必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): KDDI CORPORATION

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.180.24.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16283
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.180.24.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 03:11:46 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
45.24.180.106.in-addr.arpa domain name pointer KD106180024045.au-net.ne.jp.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
45.24.180.106.in-addr.arpa	name = KD106180024045.au-net.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.59.53.34 attack
Unauthorized connection attempt detected from IP address 103.59.53.34 to port 23 [T]
2020-08-14 04:24:42
191.5.160.95 attackbots
srvr1: (mod_security) mod_security (id:920350) triggered by 191.5.160.95 (BR/-/191.5.160.95.dynamic.1toc.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/13 20:46:22 [error] 50417#0: *180413 [client 191.5.160.95] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "159735158257.274894"] [ref "o0,16v21,16"], client: 191.5.160.95, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-08-14 04:58:40
89.248.168.176 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 85 - port: 9997 proto: tcp cat: Misc Attackbytes: 60
2020-08-14 04:44:25
46.161.53.8 attackspambots
 TCP (SYN) 46.161.53.8:27042 -> port 23, len 44
2020-08-14 04:48:07
23.129.64.213 attackspam
Aug 13 22:46:22 vmd36147 sshd[13154]: Failed password for root from 23.129.64.213 port 22322 ssh2
Aug 13 22:46:24 vmd36147 sshd[13154]: Failed password for root from 23.129.64.213 port 22322 ssh2
Aug 13 22:46:27 vmd36147 sshd[13154]: Failed password for root from 23.129.64.213 port 22322 ssh2
...
2020-08-14 04:56:37
218.92.0.199 attackbotsspam
Aug 13 22:46:42 vpn01 sshd[970]: Failed password for root from 218.92.0.199 port 53237 ssh2
Aug 13 22:46:45 vpn01 sshd[970]: Failed password for root from 218.92.0.199 port 53237 ssh2
...
2020-08-14 04:50:56
41.63.7.129 attack
Unauthorized connection attempt detected from IP address 41.63.7.129 to port 445 [T]
2020-08-14 04:48:49
195.54.160.223 attackspam
Unauthorized connection attempt detected from IP address 195.54.160.223 to port 9344 [T]
2020-08-14 04:32:57
125.141.56.231 attackbotsspam
2020-08-13 22:46:34,322 fail2ban.actions: WARNING [ssh] Ban 125.141.56.231
2020-08-14 04:53:20
103.40.22.89 attack
2020-08-13 22:46:33,756 fail2ban.actions: WARNING [ssh] Ban 103.40.22.89
2020-08-14 04:54:14
81.68.112.145 attack
Aug 10 16:07:59 xxx sshd[25840]: Failed password for r.r from 81.68.112.145 port 57278 ssh2
Aug 10 16:07:59 xxx sshd[25840]: Received disconnect from 81.68.112.145 port 57278:11: Bye Bye [preauth]
Aug 10 16:07:59 xxx sshd[25840]: Disconnected from 81.68.112.145 port 57278 [preauth]
Aug 10 16:16:44 xxx sshd[27907]: Failed password for r.r from 81.68.112.145 port 55166 ssh2
Aug 10 16:16:45 xxx sshd[27907]: Received disconnect from 81.68.112.145 port 55166:11: Bye Bye [preauth]
Aug 10 16:16:45 xxx sshd[27907]: Disconnected from 81.68.112.145 port 55166 [preauth]
Aug 10 16:21:08 xxx sshd[28950]: Connection closed by 81.68.112.145 port 38920 [preauth]
Aug 10 16:25:01 xxx sshd[29023]: Failed password for r.r from 81.68.112.145 port 50906 ssh2
Aug 10 16:25:01 xxx sshd[29023]: Received disconnect from 81.68.112.145 port 50906:11: Bye Bye [preauth]
Aug 10 16:25:01 xxx sshd[29023]: Disconnected from 81.68.112.145 port 50906 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en
2020-08-14 04:56:20
83.97.20.35 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 3689 proto: tcp cat: Misc Attackbytes: 60
2020-08-14 04:45:04
177.148.180.214 attackbots
177.148.180.214 - - [13/Aug/2020:22:25:23 +0200] "POST /xmlrpc.php HTTP/1.1" 403 40676 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
177.148.180.214 - - [13/Aug/2020:22:46:24 +0200] "POST /xmlrpc.php HTTP/1.1" 403 40676 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-08-14 04:58:57
159.89.151.199 attack
Aug 13 22:40:50 ns382633 sshd\[13603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.151.199  user=root
Aug 13 22:40:52 ns382633 sshd\[13603\]: Failed password for root from 159.89.151.199 port 58222 ssh2
Aug 13 22:43:45 ns382633 sshd\[13831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.151.199  user=root
Aug 13 22:43:47 ns382633 sshd\[13831\]: Failed password for root from 159.89.151.199 port 36478 ssh2
Aug 13 22:46:27 ns382633 sshd\[14521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.151.199  user=root
2020-08-14 04:55:51
51.178.78.154 attack
SmallBizIT.US 3 packets to tcp(135,6002,6881)
2020-08-14 04:47:32

最近上报的IP列表

184.35.30.14 8.128.65.168 35.134.80.101 49.230.70.75
77.178.239.98 101.61.37.27 95.19.189.208 62.239.173.48
85.218.80.107 27.177.197.121 113.173.79.69 123.195.192.22
102.159.227.121 190.134.203.195 208.237.220.48 8.11.131.98
202.181.237.194 65.130.177.106 62.38.198.18 27.140.18.63