必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.130.168.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;253.130.168.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:27:12 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 242.168.130.253.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.168.130.253.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.166.1.227 attack
2019-08-20T04:21:25.247168abusebot-4.cloudsearch.cf sshd\[20487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.1.227  user=root
2019-08-20 12:24:17
87.216.176.56 attackbotsspam
Automatic report - Port Scan Attack
2019-08-20 12:14:20
192.169.232.246 attack
xmlrpc attack
2019-08-20 11:35:53
157.230.110.11 attackbots
Aug 20 03:46:35 *** sshd[12936]: Invalid user usuario from 157.230.110.11
2019-08-20 11:58:07
152.136.116.121 attackspambots
Aug 20 11:05:53 itv-usvr-01 sshd[15136]: Invalid user oracle from 152.136.116.121
Aug 20 11:05:53 itv-usvr-01 sshd[15136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.116.121
Aug 20 11:05:53 itv-usvr-01 sshd[15136]: Invalid user oracle from 152.136.116.121
Aug 20 11:05:54 itv-usvr-01 sshd[15136]: Failed password for invalid user oracle from 152.136.116.121 port 52692 ssh2
Aug 20 11:11:34 itv-usvr-01 sshd[15500]: Invalid user cora from 152.136.116.121
2019-08-20 12:15:30
222.141.112.139 attackspam
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-08-20 12:24:56
159.65.46.224 attackbotsspam
Aug 19 23:38:00 xtremcommunity sshd\[30715\]: Invalid user standort from 159.65.46.224 port 39226
Aug 19 23:38:00 xtremcommunity sshd\[30715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.46.224
Aug 19 23:38:02 xtremcommunity sshd\[30715\]: Failed password for invalid user standort from 159.65.46.224 port 39226 ssh2
Aug 19 23:42:03 xtremcommunity sshd\[30977\]: Invalid user dancer from 159.65.46.224 port 56652
Aug 19 23:42:03 xtremcommunity sshd\[30977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.46.224
...
2019-08-20 11:44:39
37.221.106.45 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-20 12:17:42
121.69.135.162 attack
Aug 19 20:48:02 hcbbdb sshd\[17397\]: Invalid user manish from 121.69.135.162
Aug 19 20:48:02 hcbbdb sshd\[17397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.135.162
Aug 19 20:48:04 hcbbdb sshd\[17397\]: Failed password for invalid user manish from 121.69.135.162 port 41726 ssh2
Aug 19 20:49:31 hcbbdb sshd\[17549\]: Invalid user sgt from 121.69.135.162
Aug 19 20:49:31 hcbbdb sshd\[17549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.135.162
2019-08-20 11:40:43
152.136.87.219 attackspam
2019-08-20T05:38:20.986197  sshd[10988]: Invalid user rock from 152.136.87.219 port 54836
2019-08-20T05:38:21.001279  sshd[10988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.87.219
2019-08-20T05:38:20.986197  sshd[10988]: Invalid user rock from 152.136.87.219 port 54836
2019-08-20T05:38:22.876483  sshd[10988]: Failed password for invalid user rock from 152.136.87.219 port 54836 ssh2
2019-08-20T05:43:24.151236  sshd[11055]: Invalid user ubuntu from 152.136.87.219 port 43692
...
2019-08-20 12:03:11
128.106.197.150 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-19 17:09:07,504 INFO [amun_request_handler] PortScan Detected on Port: 445 (128.106.197.150)
2019-08-20 11:42:14
68.183.106.84 attack
SSH 15 Failed Logins
2019-08-20 12:06:33
117.185.62.146 attackbots
Aug 20 05:42:03 icinga sshd[19778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.185.62.146
Aug 20 05:42:05 icinga sshd[19778]: Failed password for invalid user testuser from 117.185.62.146 port 50156 ssh2
...
2019-08-20 12:02:48
103.207.11.7 attack
Aug 19 19:56:11 MK-Soft-VM3 sshd\[9806\]: Invalid user sammy from 103.207.11.7 port 33558
Aug 19 19:56:11 MK-Soft-VM3 sshd\[9806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.7
Aug 19 19:56:14 MK-Soft-VM3 sshd\[9806\]: Failed password for invalid user sammy from 103.207.11.7 port 33558 ssh2
...
2019-08-20 12:10:49
70.82.54.251 attackbots
Aug 20 07:07:13 yabzik sshd[10529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.82.54.251
Aug 20 07:07:15 yabzik sshd[10529]: Failed password for invalid user uftp from 70.82.54.251 port 47644 ssh2
Aug 20 07:11:30 yabzik sshd[12019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.82.54.251
2019-08-20 12:19:07

最近上报的IP列表

185.84.198.211 202.104.35.225 108.195.5.175 206.254.247.127
204.109.234.126 34.126.221.211 231.52.129.26 116.28.46.79
83.12.204.109 224.227.38.18 163.133.187.47 87.166.62.51
164.165.55.71 180.94.113.91 43.154.183.230 214.55.237.104
230.144.139.227 157.124.141.133 80.157.125.72 144.76.30.56