必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.53.145.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.53.145.20.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 02:53:23 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
20.145.53.113.in-addr.arpa domain name pointer node-3dg.pool-113-53.dynamic.totinternet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.145.53.113.in-addr.arpa	name = node-3dg.pool-113-53.dynamic.totinternet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.197.165 attack
Aug  4 22:40:04 ip40 sshd[7844]: Failed password for root from 106.12.197.165 port 36592 ssh2
...
2020-08-05 04:56:02
51.255.173.222 attackbotsspam
Aug  4 15:11:38 ny01 sshd[12107]: Failed password for root from 51.255.173.222 port 49740 ssh2
Aug  4 15:15:35 ny01 sshd[12626]: Failed password for root from 51.255.173.222 port 33188 ssh2
2020-08-05 05:03:58
14.29.80.126 attackspam
Aug  4 21:24:47 PorscheCustomer sshd[17417]: Failed password for root from 14.29.80.126 port 57234 ssh2
Aug  4 21:26:43 PorscheCustomer sshd[17478]: Failed password for root from 14.29.80.126 port 42716 ssh2
...
2020-08-05 04:52:39
190.140.88.137 attackbots
Port probing on unauthorized port 23
2020-08-05 04:50:30
132.232.172.159 attackspambots
$f2bV_matches
2020-08-05 05:02:55
93.243.224.73 attackspam
2020-08-04T14:41:10.357383linuxbox-skyline sshd[74751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.243.224.73  user=root
2020-08-04T14:41:12.252708linuxbox-skyline sshd[74751]: Failed password for root from 93.243.224.73 port 50778 ssh2
...
2020-08-05 04:44:21
49.233.26.110 attackbotsspam
Aug  4 19:58:17 mellenthin sshd[1017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.26.110  user=root
Aug  4 19:58:18 mellenthin sshd[1017]: Failed password for invalid user root from 49.233.26.110 port 39490 ssh2
2020-08-05 04:49:46
222.186.30.167 attackspam
Aug  4 20:43:14 rush sshd[15669]: Failed password for root from 222.186.30.167 port 11620 ssh2
Aug  4 20:43:16 rush sshd[15669]: Failed password for root from 222.186.30.167 port 11620 ssh2
Aug  4 20:43:19 rush sshd[15669]: Failed password for root from 222.186.30.167 port 11620 ssh2
...
2020-08-05 04:43:54
112.30.132.190 attack
Honeypot hit.
2020-08-05 05:04:37
194.26.115.16 attackbotsspam
Aug  4 20:48:08 liveconfig01 sshd[21256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.26.115.16  user=r.r
Aug  4 20:48:10 liveconfig01 sshd[21256]: Failed password for r.r from 194.26.115.16 port 54410 ssh2
Aug  4 20:48:10 liveconfig01 sshd[21256]: Received disconnect from 194.26.115.16 port 54410:11: Bye Bye [preauth]
Aug  4 20:48:10 liveconfig01 sshd[21256]: Disconnected from 194.26.115.16 port 54410 [preauth]
Aug  4 20:58:35 liveconfig01 sshd[22060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.26.115.16  user=r.r
Aug  4 20:58:38 liveconfig01 sshd[22060]: Failed password for r.r from 194.26.115.16 port 56346 ssh2
Aug  4 20:58:38 liveconfig01 sshd[22060]: Received disconnect from 194.26.115.16 port 56346:11: Bye Bye [preauth]
Aug  4 20:58:38 liveconfig01 sshd[22060]: Disconnected from 194.26.115.16 port 56346 [preauth]
Aug  4 21:02:26 liveconfig01 sshd[22379]: pam_unix(sshd:........
-------------------------------
2020-08-05 04:39:02
51.38.8.73 attackbots
10 attempts against mh-pma-try-ban on sky
2020-08-05 04:59:50
87.106.126.244 attackspambots
87.106.126.244 - - [04/Aug/2020:21:50:16 +0100] "POST //xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0 Safari/537.36"
87.106.126.244 - - [04/Aug/2020:21:50:16 +0100] "POST //xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0 Safari/537.36"
87.106.126.244 - - [04/Aug/2020:22:00:27 +0100] "POST //xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0 Safari/537.36"
...
2020-08-05 05:08:28
62.234.87.27 attackspam
Tried sshing with brute force.
2020-08-05 04:53:58
73.79.214.136 attackbotsspam
trying to access non-authorized port
2020-08-05 04:33:50
190.145.5.170 attackspam
$f2bV_matches
2020-08-05 04:49:17

最近上报的IP列表

115.203.170.132 113.53.145.216 113.53.145.220 113.53.145.222
113.53.145.227 113.53.145.23 113.53.145.234 113.53.145.38
113.53.145.58 113.53.145.26 115.203.170.164 113.53.149.87
113.53.149.84 113.53.145.55 113.53.145.40 115.203.170.188
115.203.170.215 115.203.170.45 115.203.171.133 115.203.171.147