必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Berlin

省份(region): Land Berlin

国家(country): Germany

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.40.241.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.40.241.45.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032701 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 28 10:44:48 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
45.241.40.109.in-addr.arpa domain name pointer ip-109-40-241-45.web.vodafone.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.241.40.109.in-addr.arpa	name = ip-109-40-241-45.web.vodafone.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
216.83.57.10 attack
Oct 27 10:40:53 friendsofhawaii sshd\[14864\]: Invalid user www321 from 216.83.57.10
Oct 27 10:40:53 friendsofhawaii sshd\[14864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.57.10
Oct 27 10:40:55 friendsofhawaii sshd\[14864\]: Failed password for invalid user www321 from 216.83.57.10 port 59557 ssh2
Oct 27 10:46:17 friendsofhawaii sshd\[15257\]: Invalid user adi0742697527 from 216.83.57.10
Oct 27 10:46:17 friendsofhawaii sshd\[15257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.57.10
2019-10-28 04:49:59
106.12.151.201 attack
Oct 24 19:57:50 plesk sshd[10674]: Invalid user teste from 106.12.151.201
Oct 24 19:57:50 plesk sshd[10674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.201 
Oct 24 19:57:52 plesk sshd[10674]: Failed password for invalid user teste from 106.12.151.201 port 38652 ssh2
Oct 24 19:57:52 plesk sshd[10674]: Received disconnect from 106.12.151.201: 11: Bye Bye [preauth]
Oct 24 20:08:33 plesk sshd[11380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.201  user=r.r
Oct 24 20:08:34 plesk sshd[11380]: Failed password for r.r from 106.12.151.201 port 56452 ssh2
Oct 24 20:08:35 plesk sshd[11380]: Received disconnect from 106.12.151.201: 11: Bye Bye [preauth]
Oct 24 20:12:30 plesk sshd[11716]: Invalid user lx from 106.12.151.201
Oct 24 20:12:30 plesk sshd[11716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.201 
Oct 24 20:12........
-------------------------------
2019-10-28 04:39:35
182.72.178.114 attackbots
Oct 27 04:08:32 microserver sshd[49705]: Invalid user test1 from 182.72.178.114 port 48259
Oct 27 04:08:32 microserver sshd[49705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114
Oct 27 04:08:35 microserver sshd[49705]: Failed password for invalid user test1 from 182.72.178.114 port 48259 ssh2
Oct 27 04:12:34 microserver sshd[50332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114  user=root
Oct 27 04:12:35 microserver sshd[50332]: Failed password for root from 182.72.178.114 port 50727 ssh2
Oct 27 04:24:04 microserver sshd[51749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114  user=root
Oct 27 04:24:06 microserver sshd[51749]: Failed password for root from 182.72.178.114 port 22778 ssh2
Oct 27 04:27:57 microserver sshd[52356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114  user=root
Oct
2019-10-28 04:41:00
5.54.154.18 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/5.54.154.18/ 
 
 GR - 1H : (60)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GR 
 NAME ASN : ASN3329 
 
 IP : 5.54.154.18 
 
 CIDR : 5.54.128.0/19 
 
 PREFIX COUNT : 167 
 
 UNIQUE IP COUNT : 788480 
 
 
 ATTACKS DETECTED ASN3329 :  
  1H - 2 
  3H - 3 
  6H - 7 
 12H - 16 
 24H - 28 
 
 DateTime : 2019-10-27 21:29:22 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-28 04:59:31
192.144.169.228 attackbots
Oct 27 18:10:59 vps sshd[21234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.169.228 
Oct 27 18:11:01 vps sshd[21234]: Failed password for invalid user pisica from 192.144.169.228 port 46172 ssh2
Oct 27 18:28:25 vps sshd[21928]: Failed password for root from 192.144.169.228 port 44388 ssh2
...
2019-10-28 04:30:13
185.176.209.136 attackbots
3389BruteforceFW21
2019-10-28 04:56:48
217.68.214.185 attackbots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 04:28:23
217.68.214.193 attackbotsspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 04:26:20
104.236.246.16 attack
Oct 27 21:21:28 MK-Soft-Root1 sshd[762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.246.16 
Oct 27 21:21:30 MK-Soft-Root1 sshd[762]: Failed password for invalid user admin from 104.236.246.16 port 39058 ssh2
...
2019-10-28 04:27:30
123.206.174.26 attackbotsspam
web-1 [ssh] SSH Attack
2019-10-28 04:50:29
106.13.201.63 attack
Oct 27 21:25:33 vps691689 sshd[7426]: Failed password for root from 106.13.201.63 port 40434 ssh2
Oct 27 21:29:41 vps691689 sshd[7493]: Failed password for root from 106.13.201.63 port 48280 ssh2
...
2019-10-28 04:46:55
217.68.214.209 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 04:22:39
95.155.20.230 attack
Automatic report - Port Scan Attack
2019-10-28 04:21:56
51.77.140.111 attackspambots
Oct 27 21:29:36 MK-Soft-VM5 sshd[5923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111 
Oct 27 21:29:38 MK-Soft-VM5 sshd[5923]: Failed password for invalid user detie from 51.77.140.111 port 59558 ssh2
...
2019-10-28 04:48:13
185.108.164.205 attackspambots
Automatic report - Port Scan Attack
2019-10-28 04:36:46

最近上报的IP列表

109.40.241.195 111.89.141.101 111.89.142.26 111.89.145.143
111.89.145.198 111.89.179.112 111.90.133.24 111.90.134.40
21.35.235.208 111.90.138.107 111.90.140.141 111.90.142.85
111.90.144.80 111.90.147.74 111.90.149.141 111.90.156.12
111.90.156.15 111.90.156.219 111.90.156.46 111.90.156.90