必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.21.158.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.21.158.145.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:21:57 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
145.158.21.107.in-addr.arpa domain name pointer ec2-107-21-158-145.compute-1.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.158.21.107.in-addr.arpa	name = ec2-107-21-158-145.compute-1.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.75.34.61 attack
Spam Timestamp : 21-Jun-19 10:04 _ BlockList Provider  barracudacentral _ (324)
2019-06-21 23:05:24
34.203.30.83 attackbotsspam
2375/tcp
[2019-06-21]1pkt
2019-06-21 23:21:48
58.40.213.189 attack
445/tcp
[2019-06-21]1pkt
2019-06-21 22:26:31
117.216.39.53 attack
Looking for resource vulnerabilities
2019-06-21 22:23:45
103.48.35.204 attackspambots
445/tcp
[2019-06-21]1pkt
2019-06-21 22:51:45
94.205.161.90 attackbotsspam
5555/tcp
[2019-06-21]1pkt
2019-06-21 23:23:34
61.134.133.159 attack
5500/tcp
[2019-06-21]1pkt
2019-06-21 23:31:11
223.206.232.103 attackbots
445/tcp
[2019-06-21]1pkt
2019-06-21 23:13:23
171.221.242.85 attackspam
23/tcp
[2019-06-21]1pkt
2019-06-21 22:33:16
177.81.228.23 attack
Jun 21 16:03:38 XXX sshd[38411]: Invalid user jia from 177.81.228.23 port 43341
2019-06-21 23:20:33
14.186.234.22 attackspambots
81/tcp
[2019-06-21]1pkt
2019-06-21 23:16:21
51.77.222.160 attackbots
Jun 21 10:29:32 bilbo sshd\[924\]: Invalid user teamspeak from 51.77.222.160\
Jun 21 10:29:34 bilbo sshd\[924\]: Failed password for invalid user teamspeak from 51.77.222.160 port 51220 ssh2\
Jun 21 10:30:13 bilbo sshd\[1950\]: Failed password for root from 51.77.222.160 port 54678 ssh2\
Jun 21 10:30:49 bilbo sshd\[3131\]: Invalid user analytics from 51.77.222.160\
2019-06-21 23:21:09
41.223.42.11 attack
Unauthorised access (Jun 21) SRC=41.223.42.11 LEN=40 TTL=242 ID=12497 TCP DPT=445 WINDOW=1024 SYN
2019-06-21 23:17:48
175.151.201.69 attackbotsspam
23/tcp
[2019-06-21]1pkt
2019-06-21 23:32:42
118.68.60.164 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-21 11:10:37]
2019-06-21 23:35:12

最近上报的IP列表

234.196.108.238 89.30.117.60 4.163.159.42 192.118.198.28
122.63.160.13 40.33.82.120 146.186.116.212 50.177.113.251
233.25.85.20 28.45.166.21 15.172.254.109 239.156.208.110
221.16.41.122 169.102.53.183 148.199.79.117 94.199.33.74
229.196.207.178 56.123.3.198 212.10.117.18 17.10.100.184