必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.130.189.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12304
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.130.189.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:48:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
7.189.130.133.in-addr.arpa domain name pointer pl29703.ag2525.nttpc.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.189.130.133.in-addr.arpa	name = pl29703.ag2525.nttpc.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.143.158.84 attackspambots
Port 22 Scan, PTR: sh-phx-us-gp1-wk109.internet-census.org.
2020-02-24 05:13:19
125.209.106.39 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 125.209.106.39 (125-209-106-39.multi.net.pk): 5 in the last 3600 secs - Sun Jun  3 16:03:42 2018
2020-02-24 05:42:12
213.171.198.78 attackbotsspam
Brute force blocker - service: exim2 - aantal: 25 - Mon Jun  4 09:25:14 2018
2020-02-24 05:33:28
146.66.244.246 attackbotsspam
Feb 23 06:41:31 php1 sshd\[22058\]: Invalid user tssuser from 146.66.244.246
Feb 23 06:41:31 php1 sshd\[22058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.66.244.246
Feb 23 06:41:33 php1 sshd\[22058\]: Failed password for invalid user tssuser from 146.66.244.246 port 42756 ssh2
Feb 23 06:45:09 php1 sshd\[22375\]: Invalid user ubuntu from 146.66.244.246
Feb 23 06:45:09 php1 sshd\[22375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.66.244.246
2020-02-24 05:10:39
168.232.130.50 attackbots
Feb 23 13:22:35 ip-172-31-62-245 sshd\[19423\]: Failed password for root from 168.232.130.50 port 54067 ssh2\
Feb 23 13:22:52 ip-172-31-62-245 sshd\[19425\]: Failed password for root from 168.232.130.50 port 54079 ssh2\
Feb 23 13:23:11 ip-172-31-62-245 sshd\[19427\]: Failed password for root from 168.232.130.50 port 54093 ssh2\
Feb 23 13:23:24 ip-172-31-62-245 sshd\[19431\]: Invalid user admin from 168.232.130.50\
Feb 23 13:23:26 ip-172-31-62-245 sshd\[19431\]: Failed password for invalid user admin from 168.232.130.50 port 54103 ssh2\
2020-02-24 05:10:27
156.62.140.124 attack
Feb 22 04:20:15 reporting5 sshd[1866]: Invalid user test from 156.62.140.124
Feb 22 04:20:15 reporting5 sshd[1866]: Failed password for invalid user test from 156.62.140.124 port 49404 ssh2
Feb 22 04:25:28 reporting5 sshd[4109]: Invalid user dev from 156.62.140.124
Feb 22 04:25:28 reporting5 sshd[4109]: Failed password for invalid user dev from 156.62.140.124 port 48416 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=156.62.140.124
2020-02-24 05:09:01
108.83.65.54 attackspam
*Port Scan* detected from 108.83.65.54 (US/United States/108-83-65-54.lightspeed.miamfl.sbcglobal.net). 4 hits in the last 165 seconds
2020-02-24 05:26:25
119.54.80.116 attackbotsspam
Brute force blocker - service: proftpd1, proftpd2 - aantal: 77 - Wed Jun  6 05:40:16 2018
2020-02-24 05:24:31
117.0.204.108 attackbots
Port probing on unauthorized port 26
2020-02-24 05:43:59
54.38.36.56 attack
Feb 19 17:46:55 dns-1 sshd[21425]: User sys from 54.38.36.56 not allowed because not listed in AllowUsers
Feb 19 17:46:55 dns-1 sshd[21425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.56  user=sys
Feb 19 17:46:56 dns-1 sshd[21425]: Failed password for invalid user sys from 54.38.36.56 port 41532 ssh2
Feb 19 17:46:57 dns-1 sshd[21425]: Received disconnect from 54.38.36.56 port 41532:11: Bye Bye [preauth]
Feb 19 17:46:57 dns-1 sshd[21425]: Disconnected from invalid user sys 54.38.36.56 port 41532 [preauth]
Feb 19 18:07:36 dns-1 sshd[22354]: User backup from 54.38.36.56 not allowed because not listed in AllowUsers
Feb 19 18:07:36 dns-1 sshd[22354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.56  user=backup
Feb 19 18:07:37 dns-1 sshd[22354]: Failed password for invalid user backup from 54.38.36.56 port 39780 ssh2
Feb 19 18:07:38 dns-1 sshd[22354]: Received disconnect ........
-------------------------------
2020-02-24 05:15:56
221.196.86.144 attack
Brute force blocker - service: proftpd1 - aantal: 64 - Sun Jun  3 11:25:13 2018
2020-02-24 05:38:47
113.21.120.193 attackbotsspam
*Port Scan* detected from 113.21.120.193 (NC/New Caledonia/host-113-21-120-193.canl.nc). 4 hits in the last 165 seconds
2020-02-24 05:25:54
40.86.225.247 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 40.86.225.247 (-): 5 in the last 3600 secs - Tue Jun  5 17:53:45 2018
2020-02-24 05:25:00
190.75.27.141 attackbotsspam
Lines containing failures of 190.75.27.141
Feb 19 19:33:19 dns01 sshd[4118]: Invalid user debian from 190.75.27.141 port 51296
Feb 19 19:33:19 dns01 sshd[4118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.75.27.141
Feb 19 19:33:21 dns01 sshd[4118]: Failed password for invalid user debian from 190.75.27.141 port 51296 ssh2
Feb 19 19:33:21 dns01 sshd[4118]: Received disconnect from 190.75.27.141 port 51296:11: Bye Bye [preauth]
Feb 19 19:33:21 dns01 sshd[4118]: Disconnected from invalid user debian 190.75.27.141 port 51296 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.75.27.141
2020-02-24 05:39:08
106.13.127.238 attackspambots
Feb 23 16:34:36 MK-Soft-VM3 sshd[22994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.127.238 
Feb 23 16:34:39 MK-Soft-VM3 sshd[22994]: Failed password for invalid user bitbucket from 106.13.127.238 port 3693 ssh2
...
2020-02-24 05:46:59

最近上报的IP列表

104.106.196.212 89.66.137.142 42.13.142.121 223.255.241.94
151.27.155.80 42.138.37.253 34.95.186.230 146.16.99.37
143.184.130.121 101.172.39.206 50.66.245.61 176.187.93.176
64.11.26.173 238.13.118.45 226.82.220.92 38.2.127.248
166.211.90.27 28.243.117.71 69.238.35.216 230.104.162.15