必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.132.164.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28356
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.132.164.41.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 06:46:14 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 41.164.132.30.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.164.132.30.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
168.121.149.0 attackbotsspam
2020-06-02 06:55:29.368597-0500  localhost smtpd[76742]: NOQUEUE: reject: RCPT from unknown[168.121.149.0]: 554 5.7.1 Service unavailable; Client host [168.121.149.0] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/168.121.149.0; from= to= proto=ESMTP helo=<[168.121.149.0]>
2020-06-03 01:25:41
31.209.21.17 attack
DATE:2020-06-02 17:43:39, IP:31.209.21.17, PORT:ssh SSH brute force auth (docker-dc)
2020-06-03 01:14:15
178.153.101.43 attackspam
Lines containing failures of 178.153.101.43
Jun  2 13:57:56 myhost sshd[11337]: User r.r from 178.153.101.43 not allowed because not listed in AllowUsers
Jun  2 13:57:56 myhost sshd[11337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.153.101.43  user=r.r
Jun  2 13:57:58 myhost sshd[11337]: Failed password for invalid user r.r from 178.153.101.43 port 56528 ssh2
Jun  2 13:57:58 myhost sshd[11337]: Received disconnect from 178.153.101.43 port 56528:11: Bye Bye [preauth]
Jun  2 13:57:58 myhost sshd[11337]: Disconnected from invalid user r.r 178.153.101.43 port 56528 [preauth]
Jun  2 14:07:09 myhost sshd[11436]: User r.r from 178.153.101.43 not allowed because not listed in AllowUsers
Jun  2 14:07:09 myhost sshd[11436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.153.101.43  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.153.101.43
2020-06-03 01:14:34
159.100.24.6 attackbots
2020-06-02 06:50:33.068067-0500  localhost smtpd[76437]: NOQUEUE: reject: RCPT from unknown[159.100.24.6]: 450 4.7.25 Client host rejected: cannot find your hostname, [159.100.24.6]; from= to= proto=ESMTP helo=<009bdd7d.hgaksj.xyz>
2020-06-03 01:26:15
23.51.123.27 attack
many attacks to my IP
2020-06-03 01:16:10
170.80.71.114 attackspam
Unauthorized connection attempt from IP address 170.80.71.114 on Port 445(SMB)
2020-06-03 01:58:08
41.225.155.74 attackbotsspam
Unauthorised access (Jun  2) SRC=41.225.155.74 LEN=52 TTL=116 ID=25531 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-03 01:52:49
152.170.65.133 attackbots
prod11
...
2020-06-03 01:46:25
94.16.117.246 attackspambots
2020-06-02T07:54:57.611468suse-nuc sshd[27315]: User root from 94.16.117.246 not allowed because listed in DenyUsers
...
2020-06-03 01:39:14
218.78.92.29 attackbots
(sshd) Failed SSH login from 218.78.92.29 (CN/China/29.92.78.218.dial.xw.sh.dynamic.163data.com.cn): 5 in the last 3600 secs
2020-06-03 01:39:44
60.167.239.99 attackspam
failed root login
2020-06-03 01:36:30
123.17.131.75 attackspambots
Unauthorized connection attempt from IP address 123.17.131.75 on Port 445(SMB)
2020-06-03 01:53:08
58.213.68.94 attackspambots
Jun  2 14:10:56 Ubuntu-1404-trusty-64-minimal sshd\[6829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.68.94  user=root
Jun  2 14:10:59 Ubuntu-1404-trusty-64-minimal sshd\[6829\]: Failed password for root from 58.213.68.94 port 51670 ssh2
Jun  2 15:03:32 Ubuntu-1404-trusty-64-minimal sshd\[24386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.68.94  user=root
Jun  2 15:03:34 Ubuntu-1404-trusty-64-minimal sshd\[24386\]: Failed password for root from 58.213.68.94 port 45490 ssh2
Jun  2 15:07:42 Ubuntu-1404-trusty-64-minimal sshd\[24081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.68.94  user=root
2020-06-03 01:23:12
185.234.216.214 attack
2020-06-02 20:36:06 dovecot_login authenticator failed for (User) [185.234.216.214]: 535 Incorrect authentication data (set_id=info1@usmancity.ru)
...
2020-06-03 01:42:42
141.98.9.161 attack
...
2020-06-03 01:46:45

最近上报的IP列表

205.15.235.83 249.240.107.223 165.142.99.37 99.206.159.121
95.16.244.111 166.218.174.229 157.57.192.248 170.186.247.156
241.218.89.91 242.110.12.27 198.31.25.18 249.69.142.169
149.56.92.31 115.39.190.130 85.113.224.117 47.241.232.72
117.144.187.182 185.149.107.227 186.130.26.186 84.94.19.113