必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.94.36.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.94.36.21.			IN	A

;; AUTHORITY SECTION:
.			116	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 16:16:35 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 21.36.94.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.36.94.130.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
152.32.191.57 attackspam
ssh failed login
2019-08-07 05:34:11
5.128.152.227 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-07 05:25:11
218.64.26.162 attackspam
Aug  6 16:42:52 localhost postfix/smtpd\[13977\]: warning: unknown\[218.64.26.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 16:43:00 localhost postfix/smtpd\[13977\]: warning: unknown\[218.64.26.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 16:43:12 localhost postfix/smtpd\[13977\]: warning: unknown\[218.64.26.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 16:43:28 localhost postfix/smtpd\[14319\]: warning: unknown\[218.64.26.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  6 16:43:36 localhost postfix/smtpd\[14319\]: warning: unknown\[218.64.26.162\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-07 05:39:37
193.112.97.157 attackbotsspam
Automatic report - Banned IP Access
2019-08-07 05:04:17
106.51.50.175 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-08-07 05:06:58
209.17.96.50 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-08-07 05:24:09
209.94.191.212 attack
/var/log/apache/pucorp.org.log:209.94.191.212 - - [06/Aug/2019:18:51:29 +0800] "GET /robots.txt HTTP/1.1" 304 204 "-" "Mozilla/5.0 (compatible; MJ12bot/v1.4.8; hxxp://mj12bot.com/)"
/var/log/apache/pucorp.org.log:209.94.191.212 - - [06/Aug/2019:18:51:31 +0800] "GET /index.php/component/k2/hostnameem/306-%C3%A7%E2%80%9C%C5%A0%C3%A9%C5%93%C5%BE%C3%A6%m3%B2%E2%80%B0%C3%A7%E2%80%94%E2%80%BA%C3%A6%E2%80%9A%m3%BC%C3%A5%m3%BF%m3%B5%C3%A6%m3%81%m3%A9%C3%A5%m3%B8%m3%AB%C3%A7%m3%B4%E2%80%A6%C3%A7%m3%B7%C5%A1%C3%A5%m3%A5%m3%B3 HTTP/1.1" 200 15071 "-" "Mozilla/5.0 (compatible; MJ12bot/v1.4.8; hxxp://mj12bot.com/)"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=209.94.191.212
2019-08-07 05:03:12
54.36.150.42 attack
Automatic report - Banned IP Access
2019-08-07 05:08:36
212.114.57.53 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2019-08-07 05:31:52
128.199.231.239 attack
Aug  7 00:07:22 server sshd\[17643\]: Invalid user no1 from 128.199.231.239 port 41862
Aug  7 00:07:22 server sshd\[17643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.231.239
Aug  7 00:07:24 server sshd\[17643\]: Failed password for invalid user no1 from 128.199.231.239 port 41862 ssh2
Aug  7 00:16:18 server sshd\[5955\]: Invalid user am from 128.199.231.239 port 46944
Aug  7 00:16:18 server sshd\[5955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.231.239
2019-08-07 05:35:07
148.251.70.179 attack
Automatic report - Banned IP Access
2019-08-07 05:07:20
134.209.111.16 attackbots
Aug  6 20:04:29 server01 sshd\[31758\]: Invalid user bj from 134.209.111.16
Aug  6 20:04:29 server01 sshd\[31758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.111.16
Aug  6 20:04:31 server01 sshd\[31758\]: Failed password for invalid user bj from 134.209.111.16 port 42906 ssh2
...
2019-08-07 05:04:36
94.100.132.63 attack
Aug  6 12:50:13 mxgate1 postfix/postscreen[14179]: CONNECT from [94.100.132.63]:60158 to [176.31.12.44]:25
Aug  6 12:50:13 mxgate1 postfix/dnsblog[14182]: addr 94.100.132.63 listed by domain bl.spamcop.net as 127.0.0.2
Aug  6 12:50:13 mxgate1 postfix/dnsblog[14183]: addr 94.100.132.63 listed by domain b.barracudacentral.org as 127.0.0.2
Aug  6 12:50:19 mxgate1 postfix/postscreen[14179]: DNSBL rank 2 for [94.100.132.63]:60158
Aug  6 12:50:20 mxgate1 postfix/tlsproxy[14425]: CONNECT from [94.100.132.63]:60158
Aug x@x
Aug  6 12:50:20 mxgate1 postfix/postscreen[14179]: DISCONNECT [94.100.132.63]:60158
Aug  6 12:50:20 mxgate1 postfix/tlsproxy[14425]: DISCONNECT [94.100.132.63]:60158


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.100.132.63
2019-08-07 04:58:10
110.139.181.11 attackspam
Automatic report - Port Scan Attack
2019-08-07 05:08:13
78.139.91.76 attackspambots
2019-08-06T13:11:11.707916 X postfix/smtpd[53747]: NOQUEUE: reject: RCPT from 76-91-139-78.kamensktel.ru[78.139.91.76]: 554 5.7.1 Service unavailable; Client host [78.139.91.76] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?78.139.91.76; from= to= proto=ESMTP helo=
2019-08-07 04:58:56

最近上报的IP列表

146.160.63.81 170.215.175.114 253.209.123.161 92.79.166.236
229.148.139.230 11.120.71.39 236.156.119.254 130.228.205.160
123.172.136.96 128.76.4.199 85.213.51.64 182.185.211.202
110.126.205.140 157.152.6.69 203.226.238.76 171.25.193.76
154.55.226.21 131.184.48.104 209.42.152.145 12.250.112.58