必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Calgary

省份(region): Alberta

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Shaw Communications Inc.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.77.78.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24019
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;70.77.78.130.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052400 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 24 19:10:53 CST 2019
;; MSG SIZE  rcvd: 116

HOST信息:
130.78.77.70.in-addr.arpa domain name pointer S0106503955527cd9.cg.shawcable.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
130.78.77.70.in-addr.arpa	name = S0106503955527cd9.cg.shawcable.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.91.9.225 attack
$f2bV_matches
2020-03-31 07:53:39
47.24.177.237 attackbots
port
2020-03-31 07:37:37
180.167.243.54 attackspam
16233/tcp
[2020-03-30]1pkt
2020-03-31 07:45:21
185.125.58.129 attackbots
Mar 31 00:33:17 debian-2gb-nbg1-2 kernel: \[7866653.236137\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.125.58.129 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=55 ID=0 DF PROTO=TCP SPT=22 DPT=10592 WINDOW=29200 RES=0x00 ACK SYN URGP=0
2020-03-31 07:52:22
182.23.15.210 attackbotsspam
Icarus honeypot on github
2020-03-31 07:38:46
206.189.76.64 attack
fail2ban
2020-03-31 07:35:09
218.92.0.192 attackbotsspam
Mar 31 01:22:06 legacy sshd[22093]: Failed password for root from 218.92.0.192 port 43393 ssh2
Mar 31 01:22:08 legacy sshd[22093]: Failed password for root from 218.92.0.192 port 43393 ssh2
Mar 31 01:22:11 legacy sshd[22093]: Failed password for root from 218.92.0.192 port 43393 ssh2
...
2020-03-31 07:26:41
51.254.141.18 attack
Mar 31 00:14:44 ns382633 sshd\[22075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.141.18  user=root
Mar 31 00:14:47 ns382633 sshd\[22075\]: Failed password for root from 51.254.141.18 port 43724 ssh2
Mar 31 00:27:34 ns382633 sshd\[24685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.141.18  user=root
Mar 31 00:27:36 ns382633 sshd\[24685\]: Failed password for root from 51.254.141.18 port 35360 ssh2
Mar 31 00:34:37 ns382633 sshd\[25722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.141.18  user=root
2020-03-31 08:07:04
94.102.49.168 attackspambots
Mar 31 01:47:41 debian-2gb-nbg1-2 kernel: \[7871116.843168\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.49.168 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=25882 PROTO=TCP SPT=42606 DPT=42462 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-31 07:54:20
47.180.212.134 attackspambots
Brute-force attempt banned
2020-03-31 08:09:26
42.115.30.252 attackspambots
8080/tcp
[2020-03-30]1pkt
2020-03-31 07:26:27
116.100.77.192 attackbots
26/tcp
[2020-03-30]1pkt
2020-03-31 08:04:54
180.166.141.58 attack
Mar 31 01:41:33 debian-2gb-nbg1-2 kernel: \[7870748.521645\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=180.166.141.58 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x00 TTL=237 ID=7386 PROTO=TCP SPT=55521 DPT=5104 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-31 07:52:49
162.144.81.85 attackspam
$f2bV_matches
2020-03-31 08:08:13
66.225.225.225 attackspam
DDoS Attack or Port Scan
2020-03-31 07:48:23

最近上报的IP列表

137.50.131.36 70.131.107.198 96.253.44.34 120.181.203.69
110.22.230.116 41.194.179.25 215.105.122.225 174.225.250.12
114.26.226.130 62.40.9.18 180.158.73.74 118.0.129.199
95.219.159.47 175.233.220.234 163.120.104.76 161.150.18.138
126.4.60.66 194.62.137.133 94.89.110.214 180.79.36.151