必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
123.145.5.55 attackbots
Unauthorized connection attempt detected from IP address 123.145.5.55 to port 1521
2020-03-29 13:22:33
123.145.56.144 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 94 - Tue May  1 23:55:15 2018
2020-02-25 07:20:13
123.145.5.26 attackbots
Unauthorized connection attempt detected from IP address 123.145.5.26 to port 8000 [J]
2020-01-27 14:43:35
123.145.5.92 attack
The IP has triggered Cloudflare WAF. CF-Ray: 541222f6f808ed47 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.062334851 Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-07 23:37:05
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.145.5.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37452
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.145.5.144.			IN	A

;; AUTHORITY SECTION:
.			311	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:00:05 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 144.5.145.123.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.5.145.123.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
101.71.129.48 attackbotsspam
2020-06-14T00:19:41.645954mail.standpoint.com.ua sshd[6893]: Failed password for invalid user libby from 101.71.129.48 port 9705 ssh2
2020-06-14T00:22:01.238505mail.standpoint.com.ua sshd[7259]: Invalid user tom from 101.71.129.48 port 9706
2020-06-14T00:22:01.241302mail.standpoint.com.ua sshd[7259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.129.48
2020-06-14T00:22:01.238505mail.standpoint.com.ua sshd[7259]: Invalid user tom from 101.71.129.48 port 9706
2020-06-14T00:22:03.420577mail.standpoint.com.ua sshd[7259]: Failed password for invalid user tom from 101.71.129.48 port 9706 ssh2
...
2020-06-14 08:09:26
113.172.179.235 attackbots
Unauthorized IMAP connection attempt
2020-06-14 08:04:02
181.196.190.130 attackspam
2020-06-13T22:56:25.200892randservbullet-proofcloud-66.localdomain sshd[11549]: Invalid user admin from 181.196.190.130 port 39586
2020-06-13T22:56:25.205811randservbullet-proofcloud-66.localdomain sshd[11549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.196.190.130
2020-06-13T22:56:25.200892randservbullet-proofcloud-66.localdomain sshd[11549]: Invalid user admin from 181.196.190.130 port 39586
2020-06-13T22:56:26.957506randservbullet-proofcloud-66.localdomain sshd[11549]: Failed password for invalid user admin from 181.196.190.130 port 39586 ssh2
...
2020-06-14 08:05:09
156.96.156.136 attackbotsspam
*Port Scan* detected from 156.96.156.136 (US/United States/-). 11 hits in the last 271 seconds
2020-06-14 07:57:30
175.98.112.29 attackspam
k+ssh-bruteforce
2020-06-14 07:45:37
124.43.9.184 attackbots
(sshd) Failed SSH login from 124.43.9.184 (LK/Sri Lanka/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 13 23:10:08 ubnt-55d23 sshd[11565]: Invalid user postgres from 124.43.9.184 port 53836
Jun 13 23:10:09 ubnt-55d23 sshd[11565]: Failed password for invalid user postgres from 124.43.9.184 port 53836 ssh2
2020-06-14 08:16:16
181.114.232.54 attack
trying to access non-authorized port
2020-06-14 07:44:07
129.28.162.214 attack
Jun 13 22:10:56 onepixel sshd[851770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.162.214 
Jun 13 22:10:56 onepixel sshd[851770]: Invalid user admin from 129.28.162.214 port 35658
Jun 13 22:10:59 onepixel sshd[851770]: Failed password for invalid user admin from 129.28.162.214 port 35658 ssh2
Jun 13 22:12:58 onepixel sshd[852039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.162.214  user=root
Jun 13 22:13:00 onepixel sshd[852039]: Failed password for root from 129.28.162.214 port 57220 ssh2
2020-06-14 07:40:22
114.67.123.3 attackspambots
Jun 13 23:33:13 game-panel sshd[15458]: Failed password for root from 114.67.123.3 port 3055 ssh2
Jun 13 23:36:12 game-panel sshd[15572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.123.3
Jun 13 23:36:14 game-panel sshd[15572]: Failed password for invalid user mailman from 114.67.123.3 port 3056 ssh2
2020-06-14 07:58:16
111.230.226.124 attack
Jun 14 02:07:06 home sshd[19086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.226.124
Jun 14 02:07:08 home sshd[19086]: Failed password for invalid user dovecot from 111.230.226.124 port 53428 ssh2
Jun 14 02:08:33 home sshd[20161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.226.124
...
2020-06-14 08:15:40
5.3.87.8 attackbots
2020-06-14T00:08:09.215261sd-86998 sshd[22234]: Invalid user deploy from 5.3.87.8 port 51794
2020-06-14T00:08:09.220953sd-86998 sshd[22234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.87.8
2020-06-14T00:08:09.215261sd-86998 sshd[22234]: Invalid user deploy from 5.3.87.8 port 51794
2020-06-14T00:08:11.404428sd-86998 sshd[22234]: Failed password for invalid user deploy from 5.3.87.8 port 51794 ssh2
2020-06-14T00:11:26.038263sd-86998 sshd[22744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.87.8  user=root
2020-06-14T00:11:27.930836sd-86998 sshd[22744]: Failed password for root from 5.3.87.8 port 51256 ssh2
...
2020-06-14 08:04:30
122.155.174.36 attack
Invalid user xavier from 122.155.174.36 port 53350
2020-06-14 07:48:54
85.209.0.100 attack
[H1.VM8] Blocked by UFW
2020-06-14 07:52:47
61.177.172.102 attackspambots
Jun 13 19:40:02 NPSTNNYC01T sshd[15926]: Failed password for root from 61.177.172.102 port 58280 ssh2
Jun 13 19:40:11 NPSTNNYC01T sshd[15933]: Failed password for root from 61.177.172.102 port 36842 ssh2
...
2020-06-14 07:42:37
93.99.134.148 attack
Jun 13 22:57:19 mail.srvfarm.net postfix/smtpd[1295659]: warning: unknown[93.99.134.148]: SASL PLAIN authentication failed: 
Jun 13 22:57:19 mail.srvfarm.net postfix/smtpd[1295659]: lost connection after AUTH from unknown[93.99.134.148]
Jun 13 22:59:52 mail.srvfarm.net postfix/smtpd[1295659]: lost connection after CONNECT from unknown[93.99.134.148]
Jun 13 23:05:58 mail.srvfarm.net postfix/smtps/smtpd[1295672]: warning: unknown[93.99.134.148]: SASL PLAIN authentication failed: 
Jun 13 23:05:58 mail.srvfarm.net postfix/smtps/smtpd[1295672]: lost connection after AUTH from unknown[93.99.134.148]
2020-06-14 08:07:11

最近上报的IP列表

123.145.4.134 123.145.40.204 123.145.6.159 123.145.6.199
123.145.7.221 123.145.9.197 123.145.9.20 123.146.216.104
123.145.9.67 123.149.1.193 123.146.226.238 123.149.49.1
123.154.93.252 123.155.3.158 123.155.43.48 123.157.192.157
123.157.192.100 123.157.192.183 123.157.192.235 123.157.192.216