必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Nanjing

省份(region): Jiangsu

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): CHINA UNICOM China169 Backbone

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.0.30.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39983
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.0.30.130.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 15 23:50:57 +08 2019
;; MSG SIZE  rcvd: 116

HOST信息:
Host 130.30.0.157.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 67.207.67.3, trying next server
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 130.30.0.157.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.186.15.209 attackspam
SMB Server BruteForce Attack
2019-07-04 18:34:59
201.243.56.116 attack
445/tcp
[2019-07-04]1pkt
2019-07-04 18:14:53
185.220.101.28 attack
Jul  4 10:15:26 km20725 sshd\[27080\]: Failed password for root from 185.220.101.28 port 45119 ssh2Jul  4 10:15:29 km20725 sshd\[27080\]: Failed password for root from 185.220.101.28 port 45119 ssh2Jul  4 10:15:33 km20725 sshd\[27080\]: Failed password for root from 185.220.101.28 port 45119 ssh2Jul  4 10:15:36 km20725 sshd\[27080\]: Failed password for root from 185.220.101.28 port 45119 ssh2
...
2019-07-04 17:52:35
115.62.10.180 attack
37215/tcp
[2019-07-04]1pkt
2019-07-04 18:21:53
103.24.173.98 attackspam
TCP src-port=45186   dst-port=25    dnsbl-sorbs abuseat-org spamcop         (398)
2019-07-04 17:53:51
118.70.12.27 attackspam
445/tcp
[2019-07-04]1pkt
2019-07-04 18:34:39
106.12.194.234 attackspam
Jul  4 06:33:49 MK-Soft-VM4 sshd\[30845\]: Invalid user lab from 106.12.194.234 port 38714
Jul  4 06:33:49 MK-Soft-VM4 sshd\[30845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.234
Jul  4 06:33:51 MK-Soft-VM4 sshd\[30845\]: Failed password for invalid user lab from 106.12.194.234 port 38714 ssh2
...
2019-07-04 18:05:54
115.58.128.44 attack
2222/tcp
[2019-07-04]1pkt
2019-07-04 18:18:05
81.218.148.131 attackbotsspam
Fail2Ban Ban Triggered
2019-07-04 18:41:16
220.247.175.58 attackbots
Triggered by Fail2Ban
2019-07-04 18:21:17
176.88.222.164 attack
445/tcp
[2019-07-04]1pkt
2019-07-04 18:30:54
49.150.24.46 attack
445/tcp
[2019-07-04]1pkt
2019-07-04 18:23:10
133.242.171.132 attackspam
TCP src-port=33150   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (388)
2019-07-04 18:15:20
201.48.16.97 attackspambots
spamassassin . MISSING_HEADERS[1.2] . SPF_SOFTFAIL[1.0] . HELO_NO_DOMAIN[2.2] . REPLYTO_WITHOUT_TO_CC[1.9] . FREEMAIL_FORGED_REPLYTO[2.5] . FROM_MISSP_REPLYTO[0.3] . TO_NO_BRKTS_FROM_MSSP[1.2] . FROM_MISSP_EH_MATCH[0.3] . TO_NO_BRKTS_MSFT[2.5] . FORGED_MUA_OUTLOOK[2.8] _ _ (386)
2019-07-04 18:22:22
13.73.26.123 attackspambots
3389/tcp
[2019-07-04]1pkt
2019-07-04 18:20:19

最近上报的IP列表

220.175.137.216 134.209.70.74 2a02:2f08:730f:f200:b4b1:b688:3fd:ae92 41.77.145.34
185.234.180.167 121.238.13.120 119.1.80.83 218.60.41.227
209.97.153.35 179.36.142.240 193.112.209.54 129.45.69.175
119.27.188.153 62.174.254.241 41.227.141.201 88.157.41.75
193.107.245.235 87.98.241.175 31.182.211.227 194.28.112.53