必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santa Clara

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): DigitalOcean, LLC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.230.142.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30864
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.230.142.13.			IN	A

;; AUTHORITY SECTION:
.			1329	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040402 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 05 06:52:16 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 13.142.230.157.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 13.142.230.157.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.106.147.44 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-11 15:42:59
222.64.109.33 attack
Lines containing failures of 222.64.109.33
Feb  8 19:21:56 nexus sshd[16698]: Invalid user ytf from 222.64.109.33 port 53688
Feb  8 19:21:56 nexus sshd[16698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.64.109.33
Feb  8 19:21:58 nexus sshd[16698]: Failed password for invalid user ytf from 222.64.109.33 port 53688 ssh2
Feb  8 19:21:58 nexus sshd[16698]: Received disconnect from 222.64.109.33 port 53688:11: Bye Bye [preauth]
Feb  8 19:21:58 nexus sshd[16698]: Disconnected from 222.64.109.33 port 53688 [preauth]
Feb  8 19:35:51 nexus sshd[19788]: Invalid user fmn from 222.64.109.33 port 36668
Feb  8 19:35:51 nexus sshd[19788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.64.109.33
Feb  8 19:35:53 nexus sshd[19788]: Failed password for invalid user fmn from 222.64.109.33 port 36668 ssh2
Feb  8 19:35:53 nexus sshd[19788]: Received disconnect from 222.64.109.33 port 36668:11: Bye By........
------------------------------
2020-02-11 15:44:26
185.112.249.222 attackspambots
trying to access non-authorized port
2020-02-11 15:19:02
13.125.84.116 attackbots
Feb 11 08:08:33 dedicated sshd[6670]: Invalid user cad from 13.125.84.116 port 47612
2020-02-11 15:22:40
183.89.212.235 attackspambots
2020-02-1105:55:161j1NZs-00086H-7R\<=verena@rs-solution.chH=\(localhost\)[183.89.215.114]:51870P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2555id=7D78CE9D96426CDF03064FF703285D03@rs-solution.chT="Iwouldbepleasedtoobtainyourreplyandtalkwithyou."forserquilling60@gmail.combrandation3243777@gmail.com2020-02-1105:54:211j1NYy-0007xc-Su\<=verena@rs-solution.chH=\(localhost\)[183.89.212.235]:52641P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2560id=B2B70152598DA310CCC98038CC4996EB@rs-solution.chT="\;\)bepleasedtoobtainyourreplyortalkwithme\!"formamadounouhoudiallo1@gmail.comjared_adams9@hotmail.com2020-02-1105:54:581j1NZa-0007zw-4r\<=verena@rs-solution.chH=\(localhost\)[41.129.46.35]:47405P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2595id=F7F244171CC8E655898CC57D89692FB3@rs-solution.chT="Iwouldbedelightedtoobtainyouranswerorchatwithyou"forblackmagicman10@gmail.comjh
2020-02-11 14:59:10
77.159.249.91 attackbotsspam
Automatic report - SSH Brute-Force Attack
2020-02-11 15:37:57
95.71.123.163 attackbotsspam
1581396923 - 02/11/2020 05:55:23 Host: 95.71.123.163/95.71.123.163 Port: 445 TCP Blocked
2020-02-11 15:02:34
60.190.227.167 attack
Feb 11 07:26:40 dedicated sshd[30970]: Invalid user gyy from 60.190.227.167 port 64177
2020-02-11 15:07:46
112.170.72.170 attackbots
Feb 11 04:02:09 firewall sshd[31282]: Invalid user dze from 112.170.72.170
Feb 11 04:02:11 firewall sshd[31282]: Failed password for invalid user dze from 112.170.72.170 port 37186 ssh2
Feb 11 04:05:39 firewall sshd[31423]: Invalid user ywn from 112.170.72.170
...
2020-02-11 15:39:15
177.69.52.33 attackspam
Honeypot attack, port: 445, PTR: mail.goesnicoladelli.net.
2020-02-11 15:06:14
45.225.58.5 attackbots
Honeypot attack, port: 445, PTR: 5.58.225.45.supervivo.com.br.
2020-02-11 15:01:18
41.129.46.35 attackspam
2020-02-1105:55:161j1NZs-00086H-7R\<=verena@rs-solution.chH=\(localhost\)[183.89.215.114]:51870P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2555id=7D78CE9D96426CDF03064FF703285D03@rs-solution.chT="Iwouldbepleasedtoobtainyourreplyandtalkwithyou."forserquilling60@gmail.combrandation3243777@gmail.com2020-02-1105:54:211j1NYy-0007xc-Su\<=verena@rs-solution.chH=\(localhost\)[183.89.212.235]:52641P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2560id=B2B70152598DA310CCC98038CC4996EB@rs-solution.chT="\;\)bepleasedtoobtainyourreplyortalkwithme\!"formamadounouhoudiallo1@gmail.comjared_adams9@hotmail.com2020-02-1105:54:581j1NZa-0007zw-4r\<=verena@rs-solution.chH=\(localhost\)[41.129.46.35]:47405P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2595id=F7F244171CC8E655898CC57D89692FB3@rs-solution.chT="Iwouldbedelightedtoobtainyouranswerorchatwithyou"forblackmagicman10@gmail.comjh
2020-02-11 14:58:50
45.190.220.42 attackspambots
$f2bV_matches
2020-02-11 15:13:01
144.217.243.216 attackspam
Feb 11 07:59:24 v22018076622670303 sshd\[28341\]: Invalid user iib from 144.217.243.216 port 54880
Feb 11 07:59:24 v22018076622670303 sshd\[28341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.243.216
Feb 11 07:59:26 v22018076622670303 sshd\[28341\]: Failed password for invalid user iib from 144.217.243.216 port 54880 ssh2
...
2020-02-11 15:24:37
172.104.92.168 attackspam
trying to access non-authorized port
2020-02-11 15:18:00

最近上报的IP列表

172.217.12.36 51.38.74.155 122.79.20.87 197.54.245.226
195.136.95.33 90.68.103.36 67.225.141.109 190.151.105.182
61.216.99.159 81.118.52.78 198.245.62.187 178.120.23.88
168.181.50.80 142.252.248.59 78.95.119.96 81.22.45.81
52.191.10.103 95.143.120.218 103.255.242.141 217.72.78.125