必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.145.225.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.145.225.3.			IN	A

;; AUTHORITY SECTION:
.			497	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:19:26 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 3.225.145.104.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 104.145.225.3.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
88.214.26.45 attackbots
88.214.26.45 was recorded 5 times by 2 hosts attempting to connect to the following ports: 3359,3353,3355,3351. Incident counter (4h, 24h, all-time): 5, 28, 33
2019-11-21 16:50:07
36.68.62.184 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-21 17:13:37
54.37.230.15 attackbotsspam
Nov 21 06:26:59 l02a sshd[22563]: Invalid user http from 54.37.230.15
Nov 21 06:27:01 l02a sshd[22563]: Failed password for invalid user http from 54.37.230.15 port 42096 ssh2
Nov 21 06:26:59 l02a sshd[22563]: Invalid user http from 54.37.230.15
Nov 21 06:27:01 l02a sshd[22563]: Failed password for invalid user http from 54.37.230.15 port 42096 ssh2
2019-11-21 17:11:15
209.235.67.48 attackspam
Nov 21 07:51:29 venus sshd\[13626\]: Invalid user guest from 209.235.67.48 port 56584
Nov 21 07:51:29 venus sshd\[13626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.48
Nov 21 07:51:31 venus sshd\[13626\]: Failed password for invalid user guest from 209.235.67.48 port 56584 ssh2
...
2019-11-21 16:45:09
94.102.49.190 attackspambots
94.102.49.190 was recorded 5 times by 5 hosts attempting to connect to the following ports: 4321,8181,49,1023,2067. Incident counter (4h, 24h, all-time): 5, 38, 487
2019-11-21 16:38:38
129.145.0.68 attackspambots
Nov 21 08:54:52 tuxlinux sshd[5437]: Invalid user mutendebvureg from 129.145.0.68 port 25608
Nov 21 08:54:52 tuxlinux sshd[5437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.145.0.68 
Nov 21 08:54:52 tuxlinux sshd[5437]: Invalid user mutendebvureg from 129.145.0.68 port 25608
Nov 21 08:54:52 tuxlinux sshd[5437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.145.0.68 
Nov 21 08:54:52 tuxlinux sshd[5437]: Invalid user mutendebvureg from 129.145.0.68 port 25608
Nov 21 08:54:52 tuxlinux sshd[5437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.145.0.68 
Nov 21 08:54:54 tuxlinux sshd[5437]: Failed password for invalid user mutendebvureg from 129.145.0.68 port 25608 ssh2
...
2019-11-21 16:42:52
185.153.199.7 botsattack
11/21/2019 every 10 min
SrcIP: 185.153.199.7, DstIP: x.x.x.x, SrcPort: 64626, DstPort: 443, Protocol: tcp, GID: 1, SID: 49040, Revision: 4, Message: OS-WINDOWS Microsoft Windows Terminal server RDP over non-standard port attempt,
2019-11-21 17:11:25
24.69.139.91 attackbots
TCP Port Scanning
2019-11-21 16:53:44
3.18.163.13 attackbots
<5DWHI5H6.5DWHI5H6.5DWHI5H6.JavaMail.tomcat@pdr8-services-05v.prod.affpartners.com>
20 novembre 2019 
𝐁𝐔𝐑𝐄𝐀𝐔 𝐃'𝐄𝐍𝐑𝐄𝐆𝐈𝐒𝐓𝐑𝐄𝐌𝐄𝐍𝐓  
𝐀𝐭𝐭𝐧 : 𝐯𝐨𝐭𝐫𝐞 𝐫𝐞́𝐜𝐨𝐦𝐩𝐞𝐧𝐬𝐞 𝐝𝐞 𝐂𝐥𝐢𝐞𝐧𝐭 𝐁𝐨𝐮𝐲𝐠𝐮𝐞𝐬 𝐞𝐬𝐭 𝐚𝐫𝐫𝐢𝐯𝐞́ 𝐜𝐞 𝐦𝐨𝐢𝐬-𝐜𝐢. 𝐍𝐨.𝟎𝟎𝟖𝟔𝟕𝟗𝟐 
IP 3.18.163.13
2019-11-21 17:02:26
45.136.109.9 attackbots
Microsoft-Windows-Security-Auditing
2019-11-21 17:07:13
106.54.25.82 attack
SSH Brute-Force reported by Fail2Ban
2019-11-21 16:48:21
220.129.228.170 attackbots
Honeypot attack, port: 23, PTR: 220-129-228-170.dynamic-ip.hinet.net.
2019-11-21 16:54:33
185.170.210.24 attackbots
185.170.210.24 was recorded 5 times by 2 hosts attempting to connect to the following ports: 8089,9999,8082,8086. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-21 16:50:38
199.66.90.147 attackspam
Nov 21 10:59:13 tuotantolaitos sshd[17382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.66.90.147
Nov 21 10:59:14 tuotantolaitos sshd[17382]: Failed password for invalid user net from 199.66.90.147 port 5385 ssh2
...
2019-11-21 17:07:26
61.144.158.225 attackbots
TCP Port Scanning
2019-11-21 16:40:31

最近上报的IP列表

104.149.158.11 104.144.63.166 104.149.198.143 104.149.204.16
104.149.198.144 104.149.175.82 104.149.142.237 104.152.108.9
104.149.131.58 125.119.50.247 104.152.109.162 104.152.109.195
104.152.109.231 104.149.198.145 104.152.111.102 104.152.111.86
104.152.168.11 104.152.168.23 104.152.168.26 104.152.154.12