必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.130.213.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.130.213.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:46:50 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 40.213.130.4.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.213.130.4.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
105.235.116.254 attackbots
Jun 29 06:21:02 herz-der-gamer sshd[11755]: Invalid user suporte from 105.235.116.254 port 45632
...
2019-06-29 12:39:50
49.231.222.9 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 00:32:33,972 INFO [amun_request_handler] PortScan Detected on Port: 445 (49.231.222.9)
2019-06-29 12:18:25
181.40.122.2 attack
$f2bV_matches
2019-06-29 12:17:41
1.100.173.148 attack
Jun 29 09:55:04 itv-usvr-01 sshd[5969]: Invalid user notused from 1.100.173.148
Jun 29 09:55:04 itv-usvr-01 sshd[5969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.100.173.148
Jun 29 09:55:04 itv-usvr-01 sshd[5969]: Invalid user notused from 1.100.173.148
Jun 29 09:55:07 itv-usvr-01 sshd[5969]: Failed password for invalid user notused from 1.100.173.148 port 33692 ssh2
Jun 29 10:05:01 itv-usvr-01 sshd[6344]: Invalid user chiudi from 1.100.173.148
2019-06-29 12:24:05
185.220.102.4 attackbots
Jun 29 01:14:13 vps sshd[28240]: Failed password for root from 185.220.102.4 port 39723 ssh2
Jun 29 01:14:17 vps sshd[28240]: Failed password for root from 185.220.102.4 port 39723 ssh2
Jun 29 01:14:20 vps sshd[28240]: Failed password for root from 185.220.102.4 port 39723 ssh2
Jun 29 01:14:23 vps sshd[28240]: Failed password for root from 185.220.102.4 port 39723 ssh2
...
2019-06-29 12:32:45
58.213.166.140 attackbots
Jun 29 05:18:32 MK-Soft-Root1 sshd\[1608\]: Invalid user gautier from 58.213.166.140 port 53464
Jun 29 05:18:32 MK-Soft-Root1 sshd\[1608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.166.140
Jun 29 05:18:34 MK-Soft-Root1 sshd\[1608\]: Failed password for invalid user gautier from 58.213.166.140 port 53464 ssh2
...
2019-06-29 12:32:22
107.170.192.190 attackspambots
29.06.2019 01:25:09 HTTPs access blocked by firewall
2019-06-29 12:06:44
91.185.189.220 attack
Jun 29 00:48:30 localhost sshd\[22360\]: Invalid user brady from 91.185.189.220 port 60617
Jun 29 00:48:30 localhost sshd\[22360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.185.189.220
...
2019-06-29 12:14:11
175.126.176.21 attack
Jun 29 02:53:42 pornomens sshd\[23656\]: Invalid user mar from 175.126.176.21 port 47082
Jun 29 02:53:42 pornomens sshd\[23656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.176.21
Jun 29 02:53:44 pornomens sshd\[23656\]: Failed password for invalid user mar from 175.126.176.21 port 47082 ssh2
...
2019-06-29 12:35:22
134.209.57.84 attackbots
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"traveltocity@zohomail.eu","user_login":"traveltocityyy","wp-submit":"Register"}
2019-06-29 12:23:46
125.227.236.60 attackbotsspam
Jun 29 05:36:16 giegler sshd[22877]: Invalid user energo from 125.227.236.60 port 45328
2019-06-29 12:37:04
116.98.67.88 attack
Unauthorised access (Jun 29) SRC=116.98.67.88 LEN=52 TTL=111 ID=14881 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-29 12:34:39
219.93.106.33 attackbots
Jun 29 03:43:06 XXX sshd[6537]: Invalid user ftpuser from 219.93.106.33 port 39045
2019-06-29 12:44:14
189.51.100.182 attackspambots
proto=tcp  .  spt=55058  .  dpt=25  .     (listed on Blocklist de  Jun 28)     (26)
2019-06-29 12:13:10
121.128.205.185 attack
2019-06-28T23:47:17.363725WS-Zach sshd[1377]: Invalid user lion from 121.128.205.185 port 27546
2019-06-28T23:47:17.367145WS-Zach sshd[1377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.205.185
2019-06-28T23:47:17.363725WS-Zach sshd[1377]: Invalid user lion from 121.128.205.185 port 27546
2019-06-28T23:47:20.103739WS-Zach sshd[1377]: Failed password for invalid user lion from 121.128.205.185 port 27546 ssh2
2019-06-28T23:47:43.932124WS-Zach sshd[1602]: Invalid user tomcat2 from 121.128.205.185 port 27732
...
2019-06-29 12:33:29

最近上报的IP列表

196.135.67.101 26.72.226.163 6.39.161.30 134.193.174.168
121.155.58.217 52.146.254.204 144.193.206.2 149.109.195.236
83.47.155.232 163.67.0.225 161.189.150.220 189.98.75.169
227.252.14.166 30.216.50.250 35.201.197.220 48.166.118.168
179.100.199.10 151.10.36.176 190.194.117.66 87.152.69.183