必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.45.91.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30543
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.45.91.117.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:29:44 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 117.91.45.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 117.91.45.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.223.89.238 attack
2019-12-26T16:09:00.173859shield sshd\[13870\]: Invalid user dfgfdg from 27.223.89.238 port 38411
2019-12-26T16:09:00.178820shield sshd\[13870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.223.89.238
2019-12-26T16:09:01.806753shield sshd\[13870\]: Failed password for invalid user dfgfdg from 27.223.89.238 port 38411 ssh2
2019-12-26T16:12:43.551905shield sshd\[14838\]: Invalid user !@\#\$\&\* from 27.223.89.238 port 48888
2019-12-26T16:12:43.556109shield sshd\[14838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.223.89.238
2019-12-27 03:51:55
54.38.160.4 attack
Dec 26 14:46:49 ldap01vmsma01 sshd[75158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.160.4
Dec 26 14:46:51 ldap01vmsma01 sshd[75158]: Failed password for invalid user ozp from 54.38.160.4 port 54612 ssh2
...
2019-12-27 03:57:57
187.7.157.144 attackspam
Dec 26 17:35:43 raspberrypi sshd\[12548\]: Failed password for root from 187.7.157.144 port 46062 ssh2Dec 26 17:41:40 raspberrypi sshd\[13082\]: Invalid user anabela from 187.7.157.144Dec 26 17:41:43 raspberrypi sshd\[13082\]: Failed password for invalid user anabela from 187.7.157.144 port 57206 ssh2
...
2019-12-27 03:49:39
189.213.104.180 attackbots
Automatic report - Port Scan Attack
2019-12-27 03:45:27
222.186.175.217 attackspambots
Dec 26 20:53:10 51-15-180-239 sshd[11882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
Dec 26 20:53:12 51-15-180-239 sshd[11882]: Failed password for root from 222.186.175.217 port 63066 ssh2
...
2019-12-27 03:54:33
196.200.184.22 attackbotsspam
Dec 26 12:34:34 www sshd[23346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.184.22  user=r.r
Dec 26 12:34:36 www sshd[23346]: Failed password for r.r from 196.200.184.22 port 50904 ssh2
Dec 26 12:34:36 www sshd[23346]: Received disconnect from 196.200.184.22 port 50904:11: Bye Bye [preauth]
Dec 26 12:34:36 www sshd[23346]: Disconnected from 196.200.184.22 port 50904 [preauth]
Dec 26 12:43:58 www sshd[23966]: Failed password for invalid user lilli from 196.200.184.22 port 55272 ssh2
Dec 26 12:43:58 www sshd[23966]: Received disconnect from 196.200.184.22 port 55272:11: Bye Bye [preauth]
Dec 26 12:43:58 www sshd[23966]: Disconnected from 196.200.184.22 port 55272 [preauth]
Dec 26 12:46:20 www sshd[24064]: Failed password for invalid user odoo from 196.200.184.22 port 34744 ssh2
Dec 26 12:46:21 www sshd[24064]: Received disconnect from 196.200.184.22 port 34744:11: Bye Bye [preauth]
Dec 26 12:46:21 www sshd[24064]: Disco........
-------------------------------
2019-12-27 03:58:46
49.88.112.68 attack
Dec 26 22:11:26 www sshd\[25686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
Dec 26 22:11:27 www sshd\[25686\]: Failed password for root from 49.88.112.68 port 56002 ssh2
Dec 26 22:13:54 www sshd\[25714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
...
2019-12-27 04:14:50
151.84.105.118 attack
Dec 26 21:57:53 *** sshd[13279]: Failed password for invalid user rifle from 151.84.105.118 port 59836 ssh2
Dec 26 22:16:16 *** sshd[13571]: Failed password for invalid user aminuddin from 151.84.105.118 port 46696 ssh2
Dec 26 22:25:27 *** sshd[13674]: Failed password for invalid user spam from 151.84.105.118 port 46404 ssh2
Dec 26 22:34:07 *** sshd[13746]: Failed password for invalid user com from 151.84.105.118 port 46118 ssh2
Dec 26 22:38:30 *** sshd[13790]: Failed password for invalid user cavin from 151.84.105.118 port 45976 ssh2
Dec 26 22:47:08 *** sshd[13927]: Failed password for invalid user jffnms from 151.84.105.118 port 45694 ssh2
Dec 26 22:51:28 *** sshd[13969]: Failed password for invalid user 123456 from 151.84.105.118 port 45554 ssh2
Dec 26 22:57:00 *** sshd[14025]: Failed password for invalid user louthan from 151.84.105.118 port 45390 ssh2
Dec 26 23:01:30 *** sshd[14116]: Failed password for invalid user th123 from 151.84.105.118 port 45250 ssh2
Dec 26 23:05:48 *** sshd[14158]: Failed passwor
2019-12-27 04:06:29
52.157.192.40 attackbots
Dec 26 15:20:17 localhost sshd\[57677\]: Invalid user stiles from 52.157.192.40 port 1280
Dec 26 15:20:17 localhost sshd\[57677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.157.192.40
Dec 26 15:20:19 localhost sshd\[57677\]: Failed password for invalid user stiles from 52.157.192.40 port 1280 ssh2
Dec 26 15:22:29 localhost sshd\[57707\]: Invalid user santino from 52.157.192.40 port 1280
Dec 26 15:22:29 localhost sshd\[57707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.157.192.40
...
2019-12-27 03:51:04
182.35.83.133 attack
Dec 26 09:30:39 esmtp postfix/smtpd[11380]: lost connection after AUTH from unknown[182.35.83.133]
Dec 26 09:30:45 esmtp postfix/smtpd[11566]: lost connection after AUTH from unknown[182.35.83.133]
Dec 26 09:30:49 esmtp postfix/smtpd[11555]: lost connection after AUTH from unknown[182.35.83.133]
Dec 26 09:30:53 esmtp postfix/smtpd[11380]: lost connection after AUTH from unknown[182.35.83.133]
Dec 26 09:30:58 esmtp postfix/smtpd[11555]: lost connection after AUTH from unknown[182.35.83.133]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.35.83.133
2019-12-27 04:09:52
113.10.156.202 attackbots
Dec 26 11:42:08 plusreed sshd[3907]: Invalid user latronce from 113.10.156.202
...
2019-12-27 04:04:48
122.165.207.151 attackbots
Dec 26 17:33:06 localhost sshd[52681]: Failed password for invalid user canto from 122.165.207.151 port 11803 ssh2
Dec 26 17:48:56 localhost sshd[53494]: Failed password for root from 122.165.207.151 port 46437 ssh2
Dec 26 17:54:26 localhost sshd[54423]: Failed password for invalid user server from 122.165.207.151 port 63623 ssh2
2019-12-27 04:13:12
213.251.41.52 attack
Dec 26 20:41:24 MK-Soft-VM8 sshd[9568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.41.52 
Dec 26 20:41:27 MK-Soft-VM8 sshd[9568]: Failed password for invalid user guest from 213.251.41.52 port 56804 ssh2
...
2019-12-27 03:50:19
129.204.38.136 attackbots
Dec 26 15:17:12 zeus sshd[1240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.38.136 
Dec 26 15:17:13 zeus sshd[1240]: Failed password for invalid user zxcv from 129.204.38.136 port 44654 ssh2
Dec 26 15:20:35 zeus sshd[1335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.38.136 
Dec 26 15:20:37 zeus sshd[1335]: Failed password for invalid user beater from 129.204.38.136 port 38802 ssh2
2019-12-27 03:43:59
106.12.123.62 attackspambots
thinkphp
2019-12-27 04:06:51

最近上报的IP列表

60.251.30.191 199.125.192.99 170.64.122.153 194.182.4.148
126.183.154.153 29.36.125.167 192.231.202.45 209.149.227.238
108.54.87.138 32.114.149.105 138.202.11.42 29.229.217.136
127.108.35.168 76.93.139.30 131.198.175.207 154.37.127.155
150.218.39.11 35.208.45.24 9.34.253.114 211.49.171.189