必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.21.130.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.21.130.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:37:00 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 105.130.21.189.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 189.21.130.105.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.91.157.114 attackbots
Invalid user kuangtu from 51.91.157.114 port 45194
2020-03-23 07:36:47
58.211.191.20 attackbots
Mar 22 23:17:13 ip-172-31-62-245 sshd\[16422\]: Invalid user wangxue from 58.211.191.20\
Mar 22 23:17:14 ip-172-31-62-245 sshd\[16422\]: Failed password for invalid user wangxue from 58.211.191.20 port 52606 ssh2\
Mar 22 23:20:40 ip-172-31-62-245 sshd\[16456\]: Invalid user hue from 58.211.191.20\
Mar 22 23:20:42 ip-172-31-62-245 sshd\[16456\]: Failed password for invalid user hue from 58.211.191.20 port 56990 ssh2\
Mar 22 23:24:03 ip-172-31-62-245 sshd\[16479\]: Invalid user rs from 58.211.191.20\
2020-03-23 07:50:29
171.236.232.219 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-23 08:09:49
218.92.0.191 attack
Mar 23 00:56:00 dcd-gentoo sshd[30156]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Mar 23 00:56:03 dcd-gentoo sshd[30156]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Mar 23 00:56:00 dcd-gentoo sshd[30156]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Mar 23 00:56:03 dcd-gentoo sshd[30156]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Mar 23 00:56:00 dcd-gentoo sshd[30156]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Mar 23 00:56:03 dcd-gentoo sshd[30156]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Mar 23 00:56:03 dcd-gentoo sshd[30156]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 29571 ssh2
...
2020-03-23 08:08:06
105.186.128.174 attackspambots
Automatic report - Port Scan Attack
2020-03-23 08:07:02
46.229.168.161 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 577ae878490af0d1 | WAF_Rule_ID: asn | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: unknown | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (compatible; SemrushBot/6~bl; +http://www.semrush.com/bot.html) | CF_DC: IAD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-03-23 07:53:42
112.121.158.217 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-03-23 08:10:14
93.174.93.218 attack
firewall-block, port(s): 8291/tcp
2020-03-23 08:03:01
80.211.225.143 attackspam
leo_www
2020-03-23 07:58:50
101.255.65.138 attackspam
DATE:2020-03-23 01:05:28, IP:101.255.65.138, PORT:ssh SSH brute force auth (docker-dc)
2020-03-23 08:17:32
139.219.13.163 attack
Invalid user com from 139.219.13.163 port 38504
2020-03-23 08:04:35
149.28.105.73 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-23 07:42:28
167.57.10.241 attackspam
port scan and connect, tcp 23 (telnet)
2020-03-23 07:55:31
78.157.209.196 attackbotsspam
Mar 23 00:32:00 meumeu sshd[22189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.157.209.196 
Mar 23 00:32:02 meumeu sshd[22189]: Failed password for invalid user wills from 78.157.209.196 port 56332 ssh2
Mar 23 00:36:14 meumeu sshd[22721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.157.209.196 
...
2020-03-23 07:48:20
138.204.24.16 attack
Lines containing failures of 138.204.24.16
Mar 19 00:14:55 nexus sshd[7394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.24.16  user=r.r
Mar 19 00:14:58 nexus sshd[7394]: Failed password for r.r from 138.204.24.16 port 49778 ssh2
Mar 19 00:14:58 nexus sshd[7394]: Received disconnect from 138.204.24.16 port 49778:11: Bye Bye [preauth]
Mar 19 00:14:58 nexus sshd[7394]: Disconnected from 138.204.24.16 port 49778 [preauth]
Mar 19 00:17:38 nexus sshd[7976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.24.16  user=r.r
Mar 19 00:17:40 nexus sshd[7976]: Failed password for r.r from 138.204.24.16 port 55108 ssh2
Mar 19 00:17:40 nexus sshd[7976]: Received disconnect from 138.204.24.16 port 55108:11: Bye Bye [preauth]
Mar 19 00:17:40 nexus sshd[7976]: Disconnected from 138.204.24.16 port 55108 [preauth]
Mar 19 00:20:32 nexus sshd[8591]: Invalid user eric from 138.204.24.16 port 24........
------------------------------
2020-03-23 07:44:08

最近上报的IP列表

253.58.104.175 93.93.254.75 180.160.4.118 51.90.28.18
179.210.152.33 254.119.73.52 39.24.167.196 142.188.129.241
127.172.183.141 106.245.86.53 43.92.169.200 223.23.4.77
217.124.242.226 103.213.88.158 88.106.85.18 172.171.50.14
43.161.8.187 240.185.239.24 47.87.25.70 219.234.155.204