必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.130.160.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.130.160.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:17:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
18.160.130.220.in-addr.arpa domain name pointer 220-130-160-18.hinet-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.160.130.220.in-addr.arpa	name = 220-130-160-18.hinet-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.234.45.190 attackspambots
Aug 12 12:00:42 inter-technics sshd[28011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.234.45.190  user=root
Aug 12 12:00:44 inter-technics sshd[28011]: Failed password for root from 58.234.45.190 port 46269 ssh2
Aug 12 12:04:34 inter-technics sshd[28159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.234.45.190  user=root
Aug 12 12:04:36 inter-technics sshd[28159]: Failed password for root from 58.234.45.190 port 48196 ssh2
Aug 12 12:08:29 inter-technics sshd[28476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.234.45.190  user=root
Aug 12 12:08:31 inter-technics sshd[28476]: Failed password for root from 58.234.45.190 port 21971 ssh2
...
2020-08-12 19:31:20
49.149.3.205 attack
Unauthorized connection attempt from IP address 49.149.3.205 on Port 445(SMB)
2020-08-12 19:17:32
122.51.186.17 attack
Aug  9 21:14:46 mail sshd[30004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.17  user=r.r
Aug  9 21:14:47 mail sshd[30004]: Failed password for r.r from 122.51.186.17 port 51754 ssh2
Aug  9 21:14:48 mail sshd[30004]: Received disconnect from 122.51.186.17: 11: Bye Bye [preauth]
Aug  9 21:33:20 mail sshd[673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.17  user=r.r
Aug  9 21:33:23 mail sshd[673]: Failed password for r.r from 122.51.186.17 port 57664 ssh2
Aug  9 21:33:23 mail sshd[673]: Received disconnect from 122.51.186.17: 11: Bye Bye [preauth]
Aug  9 21:39:10 mail sshd[1811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.17  user=r.r
Aug  9 21:39:12 mail sshd[1811]: Failed password for r.r from 122.51.186.17 port 60968 ssh2
Aug  9 21:39:13 mail sshd[1811]: Received disconnect from 122.51.186.17: 11: Bye By........
-------------------------------
2020-08-12 19:04:01
88.249.36.53 attackspam
Automatic report - Banned IP Access
2020-08-12 19:27:32
51.158.105.98 attackspam
"$f2bV_matches"
2020-08-12 19:07:40
138.19.25.251 attack
Aug 12 04:52:25 jumpserver sshd[117337]: Failed password for root from 138.19.25.251 port 35712 ssh2
Aug 12 04:55:45 jumpserver sshd[117395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.19.25.251  user=root
Aug 12 04:55:47 jumpserver sshd[117395]: Failed password for root from 138.19.25.251 port 33283 ssh2
...
2020-08-12 19:35:56
46.72.23.62 attack
Unauthorized connection attempt from IP address 46.72.23.62 on Port 445(SMB)
2020-08-12 19:08:39
83.13.224.189 attackspambots
Lines containing failures of 83.13.224.189
Aug 12 08:38:56 keyhelp sshd[21460]: Bad protocol version identification '' from 83.13.224.189 port 45766
Aug 12 08:38:56 keyhelp sshd[21461]: Invalid user NetLinx from 83.13.224.189 port 45838
Aug 12 08:38:56 keyhelp sshd[21461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.13.224.189
Aug 12 08:38:58 keyhelp sshd[21461]: Failed password for invalid user NetLinx from 83.13.224.189 port 45838 ssh2
Aug 12 08:38:58 keyhelp sshd[21461]: Connection closed by invalid user NetLinx 83.13.224.189 port 45838 [preauth]
Aug 12 08:38:58 keyhelp sshd[21463]: Invalid user netscreen from 83.13.224.189 port 46648
Aug 12 08:38:58 keyhelp sshd[21463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.13.224.189


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=83.13.224.189
2020-08-12 19:33:33
203.220.180.209 attackbots
Port probing on unauthorized port 23
2020-08-12 18:47:33
101.80.78.96 attackspambots
Aug 12 06:48:12 jane sshd[30252]: Failed password for root from 101.80.78.96 port 51202 ssh2
...
2020-08-12 18:55:44
101.251.206.30 attackspambots
Aug 12 11:26:10 vps sshd[29425]: Failed password for root from 101.251.206.30 port 50872 ssh2
Aug 12 11:35:28 vps sshd[30021]: Failed password for root from 101.251.206.30 port 60734 ssh2
...
2020-08-12 18:55:14
182.71.134.174 attackbotsspam
Unauthorized connection attempt from IP address 182.71.134.174 on Port 445(SMB)
2020-08-12 19:34:35
196.200.181.3 attackspam
Lines containing failures of 196.200.181.3
Jul 30 23:05:36 server-name sshd[25858]: User r.r from 196.200.181.3 not allowed because not listed in AllowUsers
Jul 30 23:05:36 server-name sshd[25858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.181.3  user=r.r
Jul 30 23:05:38 server-name sshd[25858]: Failed password for invalid user r.r from 196.200.181.3 port 52280 ssh2
Jul 30 23:05:40 server-name sshd[25858]: Received disconnect from 196.200.181.3 port 52280:11: Bye Bye [preauth]
Jul 30 23:05:40 server-name sshd[25858]: Disconnected from invalid user r.r 196.200.181.3 port 52280 [preauth]
Jul 31 00:07:14 server-name sshd[28218]: User r.r from 196.200.181.3 not allowed because not listed in AllowUsers
Jul 31 00:07:14 server-name sshd[28218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.181.3  user=r.r
Jul 31 00:07:16 server-name sshd[28218]: Failed password for invalid us........
------------------------------
2020-08-12 18:56:31
113.179.17.249 attackbotsspam
1597203998 - 08/12/2020 05:46:38 Host: 113.179.17.249/113.179.17.249 Port: 445 TCP Blocked
2020-08-12 19:17:15
187.132.13.177 attack
Unauthorized connection attempt from IP address 187.132.13.177 on Port 445(SMB)
2020-08-12 19:26:27

最近上报的IP列表

19.241.10.201 180.255.74.59 221.81.201.4 12.102.109.70
64.134.250.240 211.76.126.214 219.89.47.53 12.232.124.82
185.6.17.50 94.41.184.131 25.44.26.55 22.109.129.5
106.201.154.13 33.102.254.200 154.105.37.198 62.115.106.73
252.60.193.166 143.42.242.205 18.183.82.243 164.195.24.117