必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.20.65.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23274
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.20.65.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 19:28:05 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 22.65.20.131.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 131.20.65.22.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.134.140.32 attackspam
Aug 20 20:29:08 localhost sshd\[858\]: Invalid user yseult from 91.134.140.32 port 47272
Aug 20 20:29:08 localhost sshd\[858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
Aug 20 20:29:10 localhost sshd\[858\]: Failed password for invalid user yseult from 91.134.140.32 port 47272 ssh2
2019-08-21 02:48:54
98.221.132.191 attackbotsspam
Aug 20 14:33:37 ny01 sshd[32058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.221.132.191
Aug 20 14:33:39 ny01 sshd[32058]: Failed password for invalid user alimov from 98.221.132.191 port 42534 ssh2
Aug 20 14:38:04 ny01 sshd[32508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.221.132.191
2019-08-21 03:54:48
177.97.120.213 attackbots
Automatic report - Port Scan Attack
2019-08-21 03:28:11
123.214.186.186 attack
Aug 20 09:40:24 friendsofhawaii sshd\[18850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.214.186.186  user=root
Aug 20 09:40:26 friendsofhawaii sshd\[18850\]: Failed password for root from 123.214.186.186 port 47484 ssh2
Aug 20 09:44:37 friendsofhawaii sshd\[19207\]: Invalid user jboss from 123.214.186.186
Aug 20 09:44:37 friendsofhawaii sshd\[19207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.214.186.186
Aug 20 09:44:39 friendsofhawaii sshd\[19207\]: Failed password for invalid user jboss from 123.214.186.186 port 51024 ssh2
2019-08-21 03:49:16
221.179.103.2 attackspam
2019-08-20T18:38:09.711498abusebot.cloudsearch.cf sshd\[12992\]: Invalid user lfc from 221.179.103.2 port 38558
2019-08-21 02:58:33
138.197.105.79 attackspam
Aug 20 21:23:07 ncomp sshd[10769]: Invalid user test from 138.197.105.79
Aug 20 21:23:07 ncomp sshd[10769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.105.79
Aug 20 21:23:07 ncomp sshd[10769]: Invalid user test from 138.197.105.79
Aug 20 21:23:09 ncomp sshd[10769]: Failed password for invalid user test from 138.197.105.79 port 39592 ssh2
2019-08-21 03:40:04
187.92.52.250 attack
failed root login
2019-08-21 03:06:08
154.8.185.122 attackspam
Aug 20 08:47:50 eddieflores sshd\[14371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.185.122  user=root
Aug 20 08:47:52 eddieflores sshd\[14371\]: Failed password for root from 154.8.185.122 port 51366 ssh2
Aug 20 08:52:38 eddieflores sshd\[14783\]: Invalid user user2 from 154.8.185.122
Aug 20 08:52:38 eddieflores sshd\[14783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.185.122
Aug 20 08:52:41 eddieflores sshd\[14783\]: Failed password for invalid user user2 from 154.8.185.122 port 37898 ssh2
2019-08-21 03:07:10
42.99.180.167 attackspam
Aug 20 16:43:51 mail sshd[2267]: Invalid user untu from 42.99.180.167
Aug 20 16:43:51 mail sshd[2267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.99.180.167
Aug 20 16:43:51 mail sshd[2267]: Invalid user untu from 42.99.180.167
Aug 20 16:43:52 mail sshd[2267]: Failed password for invalid user untu from 42.99.180.167 port 52846 ssh2
Aug 20 16:51:05 mail sshd[13741]: Invalid user ubuntu from 42.99.180.167
...
2019-08-21 03:05:04
46.101.27.6 attackbots
Aug 20 19:45:33 sshgateway sshd\[1018\]: Invalid user test6 from 46.101.27.6
Aug 20 19:45:33 sshgateway sshd\[1018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.27.6
Aug 20 19:45:35 sshgateway sshd\[1018\]: Failed password for invalid user test6 from 46.101.27.6 port 47538 ssh2
2019-08-21 03:48:05
83.13.120.122 attack
Automatic report - Port Scan Attack
2019-08-21 03:17:13
111.125.123.107 attack
Chat Spam
2019-08-21 02:33:34
77.233.4.133 attackbotsspam
Aug 20 17:59:06 [host] sshd[12726]: Invalid user nia from 77.233.4.133
Aug 20 17:59:06 [host] sshd[12726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.233.4.133
Aug 20 17:59:09 [host] sshd[12726]: Failed password for invalid user nia from 77.233.4.133 port 43328 ssh2
2019-08-21 02:34:37
45.231.132.134 attack
Aug 20 20:18:31 tux-35-217 sshd\[12631\]: Invalid user guest123 from 45.231.132.134 port 54746
Aug 20 20:18:31 tux-35-217 sshd\[12631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.231.132.134
Aug 20 20:18:33 tux-35-217 sshd\[12631\]: Failed password for invalid user guest123 from 45.231.132.134 port 54746 ssh2
Aug 20 20:26:14 tux-35-217 sshd\[12646\]: Invalid user password from 45.231.132.134 port 35228
Aug 20 20:26:14 tux-35-217 sshd\[12646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.231.132.134
...
2019-08-21 02:40:42
178.63.55.20 attack
08/20/2019-14:54:31.557148 178.63.55.20 Protocol: 6 ET SCAN Potential SSH Scan
2019-08-21 02:56:15

最近上报的IP列表

169.61.113.109 80.6.217.173 61.167.4.232 195.191.132.187
155.197.222.142 147.72.30.174 46.227.126.21 96.137.242.195
128.230.95.168 188.49.167.48 238.20.183.106 27.115.102.189
70.236.188.43 8.73.49.155 204.52.138.20 255.72.186.157
164.174.99.14 101.62.49.4 254.45.183.90 239.198.40.67