必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Multicast Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 230.30.52.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;230.30.52.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 00:07:26 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 134.52.30.230.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.52.30.230.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.131 attackbotsspam
Dec 18 09:41:55 mail sshd\[5093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.131  user=root
Dec 18 09:41:57 mail sshd\[5093\]: Failed password for root from 218.92.0.131 port 26718 ssh2
Dec 18 09:42:00 mail sshd\[5093\]: Failed password for root from 218.92.0.131 port 26718 ssh2
...
2019-12-18 17:01:42
129.205.112.253 attack
Dec 17 22:56:09 kapalua sshd\[17753\]: Invalid user pcap from 129.205.112.253
Dec 17 22:56:09 kapalua sshd\[17753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.112.253
Dec 17 22:56:10 kapalua sshd\[17753\]: Failed password for invalid user pcap from 129.205.112.253 port 60756 ssh2
Dec 17 23:03:27 kapalua sshd\[18501\]: Invalid user humphreys from 129.205.112.253
Dec 17 23:03:27 kapalua sshd\[18501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.112.253
2019-12-18 17:06:57
58.221.60.145 attack
Dec 18 07:10:56 ns382633 sshd\[19510\]: Invalid user qomo from 58.221.60.145 port 34110
Dec 18 07:10:56 ns382633 sshd\[19510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.60.145
Dec 18 07:10:58 ns382633 sshd\[19510\]: Failed password for invalid user qomo from 58.221.60.145 port 34110 ssh2
Dec 18 07:31:22 ns382633 sshd\[22970\]: Invalid user nrpe from 58.221.60.145 port 50871
Dec 18 07:31:22 ns382633 sshd\[22970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.60.145
2019-12-18 16:56:54
122.51.83.60 attackbots
Dec 18 07:21:23 srv01 sshd[25623]: Invalid user cn from 122.51.83.60 port 38984
Dec 18 07:21:23 srv01 sshd[25623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.60
Dec 18 07:21:23 srv01 sshd[25623]: Invalid user cn from 122.51.83.60 port 38984
Dec 18 07:21:25 srv01 sshd[25623]: Failed password for invalid user cn from 122.51.83.60 port 38984 ssh2
Dec 18 07:28:48 srv01 sshd[26233]: Invalid user khoanh from 122.51.83.60 port 39318
...
2019-12-18 16:53:30
221.216.212.35 attackbotsspam
Dec 17 11:52:36 server sshd\[7059\]: Failed password for invalid user backup from 221.216.212.35 port 59540 ssh2
Dec 18 09:19:46 server sshd\[17332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.216.212.35  user=root
Dec 18 09:19:48 server sshd\[17332\]: Failed password for root from 221.216.212.35 port 15496 ssh2
Dec 18 09:28:45 server sshd\[20037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.216.212.35  user=root
Dec 18 09:28:46 server sshd\[20037\]: Failed password for root from 221.216.212.35 port 46160 ssh2
...
2019-12-18 16:54:51
218.146.168.239 attack
Dec 18 09:32:36 MK-Soft-VM5 sshd[12780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.146.168.239 
Dec 18 09:32:38 MK-Soft-VM5 sshd[12780]: Failed password for invalid user mysql from 218.146.168.239 port 49710 ssh2
...
2019-12-18 16:37:59
222.186.175.216 attack
Dec 18 09:44:53 [host] sshd[29822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Dec 18 09:44:55 [host] sshd[29822]: Failed password for root from 222.186.175.216 port 55610 ssh2
Dec 18 09:44:59 [host] sshd[29822]: Failed password for root from 222.186.175.216 port 55610 ssh2
2019-12-18 16:45:31
187.58.51.42 attack
Honeypot attack, port: 23, PTR: 187.58.51.42.static.host.gvt.net.br.
2019-12-18 16:37:33
107.170.255.24 attackspam
Invalid user database02 from 107.170.255.24 port 39748
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.255.24
Failed password for invalid user database02 from 107.170.255.24 port 39748 ssh2
Invalid user collado from 107.170.255.24 port 44523
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.255.24
2019-12-18 17:04:06
122.228.19.80 attackbots
122.228.19.80 was recorded 84 times by 22 hosts attempting to connect to the following ports: 37,9000,9295,119,1604,1400,3299,8081,8090,50070,110,21,32400,2628,8010,69,6697,2152,4343,28017,3000,79,8004,789,6000,389,84,995,3268,12000,1025,8888,2123,37778,27036,4786,8069,5985,520,9999,4899,8086,4040,82,3050,5683,27016,9100,179,3351,11211,17,9200,1194,40000,1022,7779,27015,8140,17185,8060,2181,8005,5038,7,2379,64738,8088,1311,1080,4800,9080. Incident counter (4h, 24h, all-time): 84, 513, 20324
2019-12-18 16:33:31
122.219.108.171 attack
Dec 17 21:01:56 php1 sshd\[20259\]: Invalid user nate from 122.219.108.171
Dec 17 21:01:56 php1 sshd\[20259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.219.108.171
Dec 17 21:01:58 php1 sshd\[20259\]: Failed password for invalid user nate from 122.219.108.171 port 33156 ssh2
Dec 17 21:08:35 php1 sshd\[20869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.219.108.171  user=root
Dec 17 21:08:37 php1 sshd\[20869\]: Failed password for root from 122.219.108.171 port 41722 ssh2
2019-12-18 16:43:16
68.183.124.53 attackbots
Dec 18 06:56:49 game-panel sshd[18263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53
Dec 18 06:56:50 game-panel sshd[18263]: Failed password for invalid user www from 68.183.124.53 port 59352 ssh2
Dec 18 07:02:29 game-panel sshd[18507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53
2019-12-18 17:10:42
92.222.92.64 attackspambots
Dec 18 09:39:40 eventyay sshd[26150]: Failed password for root from 92.222.92.64 port 54548 ssh2
Dec 18 09:44:53 eventyay sshd[26317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.92.64
Dec 18 09:44:55 eventyay sshd[26317]: Failed password for invalid user graw from 92.222.92.64 port 35970 ssh2
...
2019-12-18 17:08:23
5.135.72.183 attack
12/18/2019-01:29:04.681542 5.135.72.183 Protocol: 17 ET SCAN Sipvicious Scan
2019-12-18 16:36:21
4.78.193.226 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-18 16:44:09

最近上报的IP列表

101.167.237.149 23.102.117.5 181.228.58.4 33.189.55.252
95.32.42.30 141.160.147.163 145.206.236.185 115.203.211.144
245.141.122.161 33.64.169.214 163.49.50.70 180.43.43.75
146.239.4.224 127.50.197.89 128.13.222.191 135.121.111.237
219.210.190.146 54.57.232.83 160.200.206.158 202.245.239.71