必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.163.85.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26444
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.163.85.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 13:51:46 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 130.85.163.45.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 130.85.163.45.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.243.130.244 attackbots
512/tcp
[2020-01-31]1pkt
2020-02-01 07:31:48
189.145.156.229 attackbotsspam
1433/tcp 1433/tcp
[2020-01-31]2pkt
2020-02-01 07:14:01
222.186.175.169 attack
2020-01-31T23:14:57.453111shield sshd\[1649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2020-01-31T23:14:59.358915shield sshd\[1649\]: Failed password for root from 222.186.175.169 port 62056 ssh2
2020-01-31T23:15:02.268948shield sshd\[1649\]: Failed password for root from 222.186.175.169 port 62056 ssh2
2020-01-31T23:15:05.923801shield sshd\[1649\]: Failed password for root from 222.186.175.169 port 62056 ssh2
2020-01-31T23:15:17.759081shield sshd\[1693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2020-02-01 07:17:38
172.247.123.70 attackbots
Invalid user navneeta from 172.247.123.70 port 43632
2020-02-01 07:32:10
170.84.87.207 attackbots
445/tcp
[2020-01-31]1pkt
2020-02-01 07:25:42
190.55.63.8 attack
445/tcp 445/tcp
[2020-01-31]2pkt
2020-02-01 07:14:19
78.189.185.157 attackspam
Fail2Ban Ban Triggered
2020-02-01 07:38:44
202.190.86.225 attackspam
Abuse
2020-02-01 07:05:45
96.114.71.147 attackspam
$f2bV_matches
2020-02-01 07:14:58
125.99.173.162 attackbotsspam
Invalid user lekh from 125.99.173.162 port 49676
2020-02-01 07:29:43
128.199.218.137 attackbots
Invalid user pugal from 128.199.218.137 port 33402
2020-02-01 07:34:50
182.61.176.105 attack
frenzy
2020-02-01 07:21:38
49.88.112.65 attackspam
Jan 31 13:00:30 hanapaa sshd\[12936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Jan 31 13:00:33 hanapaa sshd\[12936\]: Failed password for root from 49.88.112.65 port 40799 ssh2
Jan 31 13:01:36 hanapaa sshd\[13022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Jan 31 13:01:37 hanapaa sshd\[13022\]: Failed password for root from 49.88.112.65 port 48832 ssh2
Jan 31 13:02:42 hanapaa sshd\[13096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
2020-02-01 07:16:15
151.41.250.171 attackbots
Jan 31 23:52:02 vps647732 sshd[21925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.41.250.171
Jan 31 23:52:04 vps647732 sshd[21925]: Failed password for invalid user postgres from 151.41.250.171 port 54200 ssh2
...
2020-02-01 07:24:19
77.42.93.82 attackspam
Automatic report - Port Scan Attack
2020-02-01 06:58:55

最近上报的IP列表

226.131.180.31 22.36.18.175 84.216.144.173 26.225.96.46
62.56.106.228 21.95.35.49 87.181.182.126 154.189.28.140
164.253.138.43 130.8.175.204 15.117.62.167 39.139.231.49
244.234.30.21 170.93.129.100 63.218.252.193 185.216.139.0
215.157.107.75 76.3.166.229 190.189.163.101 246.27.201.0