必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.22.130.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17619
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.22.130.146.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062801 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 08:17:17 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 146.130.22.131.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 131.22.130.146.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
141.98.10.141 attackspambots
Feb 24 05:18:21 mail postfix/smtpd\[18461\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 24 05:24:12 mail postfix/smtpd\[18571\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 24 05:30:03 mail postfix/smtpd\[18816\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 24 06:05:05 mail postfix/smtpd\[19378\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-02-24 13:06:53
187.212.46.131 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:39:16
190.7.139.84 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:28:16
187.32.90.81 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:45:00
37.228.138.22 attack
WordPress brute force
2020-02-24 09:26:42
113.178.120.104 botsattack
attack  garena account
2020-02-24 11:16:41
106.248.228.114 attackspam
Feb 23 18:51:11 php1 sshd\[1039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.228.114  user=lunalilo
Feb 23 18:51:13 php1 sshd\[1039\]: Failed password for lunalilo from 106.248.228.114 port 41918 ssh2
Feb 23 18:55:11 php1 sshd\[1472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.228.114  user=lunalilo
Feb 23 18:55:13 php1 sshd\[1472\]: Failed password for lunalilo from 106.248.228.114 port 39732 ssh2
Feb 23 18:59:28 php1 sshd\[1784\]: Invalid user www from 106.248.228.114
Feb 23 18:59:28 php1 sshd\[1784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.228.114
2020-02-24 13:04:26
189.78.114.252 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:31:18
189.101.110.138 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:30:05
187.32.129.43 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:44:30
188.164.212.60 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:33:24
188.32.108.72 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:36:23
190.92.90.130 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:25:17
190.123.90.245 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:24:43
187.8.171.186 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:46:31

最近上报的IP列表

150.136.216.99 121.16.129.179 120.98.200.142 54.9.40.104
23.213.92.36 180.113.232.57 19.249.235.96 96.143.155.227
96.157.122.198 43.11.2.194 100.70.2.122 29.108.186.141
81.231.195.106 102.108.155.235 52.37.147.30 126.150.53.161
104.199.145.185 97.69.71.14 97.73.177.159 73.98.170.212