必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Republic of China (ROC)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.134.83.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.134.83.13.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 02:16:48 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
13.83.134.220.in-addr.arpa domain name pointer 220-134-83-13.hinet-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.83.134.220.in-addr.arpa	name = 220-134-83-13.hinet-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.52.152.18 attackspambots
firewall-block, port(s): 4070/tcp
2019-07-08 18:18:55
206.189.129.131 attackbotsspam
2019-07-08T08:25:55.009150abusebot-4.cloudsearch.cf sshd\[21811\]: Invalid user fake from 206.189.129.131 port 52496
2019-07-08 18:30:32
95.58.4.67 attack
Jul  8 12:05:10 cvbmail sshd\[9938\]: Invalid user admin from 95.58.4.67
Jul  8 12:05:10 cvbmail sshd\[9938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.58.4.67
Jul  8 12:05:13 cvbmail sshd\[9938\]: Failed password for invalid user admin from 95.58.4.67 port 57816 ssh2
2019-07-08 18:18:20
143.255.194.249 attackbots
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 18:26:08
201.20.42.129 attackspambots
2019-07-08T01:44:52.926492stt-1.[munged] kernel: [6596314.994494] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=201.20.42.129 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=4500 DF PROTO=TCP SPT=56682 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-08T02:00:00.226101stt-1.[munged] kernel: [6597222.291269] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=201.20.42.129 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=15791 DF PROTO=TCP SPT=64557 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-08T04:25:55.425944stt-1.[munged] kernel: [6605977.463001] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SRC=201.20.42.129 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=23291 DF PROTO=TCP SPT=62497 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0
2019-07-08 18:30:49
151.236.33.144 attackbots
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 18:25:18
79.111.123.38 attackbots
[portscan] Port scan
2019-07-08 18:05:03
210.10.210.78 attack
Jul  8 11:15:08 SilenceServices sshd[29615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.10.210.78
Jul  8 11:15:10 SilenceServices sshd[29615]: Failed password for invalid user solr from 210.10.210.78 port 34672 ssh2
Jul  8 11:17:35 SilenceServices sshd[31207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.10.210.78
2019-07-08 18:39:20
68.183.184.243 attack
68.183.184.243 - - [08/Jul/2019:10:26:58 +0200] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.184.243 - - [08/Jul/2019:10:27:00 +0200] "POST /wp-login.php HTTP/1.1" 200 1651 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.184.243 - - [08/Jul/2019:10:27:01 +0200] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.184.243 - - [08/Jul/2019:10:27:03 +0200] "POST /wp-login.php HTTP/1.1" 200 1629 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.184.243 - - [08/Jul/2019:10:27:05 +0200] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.184.243 - - [08/Jul/2019:10:27:06 +0200] "POST /wp-login.php HTTP/1.1" 200 1626 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-08 17:41:55
139.59.69.196 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-07-08 18:32:54
45.13.39.115 attackbotsspam
Jul  8 12:58:24 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
Jul  8 13:00:24 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
Jul  8 13:02:35 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
Jul  8 13:04:39 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
Jul  8 13:06:43 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
2019-07-08 18:19:32
191.252.59.247 attackspambots
Many RDP login attempts detected by IDS script
2019-07-08 17:53:21
103.28.46.109 attackbotsspam
2019-07-08 06:26:39 dovecot_login authenticator failed for 103028046109.hkserverdomain.com (XhVByXULJ) [103.28.46.109]:55467: 535 Incorrect authentication data (set_id=rhostnamevarss)
2019-07-08 06:26:49 dovecot_login authenticator failed for 103028046109.hkserverdomain.com (qMHhoTE) [103.28.46.109]:58955: 535 Incorrect authentication data (set_id=rhostnamevarss)
2019-07-08 06:27:01 dovecot_login authenticator failed for 103028046109.hkserverdomain.com (8fJceI9HEU) [103.28.46.109]:49950: 535 Incorrect authentication data (set_id=rhostnamevarss)
2019-07-08 06:27:20 dovecot_login authenticator failed for 103028046109.hkserverdomain.com (JzDiIFTAW) [103.28.46.109]:57776: 535 Incorrect authentication data (set_id=rhostnamevarss)
2019-07-08 06:27:39 dovecot_login authenticator failed for 103028046109.hkserverdomain.com (mRtfHnn) [103.28.46.109]:53665: 535 Incorrect authentication data (set_id=rhostnamevarss)
2019-07-08 06:27:59 dovecot_login authenticator failed for 103028046........
------------------------------
2019-07-08 17:38:50
37.148.82.224 attack
Jul  8 10:25:52 mailserver postfix/submission/smtpd[8235]: warning: hostname 37-148-82-224.shatel.ir does not resolve to address 37.148.82.224: hostname nor servname provided, or not known
Jul  8 10:25:52 mailserver postfix/smtps/smtpd[8233]: warning: hostname 37-148-82-224.shatel.ir does not resolve to address 37.148.82.224: hostname nor servname provided, or not known
Jul  8 10:25:52 mailserver postfix/submission/smtpd[8235]: connect from unknown[37.148.82.224]
Jul  8 10:25:52 mailserver postfix/smtps/smtpd[8233]: connect from unknown[37.148.82.224]
Jul  8 10:25:52 mailserver postfix/smtps/smtpd[8233]: SSL_accept error from unknown[37.148.82.224]: lost connection
Jul  8 10:25:52 mailserver postfix/smtps/smtpd[8233]: lost connection after CONNECT from unknown[37.148.82.224]
Jul  8 10:25:52 mailserver postfix/smtps/smtpd[8233]: disconnect from unknown[37.148.82.224]
Jul  8 10:25:52 mailserver postfix/submission/smtpd[8235]: lost connection after CONNECT from unknown[37.148.82.224]
Jul  8 10:25:52 mailserver p
2019-07-08 18:33:24
190.119.190.122 attack
Jul  8 09:16:15 *** sshd[25517]: Invalid user teste from 190.119.190.122
2019-07-08 18:22:06

最近上报的IP列表

220.133.144.62 193.163.89.116 20.223.197.101 46.214.11.2
180.76.81.2 180.76.137.183 180.76.115.138 180.76.114.155
180.76.80.32 204.188.206.4 180.76.120.247 180.76.111.8
180.76.70.132 180.76.37.178 180.76.37.228 180.76.139.37
180.76.140.81 169.229.222.193 169.229.192.245 162.215.22.190