必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.145.16.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20762
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.145.16.159.			IN	A

;; AUTHORITY SECTION:
.			122	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 22:52:10 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 159.16.145.0.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.16.145.0.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.248.4.90 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-09-2019 19:20:19.
2019-09-21 04:30:54
77.247.109.33 attack
VoIP Brute Force - 77.247.109.33 - Auto Report
...
2019-09-21 04:37:34
37.187.192.162 attack
Sep 20 10:33:37 hiderm sshd\[1751\]: Invalid user devecot123 from 37.187.192.162
Sep 20 10:33:37 hiderm sshd\[1751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-37-187-192.eu
Sep 20 10:33:39 hiderm sshd\[1751\]: Failed password for invalid user devecot123 from 37.187.192.162 port 35278 ssh2
Sep 20 10:38:00 hiderm sshd\[2120\]: Invalid user a1a1a1 from 37.187.192.162
Sep 20 10:38:00 hiderm sshd\[2120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-37-187-192.eu
2019-09-21 04:49:54
116.202.25.162 attack
Sep 20 15:53:05 vps200512 sshd\[7801\]: Invalid user lighttpd from 116.202.25.162
Sep 20 15:53:05 vps200512 sshd\[7801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.202.25.162
Sep 20 15:53:07 vps200512 sshd\[7801\]: Failed password for invalid user lighttpd from 116.202.25.162 port 45160 ssh2
Sep 20 15:57:11 vps200512 sshd\[7917\]: Invalid user qmaill from 116.202.25.162
Sep 20 15:57:11 vps200512 sshd\[7917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.202.25.162
2019-09-21 04:25:13
114.32.23.249 attack
2019-09-21T03:04:22.573387enmeeting.mahidol.ac.th sshd\[26444\]: Invalid user tmps from 114.32.23.249 port 40802
2019-09-21T03:04:22.592517enmeeting.mahidol.ac.th sshd\[26444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-32-23-249.hinet-ip.hinet.net
2019-09-21T03:04:24.466457enmeeting.mahidol.ac.th sshd\[26444\]: Failed password for invalid user tmps from 114.32.23.249 port 40802 ssh2
...
2019-09-21 04:41:08
200.34.227.145 attackspam
Sep 20 10:12:04 lcdev sshd\[12281\]: Invalid user shrenik from 200.34.227.145
Sep 20 10:12:04 lcdev sshd\[12281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.34.227.145
Sep 20 10:12:06 lcdev sshd\[12281\]: Failed password for invalid user shrenik from 200.34.227.145 port 51842 ssh2
Sep 20 10:16:39 lcdev sshd\[12657\]: Invalid user qf from 200.34.227.145
Sep 20 10:16:39 lcdev sshd\[12657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.34.227.145
2019-09-21 04:26:55
194.0.148.11 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 20-09-2019 19:20:24.
2019-09-21 04:23:28
197.43.224.249 attack
Unauthorised access (Sep 20) SRC=197.43.224.249 LEN=40 TTL=51 ID=35112 TCP DPT=23 WINDOW=27506 SYN
2019-09-21 04:45:29
185.127.25.192 attack
Sep 20 23:12:28 *** sshd[32215]: Failed password for invalid user about from 185.127.25.192 port 60512 ssh2
Sep 20 23:12:31 *** sshd[32215]: Failed password for invalid user about from 185.127.25.192 port 60512 ssh2
Sep 20 23:12:33 *** sshd[32215]: Failed password for invalid user about from 185.127.25.192 port 60512 ssh2
Sep 20 23:12:35 *** sshd[32215]: Failed password for invalid user about from 185.127.25.192 port 60512 ssh2
Sep 20 23:12:38 *** sshd[32215]: Failed password for invalid user about from 185.127.25.192 port 60512 ssh2
Sep 20 23:12:42 *** sshd[32215]: Failed password for invalid user about from 185.127.25.192 port 60512 ssh2
2019-09-21 04:28:56
84.201.255.221 attackspambots
Sep 20 22:47:33 localhost sshd\[26312\]: Invalid user aurorapq from 84.201.255.221 port 43341
Sep 20 22:47:33 localhost sshd\[26312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.255.221
Sep 20 22:47:35 localhost sshd\[26312\]: Failed password for invalid user aurorapq from 84.201.255.221 port 43341 ssh2
2019-09-21 04:54:13
211.152.62.14 attackspam
Sep 20 20:50:07 s64-1 sshd[7655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.152.62.14
Sep 20 20:50:09 s64-1 sshd[7655]: Failed password for invalid user vps from 211.152.62.14 port 41032 ssh2
Sep 20 20:55:11 s64-1 sshd[7773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.152.62.14
...
2019-09-21 04:38:19
103.102.192.106 attackbotsspam
Sep 20 10:00:04 wbs sshd\[29586\]: Invalid user germain from 103.102.192.106
Sep 20 10:00:04 wbs sshd\[29586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.102.192.106
Sep 20 10:00:06 wbs sshd\[29586\]: Failed password for invalid user germain from 103.102.192.106 port 11557 ssh2
Sep 20 10:04:26 wbs sshd\[29976\]: Invalid user 123456 from 103.102.192.106
Sep 20 10:04:26 wbs sshd\[29976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.102.192.106
2019-09-21 04:15:45
115.47.153.120 attack
Sep 20 21:35:26 markkoudstaal sshd[19933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.47.153.120
Sep 20 21:35:29 markkoudstaal sshd[19933]: Failed password for invalid user xx from 115.47.153.120 port 48895 ssh2
Sep 20 21:39:38 markkoudstaal sshd[20372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.47.153.120
2019-09-21 04:53:58
187.178.6.238 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-09-2019 19:20:21.
2019-09-21 04:28:04
185.209.0.48 attack
RDP-Bruteforce | Cancer2Ban-Autoban for Windows (see: https://github.com/Zeziroth/Cancer2Ban)
2019-09-21 04:34:56

最近上报的IP列表

0.145.250.194 0.145.65.26 0.145.188.202 0.142.46.26
0.144.111.139 0.143.210.29 0.143.221.229 0.15.116.78
0.144.153.211 0.141.158.176 0.14.15.247 0.139.9.72
0.14.84.150 0.139.136.191 0.137.79.32 0.128.231.24
0.129.106.163 0.129.146.133 0.128.44.249 0.129.174.189