必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 153.131.125.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;153.131.125.130.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:02:36 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
130.125.131.153.in-addr.arpa domain name pointer p6656131-ipoe.ipoe.ocn.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.125.131.153.in-addr.arpa	name = p6656131-ipoe.ipoe.ocn.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.232.171.28 attack
Unauthorized connection attempt detected from IP address 49.232.171.28 to port 2220 [J]
2020-01-07 20:57:21
187.237.134.210 attackbotsspam
Unauthorized connection attempt detected from IP address 187.237.134.210 to port 1433 [J]
2020-01-07 21:09:13
115.90.219.20 attack
Jan  7 13:13:40 sshgateway sshd\[1203\]: Invalid user include from 115.90.219.20
Jan  7 13:13:40 sshgateway sshd\[1203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.90.219.20
Jan  7 13:13:41 sshgateway sshd\[1203\]: Failed password for invalid user include from 115.90.219.20 port 42314 ssh2
2020-01-07 21:13:52
68.183.4.129 attackbotsspam
Unauthorized connection attempt detected from IP address 68.183.4.129 to port 2220 [J]
2020-01-07 21:20:50
37.187.77.188 attackspambots
Unauthorized connection attempt detected from IP address 37.187.77.188 to port 8001 [J]
2020-01-07 21:00:05
37.49.230.96 attackspambots
firewall-block, port(s): 16060/udp
2020-01-07 21:24:47
114.67.84.208 attack
Jan  7 13:03:52 *** sshd[17608]: Invalid user rgk from 114.67.84.208
2020-01-07 21:30:39
187.49.85.55 attack
Unauthorized connection attempt from IP address 187.49.85.55 on Port 445(SMB)
2020-01-07 21:22:00
112.220.24.131 attackbotsspam
Jan  7 14:31:37 sip sshd[9936]: Failed password for www-data from 112.220.24.131 port 51862 ssh2
Jan  7 14:33:36 sip sshd[10453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.24.131
Jan  7 14:33:38 sip sshd[10453]: Failed password for invalid user ftp_test from 112.220.24.131 port 43678 ssh2
2020-01-07 21:40:31
211.227.221.161 attack
Unauthorized connection attempt detected from IP address 211.227.221.161 to port 5555 [J]
2020-01-07 21:01:30
45.134.179.10 attack
TCP Port Scanning
2020-01-07 21:33:15
47.34.203.176 attackbotsspam
unauthorized connection attempt
2020-01-07 20:58:08
103.27.9.135 attackbots
Unauthorized connection attempt from IP address 103.27.9.135 on Port 445(SMB)
2020-01-07 21:31:11
51.83.255.93 attackspam
Jan  7 12:45:31 node1 sshd[29755]: Address 51.83.255.93 maps to ip-51-83-255.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jan  7 12:45:31 node1 sshd[29755]: Received disconnect from 51.83.255.93: 11: Normal Shutdown, Thank you for playing [preauth]
Jan  7 12:45:47 node1 sshd[29766]: Address 51.83.255.93 maps to ip-51-83-255.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jan  7 12:45:47 node1 sshd[29766]: Received disconnect from 51.83.255.93: 11: Normal Shutdown, Thank you for playing [preauth]
Jan  7 12:46:03 node1 sshd[29835]: Address 51.83.255.93 maps to ip-51-83-255.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jan  7 12:46:03 node1 sshd[29835]: Received disconnect from 51.83.255.93: 11: Normal Shutdown, Thank you for playing [preauth]
Jan  7 12:46:18 node1 sshd[29877]: Address 51.83.255.93 maps to ip-51-83-255.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTE........
-------------------------------
2020-01-07 21:37:25
159.203.27.98 attackbotsspam
Jan  7 12:12:57 zn008 sshd[3824]: Invalid user teamspeak from 159.203.27.98
Jan  7 12:12:57 zn008 sshd[3824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.27.98 
Jan  7 12:12:59 zn008 sshd[3824]: Failed password for invalid user teamspeak from 159.203.27.98 port 55938 ssh2
Jan  7 12:12:59 zn008 sshd[3824]: Received disconnect from 159.203.27.98: 11: Bye Bye [preauth]
Jan  7 12:17:10 zn008 sshd[4274]: Invalid user ftpserver from 159.203.27.98
Jan  7 12:17:10 zn008 sshd[4274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.27.98 
Jan  7 12:17:13 zn008 sshd[4274]: Failed password for invalid user ftpserver from 159.203.27.98 port 56122 ssh2
Jan  7 12:17:13 zn008 sshd[4274]: Received disconnect from 159.203.27.98: 11: Bye Bye [preauth]
Jan  7 12:19:18 zn008 sshd[4336]: Invalid user test0 from 159.203.27.98
Jan  7 12:19:18 zn008 sshd[4336]: pam_unix(sshd:auth): authentication ........
-------------------------------
2020-01-07 21:25:56

最近上报的IP列表

221.244.167.202 14.150.45.66 63.75.108.182 74.6.82.34
164.166.188.88 124.72.24.215 70.171.59.83 107.197.239.172
180.159.200.0 58.74.128.226 148.111.18.83 198.62.115.46
182.15.139.195 78.91.16.203 114.254.31.91 91.44.2.7
250.79.120.15 68.70.229.29 9.119.88.207 154.96.228.179