必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Zürich

省份(region): Zurich

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.60.24.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36492
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.60.24.13.			IN	A

;; AUTHORITY SECTION:
.			519	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:03:26 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
13.24.60.130.in-addr.arpa domain name pointer fw.s3it.uzh.ch.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.24.60.130.in-addr.arpa	name = fw.s3it.uzh.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
23.129.64.168 attackbots
Sep 23 14:50:04 rotator sshd\[25878\]: Invalid user admin from 23.129.64.168Sep 23 14:50:06 rotator sshd\[25878\]: Failed password for invalid user admin from 23.129.64.168 port 61554 ssh2Sep 23 14:50:09 rotator sshd\[25878\]: Failed password for invalid user admin from 23.129.64.168 port 61554 ssh2Sep 23 14:50:12 rotator sshd\[25878\]: Failed password for invalid user admin from 23.129.64.168 port 61554 ssh2Sep 23 14:50:14 rotator sshd\[25878\]: Failed password for invalid user admin from 23.129.64.168 port 61554 ssh2Sep 23 14:50:17 rotator sshd\[25878\]: Failed password for invalid user admin from 23.129.64.168 port 61554 ssh2
...
2019-09-24 03:22:24
1.54.204.149 attack
Unauthorized connection attempt from IP address 1.54.204.149 on Port 445(SMB)
2019-09-24 03:32:31
178.91.55.148 attackbotsspam
Autoban   178.91.55.148 AUTH/CONNECT
2019-09-24 03:07:40
59.120.19.40 attackspam
fraudulent SSH attempt
2019-09-24 03:09:34
31.223.233.226 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/31.223.233.226/ 
 HU - 1H : (31)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : HU 
 NAME ASN : ASN47116 
 
 IP : 31.223.233.226 
 
 CIDR : 31.223.232.0/21 
 
 PREFIX COUNT : 5 
 
 UNIQUE IP COUNT : 6656 
 
 
 WYKRYTE ATAKI Z ASN47116 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SERVER - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-24 03:10:23
123.255.249.146 attackspam
Automatic report - Port Scan Attack
2019-09-24 03:40:59
192.126.166.172 attackspam
192.126.166.172 - - [23/Sep/2019:08:16:25 -0400] "GET /?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&manufacturerID=1&productID=6501.15M&linkID=3128 HTTP/1.1" 200 17212 "https://baldwinbrasshardware.com/?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&manufacturerID=1&productID=6501.15M&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-24 03:16:09
108.186.244.246 attackbotsspam
108.186.244.246 - - [23/Sep/2019:08:16:28 -0400] "GET /?page=products&action=../../../../../../../../etc/passwd%00&manufacturerID=1&productID=6501.15M&linkID=3128 HTTP/1.1" 200 17212 "https://baldwinbrasshardware.com/?page=products&action=../../../../../../../../etc/passwd%00&manufacturerID=1&productID=6501.15M&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-24 03:15:11
117.193.122.225 attack
Chat Spam
2019-09-24 03:17:28
218.213.171.50 attack
Unauthorized connection attempt from IP address 218.213.171.50 on Port 445(SMB)
2019-09-24 03:29:31
31.202.29.215 attack
Unauthorized connection attempt from IP address 31.202.29.215 on Port 445(SMB)
2019-09-24 03:34:37
147.139.136.237 attackspambots
Sep 23 19:06:07 ns37 sshd[18042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.139.136.237
2019-09-24 03:34:00
103.45.154.214 attackbotsspam
Sep 23 04:28:14 aiointranet sshd\[24696\]: Invalid user webadmin from 103.45.154.214
Sep 23 04:28:14 aiointranet sshd\[24696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.154.214
Sep 23 04:28:15 aiointranet sshd\[24696\]: Failed password for invalid user webadmin from 103.45.154.214 port 54410 ssh2
Sep 23 04:34:35 aiointranet sshd\[25249\]: Invalid user ubnt from 103.45.154.214
Sep 23 04:34:35 aiointranet sshd\[25249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.154.214
2019-09-24 03:15:23
61.238.254.54 attackspambots
Automatic report - Banned IP Access
2019-09-24 03:03:37
200.56.63.155 attackspambots
Invalid user temp from 200.56.63.155 port 36789
2019-09-24 03:34:55

最近上报的IP列表

140.116.131.112 140.116.178.114 140.116.183.116 113.53.69.77
202.29.62.202 140.113.65.150 147.102.203.44 140.123.220.91
140.116.201.95 209.2.238.70 164.8.51.221 147.32.193.86
194.27.49.167 128.171.157.176 169.232.107.202 124.16.189.161
140.116.75.108 140.116.223.97 35.189.127.184 140.116.114.39