必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.245.45.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.245.45.16.			IN	A

;; AUTHORITY SECTION:
.			313	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:55:48 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 16.45.245.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.45.245.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
148.72.208.210 attackbotsspam
Sep  8 06:02:21 vpn01 sshd[16461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.208.210
Sep  8 06:02:23 vpn01 sshd[16461]: Failed password for invalid user biz from 148.72.208.210 port 49432 ssh2
...
2020-09-08 12:02:46
201.151.166.170 attack
20/9/7@12:55:36: FAIL: Alarm-Network address from=201.151.166.170
20/9/7@12:55:36: FAIL: Alarm-Network address from=201.151.166.170
...
2020-09-08 12:11:52
120.131.3.91 attackbotsspam
firewall-block, port(s): 26910/tcp
2020-09-08 09:08:38
185.220.101.216 attack
Scanned 23 times in the last 24 hours on port 22
2020-09-08 08:58:52
51.91.159.46 attack
Sep  8 00:24:47 plg sshd[12061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.159.46  user=root
Sep  8 00:24:50 plg sshd[12061]: Failed password for invalid user root from 51.91.159.46 port 52212 ssh2
Sep  8 00:28:02 plg sshd[12093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.159.46 
Sep  8 00:28:04 plg sshd[12093]: Failed password for invalid user martin from 51.91.159.46 port 57324 ssh2
Sep  8 00:31:26 plg sshd[12124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.159.46  user=root
Sep  8 00:31:28 plg sshd[12124]: Failed password for invalid user root from 51.91.159.46 port 34272 ssh2
...
2020-09-08 08:52:51
91.121.30.186 attackspam
2020-09-07 13:46:37 server sshd[56053]: Failed password for invalid user root from 91.121.30.186 port 49293 ssh2
2020-09-08 09:12:28
106.12.252.212 attack
Icarus honeypot on github
2020-09-08 12:06:08
110.80.17.26 attack
Sep  8 02:51:10 PorscheCustomer sshd[11116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.17.26
Sep  8 02:51:11 PorscheCustomer sshd[11116]: Failed password for invalid user CPPLUS from 110.80.17.26 port 59575 ssh2
Sep  8 02:55:59 PorscheCustomer sshd[11216]: Failed password for root from 110.80.17.26 port 61408 ssh2
...
2020-09-08 09:10:29
218.60.41.136 attackbots
Sep  7 18:55:38  sshd\[26423\]: User root from 218.60.41.136 not allowed because not listed in AllowUsersSep  7 18:55:41  sshd\[26423\]: Failed password for invalid user root from 218.60.41.136 port 52056 ssh2
...
2020-09-08 12:07:11
112.196.72.188 attackspambots
CF RAY ID: 5cf3874cd808bc42 IP Class: noRecord URI: /wp-login.php
2020-09-08 09:00:04
142.93.195.249 attackbotsspam
SSH-BruteForce
2020-09-08 08:50:27
213.142.9.46 attack
Honeypot attack, port: 5555, PTR: h213-142-9-46.cust.a3fiber.se.
2020-09-08 09:01:40
52.152.235.76 attack
Sep  7 19:33:58 srv-ubuntu-dev3 sshd[120712]: Invalid user postgres from 52.152.235.76
Sep  7 19:33:58 srv-ubuntu-dev3 sshd[120711]: Invalid user oracle from 52.152.235.76
Sep  7 19:33:58 srv-ubuntu-dev3 sshd[120716]: Invalid user centos from 52.152.235.76
Sep  7 19:33:58 srv-ubuntu-dev3 sshd[120715]: Invalid user ec2-user from 52.152.235.76
Sep  7 19:33:58 srv-ubuntu-dev3 sshd[120713]: Invalid user ubuntu from 52.152.235.76
...
2020-09-08 09:09:48
101.71.251.202 attack
(sshd) Failed SSH login from 101.71.251.202 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  7 16:39:25 optimus sshd[6896]: Invalid user rpc from 101.71.251.202
Sep  7 16:39:25 optimus sshd[6896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.251.202 
Sep  7 16:39:27 optimus sshd[6896]: Failed password for invalid user rpc from 101.71.251.202 port 33688 ssh2
Sep  7 16:49:26 optimus sshd[10292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.251.202  user=root
Sep  7 16:49:29 optimus sshd[10292]: Failed password for root from 101.71.251.202 port 50708 ssh2
2020-09-08 09:12:05
173.163.8.58 attack
port scan and connect, tcp 23 (telnet)
2020-09-08 09:09:07

最近上报的IP列表

120.245.20.23 120.25.166.60 120.25.203.29 120.25.241.73
120.253.67.78 120.26.48.129 120.27.47.179 120.27.133.182
120.28.216.128 120.28.210.68 120.28.202.106 120.28.33.126
120.29.107.215 120.253.229.15 120.29.77.30 120.29.98.171
120.33.194.100 120.32.106.39 120.33.194.61 120.34.165.230