必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 26.12.130.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;26.12.130.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:25:54 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 6.130.12.26.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.130.12.26.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
13.232.57.104 attackspambots
Feb  8 07:52:38 ws24vmsma01 sshd[194336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.232.57.104
Feb  8 07:52:40 ws24vmsma01 sshd[194336]: Failed password for invalid user etw from 13.232.57.104 port 45854 ssh2
...
2020-02-08 21:10:15
202.155.216.114 attackbots
Feb  8 10:55:09 www4 sshd\[8243\]: Invalid user aui from 202.155.216.114
Feb  8 10:55:09 www4 sshd\[8243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.155.216.114
Feb  8 10:55:11 www4 sshd\[8243\]: Failed password for invalid user aui from 202.155.216.114 port 48444 ssh2
...
2020-02-08 21:21:49
112.85.42.174 attackbotsspam
Feb  8 03:31:38 wbs sshd\[25068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Feb  8 03:31:40 wbs sshd\[25068\]: Failed password for root from 112.85.42.174 port 28730 ssh2
Feb  8 03:31:53 wbs sshd\[25068\]: Failed password for root from 112.85.42.174 port 28730 ssh2
Feb  8 03:31:57 wbs sshd\[25106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Feb  8 03:31:59 wbs sshd\[25106\]: Failed password for root from 112.85.42.174 port 61851 ssh2
2020-02-08 21:34:08
62.148.142.202 attack
Feb  8 07:34:22 Tower sshd[29638]: Connection from 62.148.142.202 port 40774 on 192.168.10.220 port 22 rdomain ""
Feb  8 07:34:23 Tower sshd[29638]: Invalid user gdq from 62.148.142.202 port 40774
Feb  8 07:34:23 Tower sshd[29638]: error: Could not get shadow information for NOUSER
Feb  8 07:34:23 Tower sshd[29638]: Failed password for invalid user gdq from 62.148.142.202 port 40774 ssh2
Feb  8 07:34:23 Tower sshd[29638]: Received disconnect from 62.148.142.202 port 40774:11: Bye Bye [preauth]
Feb  8 07:34:23 Tower sshd[29638]: Disconnected from invalid user gdq 62.148.142.202 port 40774 [preauth]
2020-02-08 21:31:29
104.248.29.180 attack
Feb  7 22:31:47 home sshd[7265]: Invalid user gog from 104.248.29.180 port 40958
Feb  7 22:31:47 home sshd[7265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.29.180
Feb  7 22:31:47 home sshd[7265]: Invalid user gog from 104.248.29.180 port 40958
Feb  7 22:31:49 home sshd[7265]: Failed password for invalid user gog from 104.248.29.180 port 40958 ssh2
Feb  7 22:39:07 home sshd[7343]: Invalid user pcy from 104.248.29.180 port 54582
Feb  7 22:39:07 home sshd[7343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.29.180
Feb  7 22:39:07 home sshd[7343]: Invalid user pcy from 104.248.29.180 port 54582
Feb  7 22:39:09 home sshd[7343]: Failed password for invalid user pcy from 104.248.29.180 port 54582 ssh2
Feb  7 22:40:26 home sshd[7359]: Invalid user dob from 104.248.29.180 port 40112
Feb  7 22:40:26 home sshd[7359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.29.180
2020-02-08 21:16:08
1.196.223.50 attackspam
Feb  8 11:52:38 mout sshd[29079]: Invalid user lqr from 1.196.223.50 port 61993
2020-02-08 20:56:46
80.54.94.197 attackbots
Automatic report - Port Scan Attack
2020-02-08 21:09:52
190.98.228.54 attack
1581161213 - 02/08/2020 12:26:53 Host: 190.98.228.54/190.98.228.54 Port: 22 TCP Blocked
2020-02-08 21:23:03
87.26.0.54 attack
Honeypot attack, port: 81, PTR: host-87-26-0-54.business.telecomitalia.it.
2020-02-08 21:16:28
60.8.216.98 attack
02/08/2020-05:49:09.662431 60.8.216.98 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-08 20:58:14
216.249.110.166 attack
02/08/2020-09:45:41.864727 216.249.110.166 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-08 21:21:18
182.149.104.154 attackspam
Unauthorised access (Feb  8) SRC=182.149.104.154 LEN=52 TTL=114 ID=29189 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-08 21:07:14
1.55.78.37 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-08 21:25:13
223.14.11.211 attack
unauthorized connection attempt
2020-02-08 21:13:06
122.51.36.240 attackbots
2020-02-08T02:44:05.006122-07:00 suse-nuc sshd[27616]: Invalid user orc from 122.51.36.240 port 58720
...
2020-02-08 21:15:38

最近上报的IP列表

170.28.226.106 228.168.164.127 83.161.96.220 91.230.240.93
99.58.64.111 161.240.56.156 174.14.61.171 223.188.158.35
93.40.202.163 56.102.154.138 142.57.23.117 173.121.198.62
233.84.115.81 176.111.117.40 226.139.64.118 225.73.118.145
41.21.254.197 101.52.168.169 125.7.175.183 21.140.201.229