必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Zambia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.145.13.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.145.13.252.			IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 22 02:04:53 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
252.13.145.102.in-addr.arpa domain name pointer 252-13-145-102.r.airtel.co.zm.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.13.145.102.in-addr.arpa	name = 252-13-145-102.r.airtel.co.zm.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.131.29.92 attackspam
Invalid user schneider from 104.131.29.92 port 37892
2019-10-24 23:12:25
124.243.198.190 attack
Triggered by Fail2Ban at Vostok web server
2019-10-24 23:08:19
34.87.48.220 attack
Port Scan: TCP/20000
2019-10-24 23:24:31
113.172.56.55 attackspambots
Invalid user admin from 113.172.56.55 port 47451
2019-10-24 22:42:51
218.249.69.210 attack
Invalid user 12345 from 218.249.69.210 port 12277
2019-10-24 23:00:33
94.253.215.228 attack
2019-01-19 04:04:04 1gkgvS-0004Gs-OD SMTP connection from cpe-94-253-215-228.st2.cable.xnet.hr \[94.253.215.228\]:38252 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-01-19 04:04:29 1gkgvr-0004HL-J2 SMTP connection from cpe-94-253-215-228.st2.cable.xnet.hr \[94.253.215.228\]:38476 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-01-19 04:04:45 1gkgw6-0004Hf-Tg SMTP connection from cpe-94-253-215-228.st2.cable.xnet.hr \[94.253.215.228\]:38592 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2019-10-24 23:14:09
119.196.83.10 attackspam
Invalid user g from 119.196.83.10 port 43776
2019-10-24 23:09:24
37.114.187.141 attackspambots
Invalid user admin from 37.114.187.141 port 52592
2019-10-24 23:23:24
51.255.174.215 attackspambots
Invalid user zimbra from 51.255.174.215 port 34006
2019-10-24 23:18:19
165.227.9.184 attackspam
Invalid user sublink from 165.227.9.184 port 26512
2019-10-24 23:04:44
106.54.226.23 attack
Invalid user michael from 106.54.226.23 port 42102
2019-10-24 22:45:38
85.214.95.237 attackspam
Invalid user admin from 85.214.95.237 port 55200
2019-10-24 22:49:39
94.23.50.194 attackbotsspam
Invalid user applmgr from 94.23.50.194 port 36607
2019-10-24 22:48:34
192.99.56.117 attackbotsspam
Invalid user ubuntu from 192.99.56.117 port 34076
2019-10-24 23:01:43
106.124.137.103 attackbots
Invalid user interalt from 106.124.137.103 port 35029
2019-10-24 22:45:09

最近上报的IP列表

102.146.113.236 102.147.140.183 102.146.79.135 102.147.202.253
102.147.69.115 102.146.131.93 102.144.6.188 102.147.208.212
102.147.158.129 102.147.89.165 102.147.230.141 102.147.162.134
102.148.117.146 102.147.94.83 102.147.17.31 102.146.4.161
102.147.235.84 102.148.138.141 102.148.112.147 102.148.104.14