必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Almaty

省份(region): Almaty

国家(country): Kazakhstan

运营商(isp): Kazakhtelecom

主机名(hostname): unknown

机构(organization): JSC Kazakhtelecom

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.132.130.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20195
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.132.130.19.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu May 02 19:47:00 +08 2019
;; MSG SIZE  rcvd: 116

HOST信息:
19.130.132.2.in-addr.arpa domain name pointer 2.132.130.19.megaline.telecom.kz.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
19.130.132.2.in-addr.arpa	name = 2.132.130.19.megaline.telecom.kz.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.119.213.254 attack
445/tcp
[2019-06-28]1pkt
2019-06-29 03:47:19
92.234.114.90 attack
Jun 28 18:51:51 rpi sshd\[31063\]: Invalid user sk from 92.234.114.90 port 41448
Jun 28 18:51:51 rpi sshd\[31063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.234.114.90
Jun 28 18:51:54 rpi sshd\[31063\]: Failed password for invalid user sk from 92.234.114.90 port 41448 ssh2
2019-06-29 04:00:32
189.78.31.130 attack
23/tcp
[2019-06-28]1pkt
2019-06-29 03:37:34
1.1.194.30 attack
445/tcp
[2019-06-28]1pkt
2019-06-29 03:41:07
188.166.188.152 attackspam
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"traveltocity@zohomail.eu","user_login":"traveltocityyy","wp-submit":"Register"}
2019-06-29 03:50:12
182.115.250.175 attackspambots
5500/tcp
[2019-06-28]1pkt
2019-06-29 03:29:11
199.195.251.251 attackspambots
3389BruteforceFW22
2019-06-29 03:46:51
114.45.69.245 attackbots
19/6/28@09:41:49: FAIL: IoT-Telnet address from=114.45.69.245
...
2019-06-29 03:38:49
36.229.250.175 attack
37215/tcp
[2019-06-28]1pkt
2019-06-29 03:26:35
200.89.175.103 attack
web-1 [ssh] SSH Attack
2019-06-29 03:48:53
125.212.180.169 attackspam
445/tcp
[2019-06-28]1pkt
2019-06-29 03:30:15
145.239.224.155 attack
Jun 28 15:26:42 mxgate1 postfix/postscreen[16978]: CONNECT from [145.239.224.155]:34689 to [176.31.12.44]:25
Jun 28 15:26:42 mxgate1 postfix/dnsblog[16993]: addr 145.239.224.155 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 28 15:26:42 mxgate1 postfix/dnsblog[16993]: addr 145.239.224.155 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 28 15:26:42 mxgate1 postfix/dnsblog[16992]: addr 145.239.224.155 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 28 15:26:48 mxgate1 postfix/postscreen[16978]: DNSBL rank 3 for [145.239.224.155]:34689
Jun 28 15:26:48 mxgate1 postfix/tlsproxy[17106]: CONNECT from [145.239.224.155]:34689
Jun x@x
Jun 28 15:26:48 mxgate1 postfix/postscreen[16978]: DISCONNECT [145.239.224.155]:34689
Jun 28 15:26:48 mxgate1 postfix/tlsproxy[17106]: DISCONNECT [145.239.224.155]:34689


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=145.239.224.155
2019-06-29 03:33:15
115.48.185.211 attackbots
2323/tcp
[2019-06-28]1pkt
2019-06-29 03:57:18
125.212.226.104 attackbots
Unauthorised access (Jun 28) SRC=125.212.226.104 LEN=40 TTL=237 ID=53261 TCP DPT=445 WINDOW=1024 SYN
2019-06-29 03:25:08
77.222.101.128 attackspam
445/tcp
[2019-06-28]1pkt
2019-06-29 03:53:00

最近上报的IP列表

132.104.105.208 178.35.131.251 101.249.51.56 185.24.76.175
173.177.220.207 106.39.238.158 119.2.48.42 201.1.136.142
74.29.49.135 198.101.238.71 97.138.82.209 46.60.248.72
102.165.53.51 196.135.159.219 85.143.156.121 187.137.106.27
14.161.47.128 14.28.131.20 205.235.205.68 188.131.245.112