必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.12.90.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6428
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.12.90.133.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 11:32:21 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 133.90.12.30.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.90.12.30.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
128.199.253.146 attackspambots
May  4 23:53:05 web1 sshd[20967]: Invalid user tracker from 128.199.253.146 port 56422
May  4 23:53:05 web1 sshd[20967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.253.146
May  4 23:53:05 web1 sshd[20967]: Invalid user tracker from 128.199.253.146 port 56422
May  4 23:53:07 web1 sshd[20967]: Failed password for invalid user tracker from 128.199.253.146 port 56422 ssh2
May  5 00:09:03 web1 sshd[25051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.253.146  user=root
May  5 00:09:06 web1 sshd[25051]: Failed password for root from 128.199.253.146 port 34978 ssh2
May  5 00:17:20 web1 sshd[27074]: Invalid user hz from 128.199.253.146 port 39247
May  5 00:17:20 web1 sshd[27074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.253.146
May  5 00:17:20 web1 sshd[27074]: Invalid user hz from 128.199.253.146 port 39247
May  5 00:17:22 web1 sshd[270
...
2020-05-05 03:11:07
222.218.17.187 attack
Automatic report - Banned IP Access
2020-05-05 03:09:23
85.209.0.221 attackspam
Port probing on unauthorized port 22
2020-05-05 02:47:25
14.29.220.142 attackspambots
May  4 14:04:02 ncomp sshd[15433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.220.142  user=root
May  4 14:04:03 ncomp sshd[15433]: Failed password for root from 14.29.220.142 port 35953 ssh2
May  4 14:08:38 ncomp sshd[15602]: Invalid user st from 14.29.220.142
2020-05-05 02:51:37
167.172.195.15 attackbotsspam
Honeypot hit.
2020-05-05 02:53:12
59.125.226.69 attackbotsspam
May  4 14:08:50 debian-2gb-nbg1-2 kernel: \[10853029.712208\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=59.125.226.69 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=50 ID=53730 PROTO=TCP SPT=42475 DPT=8080 WINDOW=11032 RES=0x00 SYN URGP=0
2020-05-05 02:39:30
206.189.231.196 attack
206.189.231.196 - - \[04/May/2020:18:05:50 +0200\] "POST /wp-login.php HTTP/1.0" 200 6052 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.231.196 - - \[04/May/2020:18:05:52 +0200\] "POST /wp-login.php HTTP/1.0" 200 5872 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.231.196 - - \[04/May/2020:18:05:54 +0200\] "POST /wp-login.php HTTP/1.0" 200 5865 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-05 03:15:57
106.75.67.48 attackbotsspam
2020-05-04 05:07:02 server sshd[38636]: Failed password for invalid user wangqiang from 106.75.67.48 port 37451 ssh2
2020-05-05 02:37:22
202.4.96.47 attackspambots
Honeypot Spam Send
2020-05-05 02:40:35
185.135.83.179 attack
185.135.83.179 - - [04/May/2020:22:37:16 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-05-05 02:59:11
124.127.206.4 attackspam
2020-05-04T15:27:16.054161vps773228.ovh.net sshd[29166]: Invalid user jagan from 124.127.206.4 port 62519
2020-05-04T15:27:16.062776vps773228.ovh.net sshd[29166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.127.206.4
2020-05-04T15:27:16.054161vps773228.ovh.net sshd[29166]: Invalid user jagan from 124.127.206.4 port 62519
2020-05-04T15:27:17.810704vps773228.ovh.net sshd[29166]: Failed password for invalid user jagan from 124.127.206.4 port 62519 ssh2
2020-05-04T15:27:54.593537vps773228.ovh.net sshd[29184]: Invalid user doris from 124.127.206.4 port 10996
...
2020-05-05 03:11:35
140.143.128.66 attackspambots
May  4 15:19:46 host sshd[39307]: Invalid user oliver from 140.143.128.66 port 36586
...
2020-05-05 03:14:48
168.232.13.210 attack
Automatic report - Banned IP Access
2020-05-05 02:48:16
118.24.140.69 attack
May  4 20:19:27 meumeu sshd[22056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.69 
May  4 20:19:29 meumeu sshd[22056]: Failed password for invalid user nicole from 118.24.140.69 port 57671 ssh2
May  4 20:25:30 meumeu sshd[22855]: Failed password for root from 118.24.140.69 port 15635 ssh2
...
2020-05-05 02:40:00
193.31.24.113 attackbotsspam
05/04/2020-20:48:31.359779 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2020-05-05 02:53:39

最近上报的IP列表

52.46.61.109 147.41.227.42 178.80.6.57 224.136.10.31
103.90.212.116 82.213.54.216 214.73.34.68 108.150.167.164
217.25.178.244 223.41.120.78 245.86.73.223 127.230.165.179
137.238.34.192 47.15.63.114 138.241.142.86 36.1.104.43
55.48.204.35 49.249.66.63 156.4.31.237 28.241.135.141