必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): Softbank BB Corp.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.19.6.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53299
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;220.19.6.130.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 11 01:15:15 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
130.6.19.220.in-addr.arpa domain name pointer softbank220019006130.bbtec.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
130.6.19.220.in-addr.arpa	name = softbank220019006130.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.85.220.193 attackbots
ssh brute force
2019-12-30 20:54:19
152.136.86.234 attack
Dec 30 08:03:53 localhost sshd\[10057\]: Invalid user chester from 152.136.86.234 port 49543
Dec 30 08:03:53 localhost sshd\[10057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.86.234
Dec 30 08:03:55 localhost sshd\[10057\]: Failed password for invalid user chester from 152.136.86.234 port 49543 ssh2
2019-12-30 20:44:55
118.25.11.204 attackbotsspam
$f2bV_matches
2019-12-30 21:03:28
45.32.171.70 attack
Automatic report - XMLRPC Attack
2019-12-30 21:16:53
23.249.168.57 attackbots
12/30/2019-07:21:38.559281 23.249.168.57 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-30 21:04:17
213.234.26.179 attackbots
Dec 30 09:03:14 server sshd\[11114\]: Invalid user saldana from 213.234.26.179
Dec 30 09:03:14 server sshd\[11114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ftp1.rlan.ru 
Dec 30 09:03:16 server sshd\[11114\]: Failed password for invalid user saldana from 213.234.26.179 port 51929 ssh2
Dec 30 09:22:04 server sshd\[15007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ftp1.rlan.ru  user=root
Dec 30 09:22:07 server sshd\[15007\]: Failed password for root from 213.234.26.179 port 36641 ssh2
...
2019-12-30 20:48:18
121.66.224.90 attackspam
SSH invalid-user multiple login try
2019-12-30 21:02:00
43.228.130.66 attackspambots
Unauthorized connection attempt from IP address 43.228.130.66 on Port 445(SMB)
2019-12-30 21:20:22
122.121.6.175 attack
1577686939 - 12/30/2019 07:22:19 Host: 122.121.6.175/122.121.6.175 Port: 445 TCP Blocked
2019-12-30 20:39:58
203.173.126.251 attackspam
Automatic report - Port Scan Attack
2019-12-30 21:11:35
27.78.12.22 attackspambots
Invalid user post from 27.78.12.22 port 41424
2019-12-30 20:59:41
37.150.117.86 attack
1577686937 - 12/30/2019 07:22:17 Host: 37.150.117.86/37.150.117.86 Port: 445 TCP Blocked
2019-12-30 20:41:51
104.131.139.147 attack
Wordpress Admin Login attack
2019-12-30 21:09:31
117.54.226.50 attackbots
Unauthorized connection attempt detected from IP address 117.54.226.50 to port 1433
2019-12-30 21:10:09
185.156.73.49 attackspambots
Dec 30 14:01:21 debian-2gb-nbg1-2 kernel: \[1363587.861577\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.49 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=23748 PROTO=TCP SPT=52865 DPT=3700 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-30 21:20:54

最近上报的IP列表

103.10.171.132 206.246.5.177 56.84.122.17 41.165.133.96
191.53.193.115 95.238.103.204 98.201.110.214 201.139.214.179
91.251.90.116 49.236.212.202 60.17.214.139 80.0.112.87
79.98.99.134 24.248.11.98 124.183.162.126 103.231.94.135
40.85.138.101 197.98.246.244 111.250.3.37 170.94.83.5