必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): The University of Otago

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.80.101.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59391
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.80.101.130.			IN	A

;; AUTHORITY SECTION:
.			2795	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070801 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 09 03:04:14 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
130.101.80.139.in-addr.arpa domain name pointer uocel272w.otago.ac.nz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.101.80.139.in-addr.arpa	name = uocel272w.otago.ac.nz.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.20.101.22 attackspam
Unauthorized connection attempt detected from IP address 111.20.101.22 to port 8080
2020-01-02 22:31:59
221.214.53.94 attackspam
01/02/2020-15:58:24.741316 221.214.53.94 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-01-02 23:08:19
69.30.225.114 attack
Unauthorized connection attempt detected from IP address 69.30.225.114 to port 3389
2020-01-02 22:36:46
200.29.232.154 attack
Unauthorized connection attempt detected from IP address 200.29.232.154 to port 445
2020-01-02 22:59:36
180.242.218.83 attackbots
1577946287 - 01/02/2020 07:24:47 Host: 180.242.218.83/180.242.218.83 Port: 445 TCP Blocked
2020-01-02 22:52:00
1.2.150.40 attackbotsspam
Unauthorized connection attempt detected from IP address 1.2.150.40 to port 445
2020-01-02 22:47:58
94.177.213.114 attackbots
$f2bV_matches
2020-01-02 22:35:52
112.15.216.132 attackspam
Unauthorized connection attempt detected from IP address 112.15.216.132 to port 1433
2020-01-02 22:29:51
49.145.232.120 attack
Unauthorized connection attempt detected from IP address 49.145.232.120 to port 445
2020-01-02 22:46:16
111.40.7.67 attackbots
Unauthorized connection attempt detected from IP address 111.40.7.67 to port 1433
2020-01-02 22:30:56
222.186.175.220 attackspam
Jan  2 15:58:08 legacy sshd[25357]: Failed password for root from 222.186.175.220 port 48670 ssh2
Jan  2 15:58:21 legacy sshd[25357]: error: maximum authentication attempts exceeded for root from 222.186.175.220 port 48670 ssh2 [preauth]
Jan  2 15:58:28 legacy sshd[25366]: Failed password for root from 222.186.175.220 port 57302 ssh2
...
2020-01-02 23:06:10
119.27.167.231 attack
Automatic report - Banned IP Access
2020-01-02 22:56:27
42.117.48.171 attackbots
Unauthorized connection attempt detected from IP address 42.117.48.171 to port 23
2020-01-02 22:41:57
106.13.98.119 attackbots
Tried sshing with brute force.
2020-01-02 23:05:23
118.71.244.221 attackbotsspam
Unauthorized connection attempt detected from IP address 118.71.244.221 to port 445
2020-01-02 22:25:06

最近上报的IP列表

141.40.213.150 116.222.115.147 192.64.67.151 114.118.182.31
24.139.120.3 93.84.11.60 96.206.189.145 120.21.16.200
86.202.95.60 64.58.84.203 203.182.177.142 50.63.243.230
101.149.10.44 166.201.219.17 211.115.207.60 207.225.7.52
90.250.80.247 41.45.147.188 101.152.150.230 204.69.234.29