必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Nacka

省份(region): Stockholms

国家(country): Sweden

运营商(isp): Telia

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.215.180.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15733
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.215.180.130.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 11:16:54 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
130.180.215.217.in-addr.arpa domain name pointer 217-215-180-130-no600.tbcn.telia.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.180.215.217.in-addr.arpa	name = 217-215-180-130-no600.tbcn.telia.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
59.126.224.38 attack
Port probing on unauthorized port 81
2020-08-13 10:11:09
157.55.39.61 attackbotsspam
Automatic report - Banned IP Access
2020-08-13 10:15:42
37.49.230.130 attackspam
port scan and connect, tcp 22 (ssh)
2020-08-13 10:02:12
104.236.234.184 attackbots
Aug 13 00:03:10 XXXXXX sshd[1549]: Invalid user alan from 104.236.234.184 port 37146
2020-08-13 09:49:47
185.147.212.8 attack
[2020-08-12 22:13:40] NOTICE[1185] chan_sip.c: Registration from '' failed for '185.147.212.8:55981' - Wrong password
[2020-08-12 22:13:40] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-12T22:13:40.571-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="6445",SessionID="0x7f10c405a408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.212.8/55981",Challenge="69c21bfc",ReceivedChallenge="69c21bfc",ReceivedHash="c0bfd1bc6a6b16e59a313c53242ba019"
[2020-08-12 22:14:09] NOTICE[1185] chan_sip.c: Registration from '' failed for '185.147.212.8:51455' - Wrong password
[2020-08-12 22:14:09] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-12T22:14:09.249-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="5472",SessionID="0x7f10c405ea98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.212.8
...
2020-08-13 10:18:51
72.186.139.38 attackspambots
Automatic report - Banned IP Access
2020-08-13 10:12:54
45.139.221.77 attackbots
From devolucao@oficinadolead.live Wed Aug 12 17:59:36 2020
Received: from cinamx2.oficinadolead.live ([45.139.221.77]:44233)
2020-08-13 09:58:19
54.38.240.23 attackspam
Aug 12 23:31:40 PorscheCustomer sshd[22511]: Failed password for root from 54.38.240.23 port 57152 ssh2
Aug 12 23:35:40 PorscheCustomer sshd[22615]: Failed password for root from 54.38.240.23 port 36572 ssh2
...
2020-08-13 09:56:41
193.112.72.251 attack
Aug 13 01:20:18 buvik sshd[26883]: Failed password for root from 193.112.72.251 port 44632 ssh2
Aug 13 01:24:05 buvik sshd[27440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.72.251  user=root
Aug 13 01:24:06 buvik sshd[27440]: Failed password for root from 193.112.72.251 port 47178 ssh2
...
2020-08-13 10:20:40
163.172.9.10 attackbotsspam
 UDP 163.172.9.10:5068 -> port 5060, len 433
2020-08-13 09:54:21
119.236.89.32 attackspambots
Aug 13 03:26:19 buvik sshd[14007]: Failed password for root from 119.236.89.32 port 34162 ssh2
Aug 13 03:29:50 buvik sshd[14382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.236.89.32  user=root
Aug 13 03:29:52 buvik sshd[14382]: Failed password for root from 119.236.89.32 port 33248 ssh2
...
2020-08-13 09:48:38
140.143.1.162 attackspam
Aug 13 00:03:06 ajax sshd[5941]: Failed password for root from 140.143.1.162 port 42898 ssh2
2020-08-13 10:05:33
189.213.19.7 attackbotsspam
Brute-Force
2020-08-13 10:20:20
202.158.62.240 attackspambots
21661/tcp 22683/tcp 11046/tcp...
[2020-06-22/08-12]141pkt,58pt.(tcp)
2020-08-13 10:01:38
99.252.190.227 attack
TCP Port Scanning
2020-08-13 10:14:04

最近上报的IP列表

238.129.162.22 192.70.202.26 30.139.252.36 55.90.30.162
137.85.92.88 18.122.121.68 65.10.218.179 234.8.68.223
18.14.206.65 62.226.63.5 235.184.103.36 195.249.5.86
241.129.65.71 61.108.98.35 206.180.23.0 232.101.71.23
219.103.162.99 161.188.187.229 56.61.69.44 152.173.53.255