必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kansas City

省份(region): Missouri

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.12.39.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19184
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;70.12.39.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122501 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 25 15:59:06 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
Host 130.39.12.70.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 130.39.12.70.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.37.129.235 attackbots
$f2bV_matches
2019-10-30 06:04:37
179.61.148.252 attackbotsspam
WordpressAttack
2019-10-30 05:44:35
27.5.76.20 attack
namecheap spam
2019-10-30 06:01:28
71.251.28.141 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/71.251.28.141/ 
 
 US - 1H : (240)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN701 
 
 IP : 71.251.28.141 
 
 CIDR : 71.251.0.0/19 
 
 PREFIX COUNT : 7223 
 
 UNIQUE IP COUNT : 40015360 
 
 
 ATTACKS DETECTED ASN701 :  
  1H - 1 
  3H - 2 
  6H - 3 
 12H - 6 
 24H - 13 
 
 DateTime : 2019-10-29 21:02:05 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-30 05:45:03
187.211.136.9 attackspambots
Unauthorized connection attempt from IP address 187.211.136.9 on Port 445(SMB)
2019-10-30 06:06:11
115.239.238.46 attackspam
Oct 29 20:12:40 h2177944 kernel: \[5252115.372357\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.239.238.46 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=4740 DF PROTO=TCP SPT=54287 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct 29 20:23:57 h2177944 kernel: \[5252792.086428\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.239.238.46 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=11197 DF PROTO=TCP SPT=65334 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct 29 20:36:12 h2177944 kernel: \[5253527.060048\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.239.238.46 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=30043 DF PROTO=TCP SPT=55137 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct 29 20:51:13 h2177944 kernel: \[5254428.006194\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.239.238.46 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=19298 DF PROTO=TCP SPT=50688 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Oct 29 21:02:21 h2177944 kernel: \[5255096.190545\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=115.239.238.46
2019-10-30 05:29:59
41.32.5.66 attackspambots
Automatic report - Port Scan Attack
2019-10-30 05:32:06
106.52.202.59 attackspam
invalid user
2019-10-30 05:47:31
222.186.173.183 attackbots
2019-10-29T22:32:53.211406scmdmz1 sshd\[18870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
2019-10-29T22:32:55.170041scmdmz1 sshd\[18870\]: Failed password for root from 222.186.173.183 port 17138 ssh2
2019-10-29T22:32:59.905970scmdmz1 sshd\[18870\]: Failed password for root from 222.186.173.183 port 17138 ssh2
...
2019-10-30 05:36:45
162.243.238.171 attack
Oct 27 18:34:18 mail sshd[12091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.238.171  user=r.r
Oct 27 18:34:20 mail sshd[12091]: Failed password for r.r from 162.243.238.171 port 33950 ssh2
Oct 27 18:34:20 mail sshd[12091]: Received disconnect from 162.243.238.171: 11: Bye Bye [preauth]
Oct 27 18:43:41 mail sshd[13618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.238.171  user=r.r
Oct 27 18:43:43 mail sshd[13618]: Failed password for r.r from 162.243.238.171 port 35967 ssh2
Oct 27 18:43:43 mail sshd[13618]: Received disconnect from 162.243.238.171: 11: Bye Bye [preauth]
Oct 27 18:49:34 mail sshd[14548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.238.171  user=r.r
Oct 27 18:49:35 mail sshd[14548]: Failed password for r.r from 162.243.238.171 port 56630 ssh2
Oct 27 18:49:35 mail sshd[14548]: Received disconnect from ........
-------------------------------
2019-10-30 05:41:13
213.32.65.111 attackspam
F2B jail: sshd. Time: 2019-10-29 21:01:57, Reported by: VKReport
2019-10-30 05:55:26
59.148.173.231 attackspam
2019-10-29T21:07:04.726477abusebot-2.cloudsearch.cf sshd\[4949\]: Invalid user HY\^JU\&KI\*LO\( from 59.148.173.231 port 54018
2019-10-30 05:38:41
187.103.82.97 attack
Automatic report - Port Scan Attack
2019-10-30 05:55:51
185.234.216.212 attack
2019-10-29 15:01:43 dovecot_login authenticator failed for (GUgxLJi) [185.234.216.212]:15683 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=habu@lerctr.org)
2019-10-29 15:02:00 dovecot_login authenticator failed for (dJuEujeGdD) [185.234.216.212]:24288 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=habu@lerctr.org)
2019-10-29 15:02:21 dovecot_login authenticator failed for (HCn9kjt) [185.234.216.212]:34037 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=habu@lerctr.org)
...
2019-10-30 05:30:11
2.136.131.36 attackspam
Oct 29 09:45:41 *** sshd[28847]: Failed password for invalid user test from 2.136.131.36 port 51866 ssh2
Oct 29 10:11:44 *** sshd[29324]: Failed password for invalid user irijaya from 2.136.131.36 port 58814 ssh2
Oct 29 10:27:24 *** sshd[29598]: Failed password for invalid user www from 2.136.131.36 port 46800 ssh2
Oct 29 10:35:20 *** sshd[29715]: Failed password for invalid user upload from 2.136.131.36 port 40792 ssh2
Oct 29 10:39:21 *** sshd[29819]: Failed password for invalid user sammy from 2.136.131.36 port 51908 ssh2
Oct 29 10:43:20 *** sshd[29931]: Failed password for invalid user notebook from 2.136.131.36 port 34782 ssh2
Oct 29 11:03:26 *** sshd[30285]: Failed password for invalid user jenny from 2.136.131.36 port 33886 ssh2
Oct 29 11:07:25 *** sshd[30393]: Failed password for invalid user almacen from 2.136.131.36 port 44998 ssh2
Oct 29 11:11:21 *** sshd[30504]: Failed password for invalid user sito from 2.136.131.36 port 56112 ssh2
Oct 29 11:15:19 *** sshd[30566]: Failed password for invalid user
2019-10-30 05:28:36

最近上报的IP列表

231.1.156.212 121.17.83.31 233.223.32.159 96.215.162.43
18.251.149.110 137.132.92.190 223.250.190.189 29.119.121.254
223.41.210.165 121.204.108.27 249.2.209.141 153.147.34.76
29.216.133.99 114.234.136.93 221.87.167.60 169.235.222.165
60.105.157.108 245.110.202.39 16.52.9.15 7.240.134.101