必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.57.66.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.57.66.19.			IN	A

;; AUTHORITY SECTION:
.			400	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:33:21 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
19.66.57.130.in-addr.arpa domain name pointer mfdevelopercommunity.com.
19.66.57.130.in-addr.arpa domain name pointer mfdevelopercommunity.co.uk.
19.66.57.130.in-addr.arpa domain name pointer mfcommunity.net.
19.66.57.130.in-addr.arpa domain name pointer mfcommunity.com.
19.66.57.130.in-addr.arpa domain name pointer mfcommunity.co.uk.
19.66.57.130.in-addr.arpa domain name pointer manageoutsourcing.com.
19.66.57.130.in-addr.arpa domain name pointer mainframemigration.net.
19.66.57.130.in-addr.arpa domain name pointer *.mainframemigration.net.
19.66.57.130.in-addr.arpa domain name pointer mainframemigration.com.
19.66.57.130.in-addr.arpa domain name pointer *.mainframemigration.com.
19.66.57.130.in-addr.arpa domain name pointer lonestaragile.com.
19.66.57.130.in-addr.arpa domain name pointer legacytransformation.com.
19.66.57.130.in-addr.arpa domain name pointer legacymining.com.
19.66.57.130.in-addr.arpa domain name pointer knowledgemining.com.
19.66.57.130.in-addr.arpa domain name pointer ftp.com.
19.66.57.13
NSLOOKUP信息:
;; Truncated, retrying in TCP mode.
Server:		183.60.82.98
Address:	183.60.82.98#53

Non-authoritative answer:
19.66.57.130.in-addr.arpa	name = mercuryportal.com.
19.66.57.130.in-addr.arpa	name = arcsight.net.
19.66.57.130.in-addr.arpa	name = www2.wrq.com.
19.66.57.130.in-addr.arpa	name = reflection.com.
19.66.57.130.in-addr.arpa	name = ideas.microfocus.com.
19.66.57.130.in-addr.arpa	name = dl.microfocus.com.
19.66.57.130.in-addr.arpa	name = partner.microfocus.com.
19.66.57.130.in-addr.arpa	name = www.support.microfocus.com.
19.66.57.130.in-addr.arpa	name = documentation.microfocus.com.
19.66.57.130.in-addr.arpa	name = vibe.novell.com.
19.66.57.130.in-addr.arpa	name = login.innerweb.novell.com.
19.66.57.130.in-addr.arpa	name = longviewsoftwareholdings.com.
19.66.57.130.in-addr.arpa	name = xn--xys934f.xn--55qx5d.hk.
19.66.57.130.in-addr.arpa	name = cobolportal.co.jp.
19.66.57.130.in-addr.arpa	name = visualcobol.net.
19.66.57.130.in-addr.arpa	name = thevirtualmainframe.com.
19.66.57.130.in-addr.arpa	name = forums.steeltrace.com.
19.66.57.130.in-addr.arpa	name = steeltrace.com.
19.66.57.130.in-addr.arpa	name = *.steeltrace.com.
19.66.57.130.in-addr.arpa	name = softwaretransformation.com.
19.66.57.130.in-addr.arpa	name = rumba.com.
19.66.57.130.in-addr.arpa	name = *.rumba.com.
19.66.57.130.in-addr.arpa	name = rescueware.com.
19.66.57.130.in-addr.arpa	name = relativitytechnologies.com.
19.66.57.130.in-addr.arpa	name = relativity-tech.com.
19.66.57.130.in-addr.arpa	name = relativity.in.
19.66.57.130.in-addr.arpa	name = qaload.com.
19.66.57.130.in-addr.arpa	name = qadirector.com.
19.66.57.130.in-addr.arpa	name = qacenter.us.
19.66.57.130.in-addr.arpa	name = numega.us.
19.66.57.130.in-addr.arpa	name = numega.com.
19.66.57.130.in-addr.arpa	name = netmanage.com.
19.66.57.130.in-addr.arpa	name = modernizationworkbench.com.
19.66.57.130.in-addr.arpa	name = modernizationroadmap.com.
19.66.57.130.in-addr.arpa	name = microfocusworld.com.
19.66.57.130.in-addr.arpa	name = microfocussoftware.com.
19.66.57.130.in-addr.arpa	name = mi
相关IP信息:
最新评论:
IP 类型 评论内容 时间
109.194.54.126 attackbotsspam
Dec  8 19:58:37 php1 sshd\[26693\]: Invalid user shikasyo from 109.194.54.126
Dec  8 19:58:37 php1 sshd\[26693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126
Dec  8 19:58:38 php1 sshd\[26693\]: Failed password for invalid user shikasyo from 109.194.54.126 port 42724 ssh2
Dec  8 20:04:10 php1 sshd\[27390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126  user=root
Dec  8 20:04:12 php1 sshd\[27390\]: Failed password for root from 109.194.54.126 port 48770 ssh2
2019-12-09 14:17:05
78.183.151.209 attack
Unauthorized connection attempt detected from IP address 78.183.151.209 to port 2323
2019-12-09 13:59:06
96.78.175.36 attackbots
Dec  9 06:59:53 loxhost sshd\[31390\]: Invalid user otakar from 96.78.175.36 port 49429
Dec  9 06:59:53 loxhost sshd\[31390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.36
Dec  9 06:59:55 loxhost sshd\[31390\]: Failed password for invalid user otakar from 96.78.175.36 port 49429 ssh2
Dec  9 07:05:38 loxhost sshd\[31586\]: Invalid user pcap from 96.78.175.36 port 54271
Dec  9 07:05:38 loxhost sshd\[31586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.36
...
2019-12-09 14:10:11
106.13.59.131 attackbotsspam
Dec  9 00:43:11 plusreed sshd[19639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.59.131  user=root
Dec  9 00:43:13 plusreed sshd[19639]: Failed password for root from 106.13.59.131 port 39596 ssh2
...
2019-12-09 14:02:15
51.15.243.82 attackspambots
Dec  8 19:46:07 auw2 sshd\[672\]: Invalid user admin from 51.15.243.82
Dec  8 19:46:07 auw2 sshd\[672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=layla.dontexist.org
Dec  8 19:46:09 auw2 sshd\[672\]: Failed password for invalid user admin from 51.15.243.82 port 45452 ssh2
Dec  8 19:52:15 auw2 sshd\[1386\]: Invalid user akiyo from 51.15.243.82
Dec  8 19:52:15 auw2 sshd\[1386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=layla.dontexist.org
2019-12-09 13:54:58
119.29.2.157 attackbotsspam
Dec  9 00:58:30 linuxvps sshd\[45063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.2.157  user=root
Dec  9 00:58:33 linuxvps sshd\[45063\]: Failed password for root from 119.29.2.157 port 36297 ssh2
Dec  9 01:04:41 linuxvps sshd\[49274\]: Invalid user www from 119.29.2.157
Dec  9 01:04:41 linuxvps sshd\[49274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.2.157
Dec  9 01:04:44 linuxvps sshd\[49274\]: Failed password for invalid user www from 119.29.2.157 port 40602 ssh2
2019-12-09 14:05:33
27.72.102.190 attackspam
Dec  9 06:08:42 hcbbdb sshd\[24810\]: Invalid user applicon from 27.72.102.190
Dec  9 06:08:42 hcbbdb sshd\[24810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.102.190
Dec  9 06:08:43 hcbbdb sshd\[24810\]: Failed password for invalid user applicon from 27.72.102.190 port 28964 ssh2
Dec  9 06:15:24 hcbbdb sshd\[25661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.102.190  user=root
Dec  9 06:15:26 hcbbdb sshd\[25661\]: Failed password for root from 27.72.102.190 port 50961 ssh2
2019-12-09 14:15:57
178.128.216.127 attackbotsspam
Dec  9 06:22:49 meumeu sshd[17947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.216.127 
Dec  9 06:22:51 meumeu sshd[17947]: Failed password for invalid user bellamy from 178.128.216.127 port 51294 ssh2
Dec  9 06:31:41 meumeu sshd[22287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.216.127 
...
2019-12-09 13:47:45
185.214.164.10 attack
MYH,DEF POST /downloader/
2019-12-09 14:12:29
212.16.187.24 attack
Tries to login WordPress (wp-login.php)
2019-12-09 14:23:15
68.183.236.66 attackspambots
Dec  9 10:54:11 gw1 sshd[23828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.66
Dec  9 10:54:13 gw1 sshd[23828]: Failed password for invalid user mcduffey from 68.183.236.66 port 49106 ssh2
...
2019-12-09 13:57:41
149.202.180.143 attackspam
2019-12-09T06:59:53.994606  sshd[31713]: Invalid user victoria12 from 149.202.180.143 port 56798
2019-12-09T06:59:54.005970  sshd[31713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.180.143
2019-12-09T06:59:53.994606  sshd[31713]: Invalid user victoria12 from 149.202.180.143 port 56798
2019-12-09T06:59:56.509683  sshd[31713]: Failed password for invalid user victoria12 from 149.202.180.143 port 56798 ssh2
2019-12-09T07:04:51.682802  sshd[31842]: Invalid user 123456 from 149.202.180.143 port 60102
...
2019-12-09 14:29:08
37.187.114.135 attackspam
Dec  9 05:56:10 * sshd[27486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.114.135
Dec  9 05:56:12 * sshd[27486]: Failed password for invalid user louise from 37.187.114.135 port 57524 ssh2
2019-12-09 13:54:27
211.253.10.96 attack
Dec  9 01:12:07 plusreed sshd[27107]: Invalid user admin from 211.253.10.96
...
2019-12-09 14:27:23
188.166.145.179 attackbots
Dec  9 07:11:55 meumeu sshd[28459]: Failed password for gdm from 188.166.145.179 port 46352 ssh2
Dec  9 07:17:03 meumeu sshd[29123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.145.179 
Dec  9 07:17:06 meumeu sshd[29123]: Failed password for invalid user accounts from 188.166.145.179 port 55430 ssh2
...
2019-12-09 14:27:49

最近上报的IP列表

130.69.92.10 130.70.8.142 130.68.5.22 130.74.120.3
130.76.184.142 130.59.31.102 130.76.184.139 130.76.22.19
130.61.133.140 130.76.22.18 130.61.205.105 206.70.167.255
130.88.101.59 130.88.101.56 130.89.148.77 130.61.65.140
130.89.149.216 130.61.69.238 130.91.81.228 130.92.12.136