必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.63.121.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54279
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.63.121.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:36:59 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
216.121.63.130.in-addr.arpa domain name pointer ip-130-63-121-216.dynamic.yorku.ca.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.121.63.130.in-addr.arpa	name = ip-130-63-121-216.dynamic.yorku.ca.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.33.67.12 attackspam
Jun 16 12:30:12 ip-172-31-61-156 sshd[11461]: Failed password for invalid user ram from 178.33.67.12 port 42630 ssh2
Jun 16 12:35:28 ip-172-31-61-156 sshd[11744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.67.12  user=root
Jun 16 12:35:30 ip-172-31-61-156 sshd[11744]: Failed password for root from 178.33.67.12 port 42236 ssh2
Jun 16 12:40:22 ip-172-31-61-156 sshd[12140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.67.12  user=root
Jun 16 12:40:24 ip-172-31-61-156 sshd[12140]: Failed password for root from 178.33.67.12 port 41822 ssh2
...
2020-06-16 21:33:36
208.68.39.124 attackbotsspam
Jun 16 12:16:09 ip-172-31-62-245 sshd\[4165\]: Invalid user arjun from 208.68.39.124\
Jun 16 12:16:12 ip-172-31-62-245 sshd\[4165\]: Failed password for invalid user arjun from 208.68.39.124 port 37846 ssh2\
Jun 16 12:19:50 ip-172-31-62-245 sshd\[4193\]: Invalid user unlock from 208.68.39.124\
Jun 16 12:19:52 ip-172-31-62-245 sshd\[4193\]: Failed password for invalid user unlock from 208.68.39.124 port 59916 ssh2\
Jun 16 12:23:41 ip-172-31-62-245 sshd\[4237\]: Failed password for root from 208.68.39.124 port 53714 ssh2\
2020-06-16 21:32:10
194.26.29.154 attack
Jun 16 14:52:53 vps339862 kernel: \[11530889.244934\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=194.26.29.154 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=46024 PROTO=TCP SPT=48164 DPT=8230 SEQ=3293470149 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 16 14:53:09 vps339862 kernel: \[11530905.067723\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=194.26.29.154 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=13523 PROTO=TCP SPT=48164 DPT=6185 SEQ=2300633809 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 16 14:55:14 vps339862 kernel: \[11531030.032974\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=194.26.29.154 DST=51.254.206.43 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=32291 PROTO=TCP SPT=48164 DPT=9310 SEQ=4024144982 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 16 14:57:33 vps339862 kernel: \[11531169.323573\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=
...
2020-06-16 22:05:06
119.160.100.122 attackspam
Automatic report - XMLRPC Attack
2020-06-16 21:45:49
218.232.135.95 attackspam
Jun 16 15:32:27 abendstille sshd\[12861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.232.135.95  user=root
Jun 16 15:32:30 abendstille sshd\[12861\]: Failed password for root from 218.232.135.95 port 60144 ssh2
Jun 16 15:36:03 abendstille sshd\[16761\]: Invalid user ud from 218.232.135.95
Jun 16 15:36:03 abendstille sshd\[16761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.232.135.95
Jun 16 15:36:05 abendstille sshd\[16761\]: Failed password for invalid user ud from 218.232.135.95 port 60066 ssh2
...
2020-06-16 21:56:10
124.219.98.180 attackbots
Automatic report - FTP Brute Force
2020-06-16 21:40:35
91.204.199.73 attack
Jun 16 12:23:36 IngegnereFirenze sshd[19658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.199.73  user=root
...
2020-06-16 21:36:09
222.186.173.154 attack
2020-06-16T15:53:03.213868struts4.enskede.local sshd\[19994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2020-06-16T15:53:06.778384struts4.enskede.local sshd\[19994\]: Failed password for root from 222.186.173.154 port 16522 ssh2
2020-06-16T15:53:11.121577struts4.enskede.local sshd\[19994\]: Failed password for root from 222.186.173.154 port 16522 ssh2
2020-06-16T15:53:15.774119struts4.enskede.local sshd\[19994\]: Failed password for root from 222.186.173.154 port 16522 ssh2
2020-06-16T15:53:19.763413struts4.enskede.local sshd\[19994\]: Failed password for root from 222.186.173.154 port 16522 ssh2
...
2020-06-16 22:01:00
182.61.65.209 attack
Jun 16 12:20:45 ip-172-31-62-245 sshd\[4211\]: Invalid user dereck from 182.61.65.209\
Jun 16 12:20:47 ip-172-31-62-245 sshd\[4211\]: Failed password for invalid user dereck from 182.61.65.209 port 42342 ssh2\
Jun 16 12:21:57 ip-172-31-62-245 sshd\[4215\]: Invalid user jboss from 182.61.65.209\
Jun 16 12:21:59 ip-172-31-62-245 sshd\[4215\]: Failed password for invalid user jboss from 182.61.65.209 port 59748 ssh2\
Jun 16 12:23:08 ip-172-31-62-245 sshd\[4227\]: Invalid user anonymous from 182.61.65.209\
2020-06-16 21:57:21
220.158.148.132 attack
Jun 16 14:12:29 ns382633 sshd\[30319\]: Invalid user venus from 220.158.148.132 port 38268
Jun 16 14:12:29 ns382633 sshd\[30319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.158.148.132
Jun 16 14:12:31 ns382633 sshd\[30319\]: Failed password for invalid user venus from 220.158.148.132 port 38268 ssh2
Jun 16 14:23:10 ns382633 sshd\[32046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.158.148.132  user=root
Jun 16 14:23:12 ns382633 sshd\[32046\]: Failed password for root from 220.158.148.132 port 46022 ssh2
2020-06-16 21:53:51
124.160.42.66 attackspambots
2020-06-16T12:19:00.951303abusebot-5.cloudsearch.cf sshd[15033]: Invalid user git from 124.160.42.66 port 43923
2020-06-16T12:19:00.956068abusebot-5.cloudsearch.cf sshd[15033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.42.66
2020-06-16T12:19:00.951303abusebot-5.cloudsearch.cf sshd[15033]: Invalid user git from 124.160.42.66 port 43923
2020-06-16T12:19:02.645945abusebot-5.cloudsearch.cf sshd[15033]: Failed password for invalid user git from 124.160.42.66 port 43923 ssh2
2020-06-16T12:23:25.466453abusebot-5.cloudsearch.cf sshd[15087]: Invalid user ec2-user from 124.160.42.66 port 36304
2020-06-16T12:23:25.471476abusebot-5.cloudsearch.cf sshd[15087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.42.66
2020-06-16T12:23:25.466453abusebot-5.cloudsearch.cf sshd[15087]: Invalid user ec2-user from 124.160.42.66 port 36304
2020-06-16T12:23:27.542439abusebot-5.cloudsearch.cf sshd[15087]: Failed
...
2020-06-16 21:42:39
178.251.223.98 attackspambots
1592310216 - 06/16/2020 14:23:36 Host: 178.251.223.98/178.251.223.98 Port: 445 TCP Blocked
2020-06-16 21:35:42
178.128.184.133 attackbots
2020-06-16T14:21:01.262140ns386461 sshd\[4214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.184.133  user=root
2020-06-16T14:21:03.563590ns386461 sshd\[4214\]: Failed password for root from 178.128.184.133 port 39030 ssh2
2020-06-16T14:22:27.993993ns386461 sshd\[5536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.184.133  user=root
2020-06-16T14:22:30.098541ns386461 sshd\[5536\]: Failed password for root from 178.128.184.133 port 42274 ssh2
2020-06-16T14:23:45.495479ns386461 sshd\[6650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.184.133  user=root
...
2020-06-16 21:24:56
49.51.160.240 attackbotsspam
06/16/2020-08:23:17.145356 49.51.160.240 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 48
2020-06-16 21:51:05
188.166.191.192 attackbots
(sshd) Failed SSH login from 188.166.191.192 (SG/Singapore/path.whytobe.xyz): 5 in the last 3600 secs
2020-06-16 21:54:14

最近上报的IP列表

116.19.40.243 226.138.212.66 83.123.167.181 57.241.98.64
71.56.85.23 118.243.192.135 5.1.22.248 232.180.155.205
76.20.48.198 236.100.67.33 189.47.144.112 206.150.229.3
64.234.104.178 99.81.136.32 59.99.130.160 171.205.15.151
133.219.15.94 190.55.42.187 68.76.244.131 79.197.53.173