必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.145.42.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.145.42.80.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 16:06:29 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
80.42.145.109.in-addr.arpa domain name pointer host109-145-42-80.range109-145.btcentralplus.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.42.145.109.in-addr.arpa	name = host109-145-42-80.range109-145.btcentralplus.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.116.194.36 attackbotsspam
Jul  6 16:57:06 lukav-desktop sshd\[29608\]: Invalid user prueba from 185.116.194.36
Jul  6 16:57:06 lukav-desktop sshd\[29608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.116.194.36
Jul  6 16:57:08 lukav-desktop sshd\[29608\]: Failed password for invalid user prueba from 185.116.194.36 port 57750 ssh2
Jul  6 17:00:45 lukav-desktop sshd\[29677\]: Invalid user minecraft from 185.116.194.36
Jul  6 17:00:45 lukav-desktop sshd\[29677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.116.194.36
2020-07-06 22:05:42
138.197.136.72 attackspambots
138.197.136.72 - - \[06/Jul/2020:15:43:30 +0200\] "POST /wp-login.php HTTP/1.1" 200 9954 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.197.136.72 - - \[06/Jul/2020:15:43:31 +0200\] "POST /wp-login.php HTTP/1.1" 200 9823 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-07-06 21:46:38
142.93.18.7 attackspam
WordPress login Brute force / Web App Attack on client site.
2020-07-06 22:08:31
150.129.8.9 attack
Automatic report - Banned IP Access
2020-07-06 22:17:37
222.186.30.167 attackspambots
2020-07-06T10:09:51.262080na-vps210223 sshd[27258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
2020-07-06T10:09:52.990170na-vps210223 sshd[27258]: Failed password for root from 222.186.30.167 port 35005 ssh2
2020-07-06T10:09:51.262080na-vps210223 sshd[27258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
2020-07-06T10:09:52.990170na-vps210223 sshd[27258]: Failed password for root from 222.186.30.167 port 35005 ssh2
2020-07-06T10:09:55.672562na-vps210223 sshd[27258]: Failed password for root from 222.186.30.167 port 35005 ssh2
...
2020-07-06 22:11:21
46.38.145.251 attackbots
2020-07-06T15:31:10+02:00  exim[8989]: fixed_login authenticator failed for (User) [46.38.145.251]: 535 Incorrect authentication data (set_id=qu@mail.sma.hu)
2020-07-06 21:44:00
95.213.143.211 attackbotsspam
95.213.143.211 - - [06/Jul/2020:13:56:32 +0100] "POST /wp-login.php HTTP/1.1" 200 2418 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.213.143.211 - - [06/Jul/2020:13:56:33 +0100] "POST /wp-login.php HTTP/1.1" 200 2413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
95.213.143.211 - - [06/Jul/2020:13:56:34 +0100] "POST /wp-login.php HTTP/1.1" 200 2412 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-06 21:58:39
54.37.159.12 attackspambots
$f2bV_matches
2020-07-06 22:18:01
220.78.28.68 attackbotsspam
Jul  6 13:43:10 django-0 sshd[19775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.78.28.68  user=root
Jul  6 13:43:12 django-0 sshd[19775]: Failed password for root from 220.78.28.68 port 39424 ssh2
...
2020-07-06 22:18:20
95.14.160.194 attack
Automatic report - Banned IP Access
2020-07-06 21:44:53
195.133.32.98 attackspambots
2020-07-06T19:52:40.686591hostname sshd[7556]: Failed password for invalid user expert from 195.133.32.98 port 48498 ssh2
2020-07-06T19:56:27.241227hostname sshd[9232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.133.32.98  user=root
2020-07-06T19:56:29.051796hostname sshd[9232]: Failed password for root from 195.133.32.98 port 45780 ssh2
...
2020-07-06 21:53:43
86.18.66.230 attack
SSH bruteforce
2020-07-06 21:45:56
52.130.93.119 attackbots
Jul  6 16:32:51 pkdns2 sshd\[14802\]: Invalid user teamspeak from 52.130.93.119Jul  6 16:32:53 pkdns2 sshd\[14802\]: Failed password for invalid user teamspeak from 52.130.93.119 port 1024 ssh2Jul  6 16:34:51 pkdns2 sshd\[14904\]: Invalid user lij from 52.130.93.119Jul  6 16:34:54 pkdns2 sshd\[14904\]: Failed password for invalid user lij from 52.130.93.119 port 1024 ssh2Jul  6 16:36:52 pkdns2 sshd\[15037\]: Invalid user oracle from 52.130.93.119Jul  6 16:36:54 pkdns2 sshd\[15037\]: Failed password for invalid user oracle from 52.130.93.119 port 1024 ssh2
...
2020-07-06 22:07:51
134.17.94.214 attackspambots
2020-07-06T14:55:26.657795+02:00  sshd[28740]: Failed password for invalid user developer from 134.17.94.214 port 5894 ssh2
2020-07-06 22:23:16
185.143.72.27 attackspam
2020-07-06T08:17:53.320957linuxbox-skyline auth[647076]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=demotest rhost=185.143.72.27
...
2020-07-06 22:19:50

最近上报的IP列表

140.99.110.138 17.58.82.25 223.221.220.239 15.93.97.227
81.124.211.194 220.151.201.76 244.185.163.78 21.99.211.233
47.25.0.186 209.39.157.86 87.255.227.9 163.105.59.226
115.52.48.154 154.248.210.138 220.38.18.238 131.38.123.214
214.229.15.255 84.207.186.96 22.219.94.146 165.119.116.63