必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.130.161.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.130.161.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:53:31 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 13.161.130.252.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.161.130.252.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.6.159.236 attack
2019-07-29T01:07:29.247164abusebot-5.cloudsearch.cf sshd\[29609\]: Invalid user ettx123456 from 183.6.159.236 port 32327
2019-07-29 09:44:16
46.101.187.115 attackbots
2019/07/28 23:27:10 [error] 1240#1240: *974 FastCGI sent in stderr: "PHP message: [46.101.187.115] user 9had: authentication failure for "https://nihad.dk/wp-admin/": Password Mismatch" while reading response header from upstream, client: 46.101.187.115, server: nihad.dk, request: "POST /wp-login.php HTTP/1.1", upstream: "fastcgi://unix:/var/run/php-fpm-nihad.dk.sock:", host: "nihad.dk"
2019/07/28 23:27:13 [error] 1240#1240: *976 FastCGI sent in stderr: "PHP message: [46.101.187.115] user [login]: authentication failure for "https://nihad.dk/wp-admin/": Password Mismatch" while reading response header from upstream, client: 46.101.187.115, server: nihad.dk, request: "POST /xmlrpc.php HTTP/1.1", upstream: "fastcgi://unix:/var/run/php-fpm-nihad.dk.sock:", host: "nihad.dk"
...
2019-07-29 09:22:49
209.97.174.145 attack
Jul 29 02:00:49 microserver sshd[12491]: Invalid user bisexual from 209.97.174.145 port 51084
Jul 29 02:00:49 microserver sshd[12491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.174.145
Jul 29 02:00:51 microserver sshd[12491]: Failed password for invalid user bisexual from 209.97.174.145 port 51084 ssh2
Jul 29 02:05:37 microserver sshd[13506]: Invalid user dspace1 from 209.97.174.145 port 45762
Jul 29 02:05:37 microserver sshd[13506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.174.145
Jul 29 02:20:08 microserver sshd[15791]: Invalid user devtwo from 209.97.174.145 port 58044
Jul 29 02:20:08 microserver sshd[15791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.174.145
Jul 29 02:20:10 microserver sshd[15791]: Failed password for invalid user devtwo from 209.97.174.145 port 58044 ssh2
Jul 29 02:24:59 microserver sshd[17299]: Invalid user administrateur from 209
2019-07-29 09:26:42
95.111.59.210 attack
Jul 27 04:39:06 pl3server sshd[2555911]: Bad protocol version identification '' from 95.111.59.210 port 41134
Jul 27 04:39:12 pl3server sshd[2555912]: reveeclipse mapping checking getaddrinfo for ip-95-111-59-210.home.megalan.bg [95.111.59.210] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 27 04:39:12 pl3server sshd[2555912]: Invalid user nexthink from 95.111.59.210
Jul 27 04:39:12 pl3server sshd[2555912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.59.210


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=95.111.59.210
2019-07-29 09:28:10
128.199.154.85 attackbots
Jul 27 03:19:46 nandi sshd[21371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.154.85  user=r.r
Jul 27 03:19:48 nandi sshd[21371]: Failed password for r.r from 128.199.154.85 port 51520 ssh2
Jul 27 03:19:48 nandi sshd[21371]: Received disconnect from 128.199.154.85: 11: Bye Bye [preauth]
Jul 27 03:26:26 nandi sshd[24686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.154.85  user=r.r
Jul 27 03:26:28 nandi sshd[24686]: Failed password for r.r from 128.199.154.85 port 35126 ssh2
Jul 27 03:26:28 nandi sshd[24686]: Received disconnect from 128.199.154.85: 11: Bye Bye [preauth]
Jul 27 03:31:37 nandi sshd[26830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.154.85  user=r.r
Jul 27 03:31:39 nandi sshd[26830]: Failed password for r.r from 128.199.154.85 port 58676 ssh2
Jul 27 03:31:39 nandi sshd[26830]: Received disconnect from........
-------------------------------
2019-07-29 09:34:53
58.210.169.162 attackspam
2019-07-29T01:42:38.418296abusebot-2.cloudsearch.cf sshd\[30661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.169.162  user=root
2019-07-29 09:49:12
174.101.80.233 attackspam
Jul 29 03:30:24 s64-1 sshd[23087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.101.80.233
Jul 29 03:30:26 s64-1 sshd[23087]: Failed password for invalid user Password@ from 174.101.80.233 port 54150 ssh2
Jul 29 03:34:40 s64-1 sshd[23128]: Failed password for root from 174.101.80.233 port 47068 ssh2
...
2019-07-29 09:48:33
61.134.52.164 attack
Brute force attack stopped by firewall
2019-07-29 09:14:12
58.144.151.8 attackspambots
Jul 27 02:50:19 *** sshd[14228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.8  user=r.r
Jul 27 02:50:21 *** sshd[14228]: Failed password for r.r from 58.144.151.8 port 36578 ssh2
Jul 27 02:50:21 *** sshd[14228]: Received disconnect from 58.144.151.8: 11: Bye Bye [preauth]
Jul 27 03:08:48 *** sshd[16882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.8  user=r.r
Jul 27 03:08:50 *** sshd[16882]: Failed password for r.r from 58.144.151.8 port 56428 ssh2
Jul 27 03:08:51 *** sshd[16882]: Received disconnect from 58.144.151.8: 11: Bye Bye [preauth]
Jul 27 03:12:37 *** sshd[17586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.8  user=r.r
Jul 27 03:12:39 *** sshd[17586]: Failed password for r.r from 58.144.151.8 port 33076 ssh2
Jul 27 03:12:40 *** sshd[17586]: Received disconnect from 58.144.151.8: 11: Bye Bye [preaut........
-------------------------------
2019-07-29 09:57:08
128.199.249.8 attackspam
xmlrpc attack
2019-07-29 09:53:44
95.85.60.251 attackbots
Jul 26 16:13:55 eola sshd[19572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251  user=r.r
Jul 26 16:13:58 eola sshd[19572]: Failed password for r.r from 95.85.60.251 port 55574 ssh2
Jul 26 16:13:58 eola sshd[19572]: Received disconnect from 95.85.60.251 port 55574:11: Bye Bye [preauth]
Jul 26 16:13:58 eola sshd[19572]: Disconnected from 95.85.60.251 port 55574 [preauth]
Jul 26 16:21:27 eola sshd[19720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.60.251  user=r.r
Jul 26 16:21:30 eola sshd[19720]: Failed password for r.r from 95.85.60.251 port 60256 ssh2
Jul 26 16:21:30 eola sshd[19720]: Received disconnect from 95.85.60.251 port 60256:11: Bye Bye [preauth]
Jul 26 16:21:30 eola sshd[19720]: Disconnected from 95.85.60.251 port 60256 [preauth]
Jul 26 16:25:29 eola sshd[19810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.........
-------------------------------
2019-07-29 09:10:33
202.148.4.100 attackspam
Caught in portsentry honeypot
2019-07-29 09:34:28
101.36.160.50 attackbotsspam
Jul 27 04:32:23 GIZ-Server-02 sshd[2065]: User r.r from 101.36.160.50 not allowed because not listed in AllowUsers
Jul 27 04:32:23 GIZ-Server-02 sshd[2065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.160.50  user=r.r
Jul 27 04:32:25 GIZ-Server-02 sshd[2065]: Failed password for invalid user r.r from 101.36.160.50 port 60845 ssh2
Jul 27 04:32:25 GIZ-Server-02 sshd[2065]: Received disconnect from 101.36.160.50: 11: Bye Bye [preauth]
Jul 27 04:46:12 GIZ-Server-02 sshd[3077]: User r.r from 101.36.160.50 not allowed because not listed in AllowUsers
Jul 27 04:46:12 GIZ-Server-02 sshd[3077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.160.50  user=r.r
Jul 27 04:46:14 GIZ-Server-02 sshd[3077]: Failed password for invalid user r.r from 101.36.160.50 port 48233 ssh2
Jul 27 04:46:14 GIZ-Server-02 sshd[3077]: Received disconnect from 101.36.160.50: 11: Bye Bye [preauth]
Jul 27 04:........
-------------------------------
2019-07-29 09:32:24
194.55.187.3 attackspambots
Jul 29 03:26:50 eventyay sshd[16405]: Failed password for root from 194.55.187.3 port 46872 ssh2
Jul 29 03:26:54 eventyay sshd[16407]: Failed password for root from 194.55.187.3 port 34054 ssh2
...
2019-07-29 09:27:01
123.206.27.113 attack
Jul 29 00:10:03 mail sshd\[24268\]: Failed password for root from 123.206.27.113 port 50902 ssh2
Jul 29 00:27:14 mail sshd\[24588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.27.113  user=root
...
2019-07-29 09:13:38

最近上报的IP列表

185.253.161.18 215.126.242.60 225.1.68.18 15.250.244.165
204.63.205.43 12.134.217.136 187.154.16.232 178.147.182.65
156.38.136.194 126.202.209.149 107.102.220.68 118.100.73.249
82.244.242.231 184.206.12.5 4.62.232.80 147.255.114.68
168.4.84.2 251.246.234.7 186.36.238.189 143.139.206.221