必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): DigitalOcean LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
157.245.52.41 attackbotsspam
xmlrpc attack
2020-04-08 05:19:39
157.245.52.27 attackspambots
Unauthorized connection attempt detected from IP address 157.245.52.27 to port 2220 [J]
2020-01-25 01:30:38
157.245.52.4 attackbots
10.12.2019 06:15:29 Connection to port 53 blocked by firewall
2019-12-10 15:10:28
157.245.52.193 attackbotsspam
Nov 25 07:59:29 MK-Soft-VM4 sshd[550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.52.193 
Nov 25 07:59:31 MK-Soft-VM4 sshd[550]: Failed password for invalid user wakabayashi from 157.245.52.193 port 37998 ssh2
...
2019-11-25 20:35:34
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.245.52.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.245.52.130.			IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021802 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 03:11:34 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
130.52.245.157.in-addr.arpa domain name pointer sto.btcard.biz.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.52.245.157.in-addr.arpa	name = sto.btcard.biz.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
144.217.80.80 attack
01/22/2020-18:14:08.781639 144.217.80.80 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 11
2020-01-23 14:51:05
200.122.90.11 attackbotsspam
proto=tcp  .  spt=39736  .  dpt=25  .     Found on   Dark List de      (349)
2020-01-23 15:15:55
222.186.180.17 attack
Jan 23 07:52:08 jane sshd[22440]: Failed password for root from 222.186.180.17 port 18008 ssh2
Jan 23 07:52:12 jane sshd[22440]: Failed password for root from 222.186.180.17 port 18008 ssh2
...
2020-01-23 14:53:08
211.23.125.95 attackspam
Jan 16 11:48:32 host sshd[31196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-23-125-95.hinet-ip.hinet.net  user=root
Jan 16 11:48:33 host sshd[31196]: Failed password for root from 211.23.125.95 port 34130 ssh2
...
2020-01-23 15:23:17
165.22.109.173 attackbotsspam
Unauthorized connection attempt detected from IP address 165.22.109.173 to port 2220 [J]
2020-01-23 14:49:10
192.99.58.112 attack
192.99.58.112 - - \[22/Jan/2020:18:13:00 +0100\] "POST /wp-login.php HTTP/1.0" 200 7556 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
192.99.58.112 - - \[22/Jan/2020:18:13:04 +0100\] "POST /wp-login.php HTTP/1.0" 200 7381 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
192.99.58.112 - - \[22/Jan/2020:18:13:07 +0100\] "POST /wp-login.php HTTP/1.0" 200 7376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-23 15:23:37
89.212.162.78 attack
SSH invalid-user multiple login attempts
2020-01-23 15:17:15
41.155.203.100 attackspambots
Fail2Ban Ban Triggered
2020-01-23 14:59:02
111.230.223.94 attackbotsspam
Unauthorized connection attempt detected from IP address 111.230.223.94 to port 2220 [J]
2020-01-23 15:22:55
222.186.175.167 attack
Failed password for root from 222.186.175.167 port 48286 ssh2
Failed password for root from 222.186.175.167 port 48286 ssh2
Failed password for root from 222.186.175.167 port 48286 ssh2
Failed password for root from 222.186.175.167 port 48286 ssh2
2020-01-23 15:29:53
202.116.237.20 attack
Unauthorized connection attempt detected from IP address 202.116.237.20 to port 2220 [J]
2020-01-23 15:22:40
23.129.64.159 attackbotsspam
01/22/2020-18:13:08.827850 23.129.64.159 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 58
2020-01-23 15:27:16
94.41.206.89 attackbots
Unauthorised access (Jan 22) SRC=94.41.206.89 LEN=52 TTL=120 ID=2428 DF TCP DPT=1433 WINDOW=8192 SYN
2020-01-23 15:32:23
86.101.129.22 attack
proto=tcp  .  spt=60254  .  dpt=25  .     Found on   Dark List de      (352)
2020-01-23 15:10:05
49.235.213.48 attack
Invalid user ftpadmin from 49.235.213.48 port 38074
2020-01-23 15:14:03

最近上报的IP列表

122.222.187.211 176.63.166.4 47.76.50.73 68.217.154.199
232.249.215.106 133.241.108.28 47.9.15.150 146.248.169.189
250.100.15.85 239.25.207.59 225.113.54.45 79.231.183.95
185.2.33.164 195.205.163.198 188.234.184.251 19.217.247.99
141.201.61.115 185.243.53.78 139.48.232.51 201.186.49.246