必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.20.245.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27031
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.20.245.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 18:52:49 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 30.245.20.101.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.245.20.101.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.31.105.198 attackbotsspam
Oct 19 11:54:05 localhost sshd\[33198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.105.198  user=root
Oct 19 11:54:06 localhost sshd\[33198\]: Failed password for root from 116.31.105.198 port 42152 ssh2
Oct 19 11:59:30 localhost sshd\[33656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.105.198  user=root
Oct 19 11:59:32 localhost sshd\[33656\]: Failed password for root from 116.31.105.198 port 51228 ssh2
Oct 19 12:04:49 localhost sshd\[33806\]: Invalid user com@123 from 116.31.105.198 port 60312
Oct 19 12:04:49 localhost sshd\[33806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.105.198
...
2019-10-19 20:52:52
45.70.167.248 attackspambots
Oct 19 13:44:03 vpn01 sshd[32305]: Failed password for root from 45.70.167.248 port 46154 ssh2
...
2019-10-19 21:02:13
167.114.68.159 attack
Triggered by Fail2Ban at Vostok web server
2019-10-19 20:37:41
39.105.160.239 attackbots
Automatic report - Banned IP Access
2019-10-19 21:02:36
217.182.196.178 attackbots
Oct 17 13:30:15 xb0 sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.196.178  user=r.r
Oct 17 13:30:17 xb0 sshd[2127]: Failed password for r.r from 217.182.196.178 port 60824 ssh2
Oct 17 13:30:17 xb0 sshd[2127]: Received disconnect from 217.182.196.178: 11: Bye Bye [preauth]
Oct 17 13:39:29 xb0 sshd[18915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.196.178  user=r.r
Oct 17 13:39:31 xb0 sshd[18915]: Failed password for r.r from 217.182.196.178 port 60942 ssh2
Oct 17 13:39:31 xb0 sshd[18915]: Received disconnect from 217.182.196.178: 11: Bye Bye [preauth]
Oct 17 13:43:05 xb0 sshd[17109]: Failed password for invalid user virusalert from 217.182.196.178 port 45104 ssh2
Oct 17 13:43:05 xb0 sshd[17109]: Received disconnect from 217.182.196.178: 11: Bye Bye [preauth]
Oct 17 13:46:36 xb0 sshd[14183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ........
-------------------------------
2019-10-19 20:45:30
125.227.62.145 attackspam
Oct 19 09:04:57 firewall sshd[13690]: Invalid user admin from 125.227.62.145
Oct 19 09:04:59 firewall sshd[13690]: Failed password for invalid user admin from 125.227.62.145 port 50303 ssh2
Oct 19 09:05:15 firewall sshd[13697]: Invalid user weiqi from 125.227.62.145
...
2019-10-19 20:33:33
79.122.128.179 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/79.122.128.179/ 
 
 RU - 1H : (156)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12772 
 
 IP : 79.122.128.179 
 
 CIDR : 79.122.128.0/22 
 
 PREFIX COUNT : 273 
 
 UNIQUE IP COUNT : 123904 
 
 
 ATTACKS DETECTED ASN12772 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 2 
 
 DateTime : 2019-10-19 14:05:02 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-19 20:43:23
139.199.48.217 attack
Oct 19 12:54:44 game-panel sshd[25281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.48.217
Oct 19 12:54:46 game-panel sshd[25281]: Failed password for invalid user kyc from 139.199.48.217 port 54446 ssh2
Oct 19 12:59:49 game-panel sshd[25448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.48.217
2019-10-19 21:06:00
222.186.175.148 attackbots
2019-10-19T12:45:19.678717shield sshd\[2538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2019-10-19T12:45:21.949455shield sshd\[2538\]: Failed password for root from 222.186.175.148 port 63774 ssh2
2019-10-19T12:45:26.139575shield sshd\[2538\]: Failed password for root from 222.186.175.148 port 63774 ssh2
2019-10-19T12:45:30.213531shield sshd\[2538\]: Failed password for root from 222.186.175.148 port 63774 ssh2
2019-10-19T12:45:34.973448shield sshd\[2538\]: Failed password for root from 222.186.175.148 port 63774 ssh2
2019-10-19 20:47:01
154.221.18.225 attackbotsspam
Oct 19 15:48:43 site3 sshd\[107096\]: Invalid user Pa$$word_ from 154.221.18.225
Oct 19 15:48:43 site3 sshd\[107096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.18.225
Oct 19 15:48:46 site3 sshd\[107096\]: Failed password for invalid user Pa$$word_ from 154.221.18.225 port 45458 ssh2
Oct 19 15:53:29 site3 sshd\[107136\]: Invalid user postgres from 154.221.18.225
Oct 19 15:53:29 site3 sshd\[107136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.18.225
...
2019-10-19 21:06:51
180.245.171.249 attack
Oct 19 09:04:42 ws22vmsma01 sshd[93882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.245.171.249
Oct 19 09:04:44 ws22vmsma01 sshd[93882]: Failed password for invalid user 666666 from 180.245.171.249 port 57332 ssh2
...
2019-10-19 20:54:58
180.179.120.70 attackbotsspam
Fail2Ban - SSH Bruteforce Attempt
2019-10-19 20:31:42
121.128.200.146 attack
2019-10-19T12:17:43.480486shield sshd\[29625\]: Invalid user MiMapass\* from 121.128.200.146 port 37732
2019-10-19T12:17:43.484418shield sshd\[29625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.200.146
2019-10-19T12:17:45.076136shield sshd\[29625\]: Failed password for invalid user MiMapass\* from 121.128.200.146 port 37732 ssh2
2019-10-19T12:21:56.316965shield sshd\[30387\]: Invalid user openelec from 121.128.200.146 port 48784
2019-10-19T12:21:56.321182shield sshd\[30387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.200.146
2019-10-19 20:35:24
115.159.147.239 attack
Oct 19 15:04:11 pkdns2 sshd\[21720\]: Invalid user much from 115.159.147.239Oct 19 15:04:14 pkdns2 sshd\[21720\]: Failed password for invalid user much from 115.159.147.239 port 58239 ssh2Oct 19 15:09:06 pkdns2 sshd\[21958\]: Invalid user v8q\)m109xxyma
...from
...115.159.147.239Oct
...19
...15:09:08
...pkdns2
...sshd[21958]:
...Failed
...password
...for
...invalid
...user
...v8q)m109xxyma from 115.159.147.239 port 34052 ssh2Oct 19 15:13:55 pkdns2 sshd\[22150\]: Invalid user 123 from 115.159.147.239Oct 19 15:13:58 pkdns2 sshd\[22150\]: Failed password for invalid user 123 from 115.159.147.239 port 9833 ssh2
...
2019-10-19 20:46:17
41.214.20.60 attackspam
Oct 19 02:23:09 tdfoods sshd\[22113\]: Invalid user daisy from 41.214.20.60
Oct 19 02:23:09 tdfoods sshd\[22113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.214.20.60
Oct 19 02:23:11 tdfoods sshd\[22113\]: Failed password for invalid user daisy from 41.214.20.60 port 45108 ssh2
Oct 19 02:30:48 tdfoods sshd\[22757\]: Invalid user berger from 41.214.20.60
Oct 19 02:30:48 tdfoods sshd\[22757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.214.20.60
2019-10-19 20:32:46

最近上报的IP列表

203.169.177.187 194.132.68.29 97.197.252.247 149.55.119.7
174.188.192.157 236.155.134.204 115.233.254.233 154.179.158.209
96.113.1.145 154.149.104.93 74.154.158.223 83.119.109.19
148.76.76.18 123.206.70.71 59.72.91.56 227.116.12.180
235.171.146.123 223.133.13.162 148.63.142.157 83.55.227.28