必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.130.0.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38891
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.130.0.101.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120800 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 21:49:00 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
Host 101.0.130.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 101.0.130.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.48.189.70 attack
Lines containing failures of 181.48.189.70
Nov 15 03:46:48 shared05 sshd[25386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.189.70  user=r.r
Nov 15 03:46:51 shared05 sshd[25386]: Failed password for r.r from 181.48.189.70 port 38554 ssh2
Nov 15 03:46:51 shared05 sshd[25386]: Received disconnect from 181.48.189.70 port 38554:11: Bye Bye [preauth]
Nov 15 03:46:51 shared05 sshd[25386]: Disconnected from authenticating user r.r 181.48.189.70 port 38554 [preauth]
Nov 15 03:51:05 shared05 sshd[26740]: Invalid user guest from 181.48.189.70 port 60790
Nov 15 03:51:05 shared05 sshd[26740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.189.70


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.48.189.70
2019-11-16 22:19:59
200.29.98.197 attackspam
Brute-force attempt banned
2019-11-16 22:03:25
46.101.226.14 attackspambots
46.101.226.14 - - \[16/Nov/2019:06:17:04 +0000\] "POST /wp/wp-login.php HTTP/1.1" 200 4205 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
46.101.226.14 - - \[16/Nov/2019:06:17:05 +0000\] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-16 22:16:52
49.149.129.249 attackbots
Unauthorized connection attempt from IP address 49.149.129.249 on Port 445(SMB)
2019-11-16 22:24:40
45.94.232.100 attackbotsspam
Automatic report - Banned IP Access
2019-11-16 22:29:16
178.33.233.54 attack
Invalid user dnavitys from 178.33.233.54 port 43341
2019-11-16 22:03:51
14.161.16.62 attackspambots
Brute force SMTP login attempted.
...
2019-11-16 22:34:10
112.175.150.13 attackspam
Nov 16 08:51:37 vps58358 sshd\[24574\]: Invalid user bulin from 112.175.150.13Nov 16 08:51:39 vps58358 sshd\[24574\]: Failed password for invalid user bulin from 112.175.150.13 port 42110 ssh2Nov 16 08:56:30 vps58358 sshd\[24591\]: Invalid user oswaldo from 112.175.150.13Nov 16 08:56:32 vps58358 sshd\[24591\]: Failed password for invalid user oswaldo from 112.175.150.13 port 32875 ssh2Nov 16 09:01:19 vps58358 sshd\[24600\]: Invalid user penelope from 112.175.150.13Nov 16 09:01:21 vps58358 sshd\[24600\]: Failed password for invalid user penelope from 112.175.150.13 port 51879 ssh2
...
2019-11-16 22:22:07
91.132.86.175 attackspam
X-Original-Sender: christen@techtimes2.co
2019-11-16 21:56:54
200.164.217.210 attackbots
(sshd) Failed SSH login from 200.164.217.210 (-): 5 in the last 3600 secs
2019-11-16 22:17:38
120.132.114.103 attack
$f2bV_matches
2019-11-16 22:25:09
139.59.94.225 attackspam
(sshd) Failed SSH login from 139.59.94.225 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 16 13:35:09 elude sshd[18997]: Invalid user benjami from 139.59.94.225 port 49240
Nov 16 13:35:11 elude sshd[18997]: Failed password for invalid user benjami from 139.59.94.225 port 49240 ssh2
Nov 16 13:47:50 elude sshd[20935]: Invalid user named from 139.59.94.225 port 47998
Nov 16 13:47:52 elude sshd[20935]: Failed password for invalid user named from 139.59.94.225 port 47998 ssh2
Nov 16 13:51:56 elude sshd[21526]: Invalid user marita from 139.59.94.225 port 56550
2019-11-16 22:11:56
117.198.97.175 attackspam
Unauthorized connection attempt from IP address 117.198.97.175 on Port 445(SMB)
2019-11-16 22:12:38
129.126.130.196 attackspam
Nov 16 14:17:47 www_kotimaassa_fi sshd[12864]: Failed password for root from 129.126.130.196 port 57444 ssh2
...
2019-11-16 22:23:49
51.38.234.54 attack
Nov 16 14:02:43 ks10 sshd[24393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.234.54 
Nov 16 14:02:46 ks10 sshd[24393]: Failed password for invalid user oslund from 51.38.234.54 port 43284 ssh2
...
2019-11-16 21:57:28

最近上报的IP列表

196.150.197.55 219.209.233.125 21.26.192.243 129.179.159.240
208.250.63.220 198.104.181.81 82.87.171.22 179.38.254.243
104.200.14.64 224.184.173.84 92.166.169.128 130.163.103.0
227.231.183.218 189.125.6.133 84.106.82.91 81.196.21.175
16.196.141.174 57.172.40.113 135.47.166.69 65.50.101.214