invalid user admin from 178.116.216.159 port 42287
2020-08-21T12:07:02.138388ab
...
2020-08-21 21:27:30

最近上报的IP列表

222.16.127.247 215.98.252.40 101.110.202.231 127.179.86.145
39.219.81.5 8.246.200.34 65.207.197.221 228.18.169.85
245.166.173.96 95.135.194.227 5.209.252.105 70.86.195.245
156.37.120.93 86.7.172.110 173.49.139.135 167.219.113.176
103.214.217.246 56.46.38.147 21.216.191.181 193.185.44.131