必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Washington

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.228.220.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.228.220.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011700 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 16:17:02 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 130.220.228.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.220.228.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
1.54.7.165 attackbots
2019-07-07 16:58:02 1hk8c5-00031i-I4 SMTP connection from \(\[1.54.7.165\]\) \[1.54.7.165\]:33052 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 16:58:16 1hk8cK-000328-2f SMTP connection from \(\[1.54.7.165\]\) \[1.54.7.165\]:8323 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 16:58:24 1hk8cR-00032D-DH SMTP connection from \(\[1.54.7.165\]\) \[1.54.7.165\]:14741 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-06-01 21:38:34
185.85.238.244 attackspam
WordPress login attack.
2020-06-01 21:38:07
171.103.161.202 attack
Dovecot Invalid User Login Attempt.
2020-06-01 21:15:45
114.98.234.247 attackbots
2020-06-01T13:19:48.485627shield sshd\[10670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.234.247  user=root
2020-06-01T13:19:51.086645shield sshd\[10670\]: Failed password for root from 114.98.234.247 port 34160 ssh2
2020-06-01T13:21:53.434533shield sshd\[11296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.234.247  user=root
2020-06-01T13:21:54.865821shield sshd\[11296\]: Failed password for root from 114.98.234.247 port 57122 ssh2
2020-06-01T13:23:57.015408shield sshd\[11803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.98.234.247  user=root
2020-06-01 21:27:36
111.231.132.94 attackbots
Jun  1 15:13:50 ns381471 sshd[5626]: Failed password for root from 111.231.132.94 port 41892 ssh2
2020-06-01 21:31:28
222.186.169.192 attack
2020-06-01T13:19:28.971650dmca.cloudsearch.cf sshd[18646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-06-01T13:19:31.496985dmca.cloudsearch.cf sshd[18646]: Failed password for root from 222.186.169.192 port 32286 ssh2
2020-06-01T13:19:34.449013dmca.cloudsearch.cf sshd[18646]: Failed password for root from 222.186.169.192 port 32286 ssh2
2020-06-01T13:19:28.971650dmca.cloudsearch.cf sshd[18646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-06-01T13:19:31.496985dmca.cloudsearch.cf sshd[18646]: Failed password for root from 222.186.169.192 port 32286 ssh2
2020-06-01T13:19:34.449013dmca.cloudsearch.cf sshd[18646]: Failed password for root from 222.186.169.192 port 32286 ssh2
2020-06-01T13:19:28.971650dmca.cloudsearch.cf sshd[18646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user
...
2020-06-01 21:21:00
62.141.38.156 attack
Jun  1 07:32:02 server1 sshd\[828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.141.38.156  user=root
Jun  1 07:32:04 server1 sshd\[828\]: Failed password for root from 62.141.38.156 port 42556 ssh2
Jun  1 07:35:23 server1 sshd\[1815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.141.38.156  user=root
Jun  1 07:35:25 server1 sshd\[1815\]: Failed password for root from 62.141.38.156 port 38672 ssh2
Jun  1 07:38:45 server1 sshd\[2796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.141.38.156  user=root
...
2020-06-01 21:41:41
139.155.17.74 attackbotsspam
2020-06-01T07:45:08.0264921495-001 sshd[28840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.17.74  user=root
2020-06-01T07:45:10.3929881495-001 sshd[28840]: Failed password for root from 139.155.17.74 port 48870 ssh2
2020-06-01T07:48:03.1136631495-001 sshd[28950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.17.74  user=root
2020-06-01T07:48:05.3090011495-001 sshd[28950]: Failed password for root from 139.155.17.74 port 51774 ssh2
2020-06-01T07:50:23.8736611495-001 sshd[29020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.17.74  user=root
2020-06-01T07:50:26.2895091495-001 sshd[29020]: Failed password for root from 139.155.17.74 port 54650 ssh2
...
2020-06-01 21:22:49
185.143.74.49 attackspam
Jun  1 15:25:17 relay postfix/smtpd\[1947\]: warning: unknown\[185.143.74.49\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 15:26:27 relay postfix/smtpd\[22373\]: warning: unknown\[185.143.74.49\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  1 15:26:47 relay postfix/smtpd\[1183\]: warning: unknown\[185.143.74.49\]: SASL LOGIN authentication failed: VXNlcm5hbWU6
Jun  1 15:28:02 relay postfix/smtpd\[23423\]: warning: unknown\[185.143.74.49\]: SASL LOGIN authentication failed: VXNlcm5hbWU6
Jun  1 15:28:20 relay postfix/smtpd\[1196\]: warning: unknown\[185.143.74.49\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-01 21:36:46
222.186.175.216 attack
Jun  1 15:40:28 abendstille sshd\[26795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Jun  1 15:40:30 abendstille sshd\[26795\]: Failed password for root from 222.186.175.216 port 16548 ssh2
Jun  1 15:40:39 abendstille sshd\[26795\]: Failed password for root from 222.186.175.216 port 16548 ssh2
Jun  1 15:40:43 abendstille sshd\[26795\]: Failed password for root from 222.186.175.216 port 16548 ssh2
Jun  1 15:40:47 abendstille sshd\[27041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
...
2020-06-01 21:44:17
218.78.99.70 attack
Jun  1 14:27:35 vps687878 sshd\[18834\]: Failed password for root from 218.78.99.70 port 34342 ssh2
Jun  1 14:29:16 vps687878 sshd\[18922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.99.70  user=root
Jun  1 14:29:18 vps687878 sshd\[18922\]: Failed password for root from 218.78.99.70 port 57744 ssh2
Jun  1 14:31:04 vps687878 sshd\[19244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.99.70  user=root
Jun  1 14:31:07 vps687878 sshd\[19244\]: Failed password for root from 218.78.99.70 port 52902 ssh2
...
2020-06-01 21:35:07
78.199.19.89 attackbotsspam
Jun  1 18:33:25 gw1 sshd[5781]: Failed password for root from 78.199.19.89 port 47644 ssh2
...
2020-06-01 21:46:31
117.48.203.169 attackspam
Jun  1 02:36:17 web9 sshd\[23258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.203.169  user=root
Jun  1 02:36:19 web9 sshd\[23258\]: Failed password for root from 117.48.203.169 port 10252 ssh2
Jun  1 02:38:36 web9 sshd\[23642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.203.169  user=root
Jun  1 02:38:38 web9 sshd\[23642\]: Failed password for root from 117.48.203.169 port 40764 ssh2
Jun  1 02:40:44 web9 sshd\[23981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.203.169  user=root
2020-06-01 21:12:28
114.119.186.47 attack
schuetzenmusikanten.de 114.119.186.47 [01/Jun/2020:14:08:40 +0200] "POST /wp-login.php HTTP/1.1" 200 20211 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
schuetzenmusikanten.de 114.119.186.47 [01/Jun/2020:14:08:41 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-01 21:40:08
106.12.183.209 attackbots
May 31 23:52:23 serwer sshd\[15642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.209  user=root
May 31 23:52:25 serwer sshd\[15642\]: Failed password for root from 106.12.183.209 port 44072 ssh2
May 31 23:56:24 serwer sshd\[16068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.209  user=root
May 31 23:56:26 serwer sshd\[16068\]: Failed password for root from 106.12.183.209 port 43342 ssh2
Jun  1 00:00:25 serwer sshd\[16667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.209  user=root
Jun  1 00:00:27 serwer sshd\[16667\]: Failed password for root from 106.12.183.209 port 42614 ssh2
Jun  1 00:08:27 serwer sshd\[17359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.209  user=root
Jun  1 00:08:30 serwer sshd\[17359\]: Failed password for root from 106.12.183.209 
...
2020-06-01 21:30:17

最近上报的IP列表

91.158.224.78 21.102.151.71 170.136.42.254 86.185.46.74
138.105.52.105 197.132.156.0 246.206.202.21 250.175.61.145
229.154.179.89 134.71.15.169 230.130.92.72 116.235.210.201
219.235.127.75 205.101.147.210 20.165.161.241 236.59.249.240
145.57.132.207 192.193.72.53 88.70.93.120 225.93.95.24