必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.141.84.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.141.84.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 16 22:01:34 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 45.84.141.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.84.141.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.222.75.80 attackbots
5x Failed Password
2019-11-06 21:19:38
106.12.28.232 attackbots
Nov  6 07:26:56 venus sshd\[31948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.232  user=root
Nov  6 07:26:58 venus sshd\[31948\]: Failed password for root from 106.12.28.232 port 49214 ssh2
Nov  6 07:31:53 venus sshd\[32027\]: Invalid user bot from 106.12.28.232 port 59280
...
2019-11-06 21:40:08
81.4.125.221 attackbotsspam
2019-11-06T06:54:38.811342abusebot-2.cloudsearch.cf sshd\[28902\]: Invalid user zx from 81.4.125.221 port 50638
2019-11-06 21:26:16
81.22.45.48 attackbotsspam
81.22.45.48 was recorded 147 times by 27 hosts attempting to connect to the following ports: 4385,4342,4443,4293,4286,4440,4368,4422,4283,4284,4386,4345,4372,4476,4425,4475,4424,4458,4416,4446,4471,4478,4370,4420,4397,4407,4359,4484,4435,4265,4325,4395,4490,4331,4276,4400,4445,4426,4444,4264,4332,4380,4344,4369,4254,4301,4465,4462,4491,4330,4413,4393,4271,4496,4414,4392,4419,4461,4290,4255,4353,4275,4433,4291,4500,4352,4409,4398,4388,4418,4319,4305,4279,4358,4260,4322,4417,4324,4339,4357,4480,4404,4408,4429,4306,4294,4410,4427,4313,4377,4340,4469,4401,4399,4376,4327,4453,4350,4474,4405,4266,4390,4292,4287,4298,4473,4375,4431,4259. Incident counter (4h, 24h, all-time): 147, 477, 670
2019-11-06 21:38:51
185.9.3.48 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.9.3.48  user=root
Failed password for root from 185.9.3.48 port 53298 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.9.3.48  user=root
Failed password for root from 185.9.3.48 port 40008 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.9.3.48  user=root
2019-11-06 21:42:04
185.2.140.155 attackspam
Nov  6 12:55:52 lnxded64 sshd[23794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.140.155
2019-11-06 21:51:42
51.15.51.2 attackbots
detected by Fail2Ban
2019-11-06 21:32:51
45.143.220.21 attackspambots
13 pkts, ports: UDP:65418, UDP:65413, UDP:65416, UDP:65419, UDP:65421, UDP:65420, UDP:65423, UDP:65415, UDP:65414, UDP:65422, UDP:65417, UDP:65424, UDP:65412
2019-11-06 21:54:28
134.175.121.31 attackspam
SSH Brute-Force reported by Fail2Ban
2019-11-06 21:32:26
78.128.113.120 attack
2019-11-06T14:42:09.457989mail01 postfix/smtpd[27753]: warning: unknown[78.128.113.120]: SASL PLAIN authentication failed:
2019-11-06T14:42:16.286110mail01 postfix/smtpd[30122]: warning: unknown[78.128.113.120]: SASL PLAIN authentication failed:
2019-11-06T14:42:45.295395mail01 postfix/smtpd[28707]: warning: unknown[78.128.113.120]: SASL PLAIN authentication failed:
2019-11-06 21:57:39
122.51.86.120 attack
Nov  6 10:54:11 vps691689 sshd[1095]: Failed password for root from 122.51.86.120 port 51308 ssh2
Nov  6 10:58:50 vps691689 sshd[1191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.86.120
...
2019-11-06 21:53:15
211.244.224.130 attackbots
failed_logins
2019-11-06 21:32:00
1.6.123.197 attackbotsspam
SMB Server BruteForce Attack
2019-11-06 21:34:10
112.85.42.187 attackspam
Nov  6 11:17:53 markkoudstaal sshd[24374]: Failed password for root from 112.85.42.187 port 53039 ssh2
Nov  6 11:18:39 markkoudstaal sshd[24446]: Failed password for root from 112.85.42.187 port 37758 ssh2
2019-11-06 21:17:02
106.13.53.173 attackspam
Nov  6 15:20:15 server sshd\[6221\]: Invalid user mongodb from 106.13.53.173 port 44404
Nov  6 15:20:15 server sshd\[6221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.53.173
Nov  6 15:20:17 server sshd\[6221\]: Failed password for invalid user mongodb from 106.13.53.173 port 44404 ssh2
Nov  6 15:25:50 server sshd\[4158\]: User root from 106.13.53.173 not allowed because listed in DenyUsers
Nov  6 15:25:50 server sshd\[4158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.53.173  user=root
2019-11-06 21:47:49

最近上报的IP列表

113.215.189.144 195.184.76.71 105.76.1.215 98.84.141.99
3.90.102.225 3.80.214.94 98.84.178.214 158.255.83.248
52.186.182.60 20.168.0.86 115.55.57.72 195.184.76.145
195.96.138.90 125.122.33.103 91.230.168.97 125.122.33.78
77.242.22.88 113.215.189.158 64.227.29.166 35.203.210.29