必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.30.13.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.30.13.244.			IN	A

;; AUTHORITY SECTION:
.			452	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 05:13:28 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 244.13.30.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.13.30.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.24.5.233 attack
2020-02-0620:54:201iznEB-0004WB-Vl\<=info@whatsup2013.chH=hrw-35-132.ideay.net.ni\(localhost\)[186.1.35.132]:43642P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2124id=AAAF194A4195BB08D4D19820D4166C44@whatsup2013.chT="Iwantsomethingbeautiful"fordavidparziale65@gmail.com2020-02-0620:53:551iznDm-0004VU-Q5\<=info@whatsup2013.chH=\(localhost\)[123.24.5.233]:42064P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2081id=6F6ADC8F84507ECD11145DE511ED1113@whatsup2013.chT="lonelinessisnothappy"forsanchez.bryanlee2018@gmail.com2020-02-0620:55:231iznFC-0004YG-Nn\<=info@whatsup2013.chH=\(localhost\)[41.40.7.41]:48080P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=2251id=E1E452010ADEF0439F9AD36B9FF7D545@whatsup2013.chT="Iwantsomethingbeautiful"forblackraven2786@gmail.com2020-02-0620:54:511iznEg-0004X3-VL\<=info@whatsup2013.chH=\(localhost\)[183.89.212.76]:33694P=esmtpsaX=TLSv1.2:ECDHE-RSA
2020-02-07 06:23:42
187.110.87.170 attack
lfd: (smtpauth) Failed SMTP AUTH login from 187.110.87.170 (BR/Brazil/-): 5 in the last 3600 secs - Fri Jul  6 10:33:07 2018
2020-02-07 06:05:28
122.51.198.207 attackbots
2020-02-06T15:44:45.9807861495-001 sshd[64336]: Invalid user vja from 122.51.198.207 port 44056
2020-02-06T15:44:45.9919181495-001 sshd[64336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.207
2020-02-06T15:44:45.9807861495-001 sshd[64336]: Invalid user vja from 122.51.198.207 port 44056
2020-02-06T15:44:48.0014001495-001 sshd[64336]: Failed password for invalid user vja from 122.51.198.207 port 44056 ssh2
2020-02-06T15:47:30.8349291495-001 sshd[64483]: Invalid user srk from 122.51.198.207 port 34456
2020-02-06T15:47:30.8447361495-001 sshd[64483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.198.207
2020-02-06T15:47:30.8349291495-001 sshd[64483]: Invalid user srk from 122.51.198.207 port 34456
2020-02-06T15:47:32.8390391495-001 sshd[64483]: Failed password for invalid user srk from 122.51.198.207 port 34456 ssh2
2020-02-06T15:50:15.9080581495-001 sshd[64682]: Invalid user cfa from 12
...
2020-02-07 06:09:56
80.211.53.246 attack
Feb  6 22:47:12 server sshd\[32062\]: Invalid user kdm from 80.211.53.246
Feb  6 22:47:12 server sshd\[32062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.53.246 
Feb  6 22:47:13 server sshd\[32062\]: Failed password for invalid user kdm from 80.211.53.246 port 42506 ssh2
Feb  6 22:56:07 server sshd\[1098\]: Invalid user aci from 80.211.53.246
Feb  6 22:56:07 server sshd\[1098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.53.246 
...
2020-02-07 06:13:52
114.25.48.59 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 114.25.48.59 (TW/Taiwan/114-25-48-59.dynamic-ip.hinet.net): 5 in the last 3600 secs - Fri Jun 22 23:08:48 2018
2020-02-07 06:18:02
222.252.89.187 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 222.252.89.187 (VN/Vietnam/static.vnpt.vn): 5 in the last 3600 secs - Thu May 24 18:52:36 2018
2020-02-07 06:33:47
51.254.141.18 attack
$f2bV_matches
2020-02-07 06:33:21
58.220.87.226 attack
Feb  6 10:43:47 web9 sshd\[21039\]: Invalid user gl from 58.220.87.226
Feb  6 10:43:47 web9 sshd\[21039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.220.87.226
Feb  6 10:43:49 web9 sshd\[21039\]: Failed password for invalid user gl from 58.220.87.226 port 41438 ssh2
Feb  6 10:45:22 web9 sshd\[21302\]: Invalid user xmq from 58.220.87.226
Feb  6 10:45:22 web9 sshd\[21302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.220.87.226
2020-02-07 06:01:35
116.114.95.192 attackspambots
" "
2020-02-07 06:10:17
114.237.188.184 attackspam
Feb  6 20:56:00 grey postfix/smtpd\[7030\]: NOQUEUE: reject: RCPT from unknown\[114.237.188.184\]: 554 5.7.1 Service unavailable\; Client host \[114.237.188.184\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[114.237.188.184\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-07 06:28:19
31.10.129.164 attack
lfd: (smtpauth) Failed SMTP AUTH login from 31.10.129.164 (CH/Switzerland/-): 5 in the last 3600 secs - Fri Jun 15 16:02:49 2018
2020-02-07 06:25:57
60.176.235.186 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 60.176.235.186 (CN/China/186.235.176.60.broad.hz.zj.dynamic.163data.com.cn): 5 in the last 3600 secs - Fri May 25 19:26:20 2018
2020-02-07 06:32:50
123.21.104.197 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 123.21.104.197 (VN/Vietnam/-): 5 in the last 3600 secs - Fri Jul  6 10:43:46 2018
2020-02-07 06:00:12
45.143.220.169 attackbots
Feb  6 23:28:03 mail kernel: [437541.724720] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=45.143.220.169 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=16216 DF PROTO=TCP SPT=11 DPT=8507 WINDOW=512 RES=0x00 SYN URGP=0 
...
2020-02-07 06:36:10
115.204.30.179 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 115.204.30.179 (CN/China/-): 5 in the last 3600 secs - Fri May 25 19:30:56 2018
2020-02-07 06:29:42

最近上报的IP列表

184.185.100.123 151.147.137.43 59.197.15.12 133.212.212.42
5.154.37.73 122.144.171.1 23.21.213.212 200.180.57.33
234.215.142.113 216.145.11.94 163.114.193.34 176.37.189.82
163.125.174.134 158.183.158.164 182.50.151.30 149.168.172.214
69.118.184.147 205.214.25.80 100.50.39.115 54.12.76.39