必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.161.145.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24333
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.161.145.113.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 16:07:41 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 113.145.161.116.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.145.161.116.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
164.160.109.71 attackspam
May 15 16:35:48 server sshd\[20731\]: Invalid user last from 164.160.109.71
May 15 16:35:48 server sshd\[20731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.160.109.71
May 15 16:35:50 server sshd\[20731\]: Failed password for invalid user last from 164.160.109.71 port 35200 ssh2
...
2019-10-09 15:20:45
146.88.240.4 attack
10/09/2019-01:21:30.959744 146.88.240.4 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2019-10-09 15:06:10
144.217.42.212 attackspam
Oct  9 04:11:18 www_kotimaassa_fi sshd[12260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.42.212
Oct  9 04:11:20 www_kotimaassa_fi sshd[12260]: Failed password for invalid user PA$$WORD_123 from 144.217.42.212 port 36911 ssh2
...
2019-10-09 15:27:54
190.10.8.50 attack
2019-10-09T03:54:48.849422abusebot.cloudsearch.cf sshd\[10298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.10.8.50  user=root
2019-10-09 15:29:49
164.132.110.223 attackbotsspam
Oct  9 09:21:41 SilenceServices sshd[18782]: Failed password for root from 164.132.110.223 port 60661 ssh2
Oct  9 09:25:31 SilenceServices sshd[19778]: Failed password for root from 164.132.110.223 port 52385 ssh2
2019-10-09 15:32:05
165.22.128.115 attackspam
Jul  2 20:28:16 server sshd\[108659\]: Invalid user reception2 from 165.22.128.115
Jul  2 20:28:16 server sshd\[108659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.128.115
Jul  2 20:28:18 server sshd\[108659\]: Failed password for invalid user reception2 from 165.22.128.115 port 48720 ssh2
...
2019-10-09 15:08:37
118.187.31.11 attack
Oct  9 07:54:46 v22018076622670303 sshd\[23170\]: Invalid user Dex123 from 118.187.31.11 port 39736
Oct  9 07:54:46 v22018076622670303 sshd\[23170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.31.11
Oct  9 07:54:48 v22018076622670303 sshd\[23170\]: Failed password for invalid user Dex123 from 118.187.31.11 port 39736 ssh2
...
2019-10-09 15:15:26
27.254.194.99 attackspam
Oct  9 07:39:07 vps01 sshd[25848]: Failed password for root from 27.254.194.99 port 37248 ssh2
2019-10-09 15:36:42
164.132.47.139 attack
Jul  7 06:32:31 server sshd\[37026\]: Invalid user sybase from 164.132.47.139
Jul  7 06:32:31 server sshd\[37026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.139
Jul  7 06:32:34 server sshd\[37026\]: Failed password for invalid user sybase from 164.132.47.139 port 48776 ssh2
...
2019-10-09 15:24:56
195.154.113.173 attackspambots
Oct  9 10:50:58 itv-usvr-01 sshd[27616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.113.173  user=root
Oct  9 10:51:00 itv-usvr-01 sshd[27616]: Failed password for root from 195.154.113.173 port 59588 ssh2
Oct  9 10:55:00 itv-usvr-01 sshd[27767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.113.173  user=root
Oct  9 10:55:02 itv-usvr-01 sshd[27767]: Failed password for root from 195.154.113.173 port 42066 ssh2
2019-10-09 15:15:47
165.22.118.101 attackbotsspam
Aug 13 02:53:26 server sshd\[227584\]: Invalid user aaa from 165.22.118.101
Aug 13 02:53:26 server sshd\[227584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.118.101
Aug 13 02:53:28 server sshd\[227584\]: Failed password for invalid user aaa from 165.22.118.101 port 35992 ssh2
...
2019-10-09 15:10:30
165.22.124.220 attackspambots
Jun 22 17:36:19 server sshd\[237887\]: Invalid user sinusbot from 165.22.124.220
Jun 22 17:36:19 server sshd\[237887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.124.220
Jun 22 17:36:21 server sshd\[237887\]: Failed password for invalid user sinusbot from 165.22.124.220 port 40274 ssh2
...
2019-10-09 15:08:57
112.216.129.138 attackbots
Oct  8 20:39:54 web9 sshd\[20615\]: Invalid user P@ssw0rd12345 from 112.216.129.138
Oct  8 20:39:54 web9 sshd\[20615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.129.138
Oct  8 20:39:56 web9 sshd\[20615\]: Failed password for invalid user P@ssw0rd12345 from 112.216.129.138 port 60288 ssh2
Oct  8 20:44:39 web9 sshd\[21431\]: Invalid user P@ssw0rd12345 from 112.216.129.138
Oct  8 20:44:39 web9 sshd\[21431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.129.138
2019-10-09 15:36:07
45.168.56.231 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.168.56.231/ 
 BR - 1H : (290)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN268030 
 
 IP : 45.168.56.231 
 
 CIDR : 45.168.56.0/22 
 
 PREFIX COUNT : 1 
 
 UNIQUE IP COUNT : 1024 
 
 
 WYKRYTE ATAKI Z ASN268030 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-09 05:55:00 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-09 15:20:26
163.43.114.149 attackspambots
May 17 01:27:44 server sshd\[95988\]: Invalid user redmine from 163.43.114.149
May 17 01:27:44 server sshd\[95988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.43.114.149
May 17 01:27:46 server sshd\[95988\]: Failed password for invalid user redmine from 163.43.114.149 port 54932 ssh2
...
2019-10-09 15:39:40

最近上报的IP列表

245.197.174.93 234.154.71.168 98.204.119.199 192.50.102.172
138.215.178.166 66.198.110.248 229.95.133.213 35.82.90.85
144.100.147.79 86.252.191.107 219.20.46.116 194.236.25.52
163.206.43.167 118.193.166.120 238.160.27.121 69.47.106.232
137.49.197.241 142.160.236.187 199.105.60.99 214.87.232.207