必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.130.108.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.130.108.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 22:18:08 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
144.108.130.82.in-addr.arpa domain name pointer erdw-geo-core-vpn-1-a.ethz.ch.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.108.130.82.in-addr.arpa	name = erdw-geo-core-vpn-1-a.ethz.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.165.126.138 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-23 05:56:22
78.231.63.148 attackspam
Honeypot attack, port: 23, PTR: h2s68-1-78-231-63-148.fbx.proxad.net.
2019-07-23 05:44:30
36.80.48.9 attackbotsspam
Jul 22 23:55:24 mail sshd\[30743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.80.48.9
Jul 22 23:55:26 mail sshd\[30743\]: Failed password for invalid user kelly from 36.80.48.9 port 33793 ssh2
Jul 23 00:03:30 mail sshd\[22962\]: Invalid user mt from 36.80.48.9 port 4475
Jul 23 00:03:30 mail sshd\[22962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.80.48.9
Jul 23 00:03:32 mail sshd\[22962\]: Failed password for invalid user mt from 36.80.48.9 port 4475 ssh2
2019-07-23 06:24:34
176.32.34.112 attack
123/udp 123/udp
[2019-07-22]2pkt
2019-07-23 06:15:38
202.166.172.2 attackspam
firewall-block, port(s): 445/tcp
2019-07-23 06:23:25
201.13.192.60 attack
[21/Jul/2019:03:09:52 -0400] "GET / HTTP/1.1" Chrome 51.0 UA
[21/Jul/2019:03:09:52 -0400] "GET / HTTP/1.1" Chrome 52.0 UA
2019-07-23 06:14:52
37.49.230.233 attack
22.07.2019 20:28:01 Connection to port 81 blocked by firewall
2019-07-23 06:24:16
103.129.220.42 attackbotsspam
WordPress brute force
2019-07-23 06:20:35
39.106.146.60 attackbotsspam
[21/Jul/2019:21:36:42 -0400] "PROPFIND / HTTP/1.1" Blank UA
[21/Jul/2019:21:36:43 -0400] "GET /webdav/ HTTP/1.1" "Mozilla/5.0"
2019-07-23 05:55:53
47.95.195.212 attack
www.geburtshaus-fulda.de 47.95.195.212 \[22/Jul/2019:15:11:14 +0200\] "POST /wp-login.php HTTP/1.1" 200 5790 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.geburtshaus-fulda.de 47.95.195.212 \[22/Jul/2019:15:11:19 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4106 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-23 05:42:25
187.109.52.241 attack
$f2bV_matches
2019-07-23 06:17:54
103.249.100.22 attackbots
<38>1 2019-07-22T14:00:03.051739-05:00 thebighonker.lerctr.org sshd 21002 - - Failed unknown for invalid user butter from 103.249.100.22 port 37396 ssh2
<38>1 2019-07-22T14:00:12.233888-05:00 thebighonker.lerctr.org sshd 21075 - - Failed unknown for invalid user butter from 103.249.100.22 port 41188 ssh2
<38>1 2019-07-22T14:00:17.458627-05:00 thebighonker.lerctr.org sshd 21087 - - Failed unknown for invalid user minecraft from 103.249.100.22 port 51406 ssh2
...
2019-07-23 05:59:33
213.165.94.151 attack
Jul 22 17:40:03 TORMINT sshd\[23765\]: Invalid user test from 213.165.94.151
Jul 22 17:40:03 TORMINT sshd\[23765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.165.94.151
Jul 22 17:40:05 TORMINT sshd\[23765\]: Failed password for invalid user test from 213.165.94.151 port 51274 ssh2
...
2019-07-23 05:50:29
122.228.19.79 attack
19/7/22@18:15:37: FAIL: Alarm-SSH address from=122.228.19.79
...
2019-07-23 06:26:18
139.59.5.178 attack
DATE:2019-07-22_18:26:42, IP:139.59.5.178, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-23 06:10:33

最近上报的IP列表

135.89.163.116 193.126.190.143 108.76.219.18 81.88.59.252
198.96.77.223 46.143.53.133 99.235.161.0 67.29.26.71
58.254.100.141 227.44.128.115 44.19.201.161 221.103.171.66
198.244.167.216 143.236.32.242 192.89.91.214 60.90.86.71
82.197.85.190 127.146.35.90 75.85.48.235 226.33.77.93