必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.145.150.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34246
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.145.150.169.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 04:55:56 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 169.150.145.118.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 118.145.150.169.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.132.220.0 attack
10 attempts against mh-pma-try-ban on pluto.magehost.pro
2019-06-22 23:45:29
223.255.127.63 attackbotsspam
IP: 223.255.127.63
ASN: AS4847 China Networks Inter-Exchange
Port: IMAP over TLS protocol 993
Found in one or more Blacklists
Date: 22/06/2019 2:44:50 PM UTC
2019-06-23 00:31:23
63.41.36.219 attackspam
Jun 22 09:21:52 askasleikir sshd[32288]: Failed password for invalid user anderson from 63.41.36.219 port 47983 ssh2
2019-06-23 00:25:04
186.236.108.32 attack
Jun 22 10:44:37 web1 postfix/smtpd[22288]: warning: unknown[186.236.108.32]: SASL PLAIN authentication failed: authentication failure
...
2019-06-23 00:46:31
107.170.239.108 attack
52122/tcp 119/tcp 7001/tcp...
[2019-04-22/06-22]58pkt,47pt.(tcp),6pt.(udp)
2019-06-23 00:12:05
185.2.31.153 attack
Automatic report - SSH Brute-Force Attack
2019-06-23 00:35:45
94.12.8.141 attackbotsspam
scan z
2019-06-22 23:57:13
103.54.30.241 attack
Spam to target mail address hacked/leaked/bought from Kachingle
2019-06-22 23:49:52
218.30.103.5 attackspambots
IP: 218.30.103.5
ASN: AS23724 IDC  China Telecommunications Corporation
Port: World Wide Web HTTP 80
Found in one or more Blacklists
Date: 22/06/2019 2:44:45 PM UTC
2019-06-23 00:37:50
212.60.5.166 attackbotsspam
Unauthorised access (Jun 22) SRC=212.60.5.166 LEN=40 TTL=55 ID=51490 TCP DPT=8080 WINDOW=16685 SYN 
Unauthorised access (Jun 21) SRC=212.60.5.166 LEN=40 TTL=55 ID=4518 TCP DPT=8080 WINDOW=11023 SYN 
Unauthorised access (Jun 20) SRC=212.60.5.166 LEN=40 TTL=55 ID=1744 TCP DPT=8080 WINDOW=11023 SYN 
Unauthorised access (Jun 19) SRC=212.60.5.166 LEN=40 TTL=55 ID=20735 TCP DPT=8080 WINDOW=16685 SYN 
Unauthorised access (Jun 19) SRC=212.60.5.166 LEN=40 TTL=55 ID=53522 TCP DPT=8080 WINDOW=11023 SYN 
Unauthorised access (Jun 18) SRC=212.60.5.166 LEN=40 TTL=55 ID=57805 TCP DPT=8080 WINDOW=16685 SYN 
Unauthorised access (Jun 17) SRC=212.60.5.166 LEN=40 TTL=55 ID=55712 TCP DPT=8080 WINDOW=11023 SYN 
Unauthorised access (Jun 17) SRC=212.60.5.166 LEN=40 TTL=55 ID=14156 TCP DPT=8080 WINDOW=16685 SYN 
Unauthorised access (Jun 17) SRC=212.60.5.166 LEN=40 TTL=55 ID=28003 TCP DPT=8080 WINDOW=16685 SYN 
Unauthorised access (Jun 16) SRC=212.60.5.166 LEN=40 TTL=55 ID=27 TCP DPT=8080 WINDOW=11023 SYN
2019-06-22 23:49:09
77.40.110.41 attackspambots
2019-06-22T16:41:06.419141mail01 postfix/smtpd[13121]: warning: unknown[77.40.110.41]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-22T16:43:18.406894mail01 postfix/smtpd[13121]: warning: unknown[77.40.110.41]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-22T16:45:37.414127mail01 postfix/smtpd[13121]: warning: unknown[77.40.110.41]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-23 00:06:58
14.115.107.14 attackspambots
Jun 22 15:51:26 rama sshd[582641]: Bad protocol version identification '' from 14.115.107.14
Jun 22 15:52:49 rama sshd[582693]: Invalid user support from 14.115.107.14
Jun 22 15:53:01 rama sshd[582693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.115.107.14 
Jun 22 15:53:03 rama sshd[582693]: Failed password for invalid user support from 14.115.107.14 port 36399 ssh2
Jun 22 15:53:08 rama sshd[582693]: Connection closed by 14.115.107.14 [preauth]
Jun 22 15:54:02 rama sshd[582929]: Invalid user ubnt from 14.115.107.14
Jun 22 15:54:12 rama sshd[582929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.115.107.14 
Jun 22 15:54:14 rama sshd[582929]: Failed password for invalid user ubnt from 14.115.107.14 port 59786 ssh2
Jun 22 15:54:18 rama sshd[582929]: Connection closed by 14.115.107.14 [preauth]
Jun 22 15:55:32 rama sshd[583166]: Invalid user cisco from 14.115.107.14
Jun 22 15:55:36 ........
-------------------------------
2019-06-23 00:34:08
162.243.150.192 attackspambots
15777/tcp 19204/tcp 11461/tcp...
[2019-04-21/06-20]55pkt,38pt.(tcp),3pt.(udp)
2019-06-22 23:52:32
107.170.203.145 attackspambots
5432/tcp 81/tcp 60057/tcp...
[2019-04-22/06-22]63pkt,50pt.(tcp),2pt.(udp)
2019-06-23 00:19:55
162.243.144.152 attackbots
" "
2019-06-23 00:10:48

最近上报的IP列表

58.103.127.229 130.221.31.108 253.143.146.220 178.185.229.191
58.28.243.87 120.29.184.198 181.73.208.152 84.104.219.24
5.119.74.32 201.225.198.86 56.42.105.1 42.124.158.44
143.91.158.31 74.80.23.53 91.86.213.34 247.118.109.168
162.126.154.243 16.229.132.233 155.181.200.100 118.241.237.160