必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Slough

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
132.145.206.104 attack
Unauthorized connection attempt detected from IP address 132.145.206.104 to port 22 [T]
2020-05-15 01:36:49
132.145.209.40 attackspam
Invalid user ymachado from 132.145.209.40 port 64521
2020-04-21 20:46:59
132.145.200.223 attack
Apr 18 22:16:33 piServer sshd[1533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.200.223 
Apr 18 22:16:34 piServer sshd[1533]: Failed password for invalid user re from 132.145.200.223 port 41244 ssh2
Apr 18 22:21:03 piServer sshd[1942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.200.223 
...
2020-04-19 04:23:00
132.145.200.223 attackbots
Apr 17 16:32:07 163-172-32-151 sshd[4746]: Invalid user testing from 132.145.200.223 port 35632
...
2020-04-17 22:52:37
132.145.209.1 attackspambots
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-04-17 05:33:16
132.145.200.223 attackbotsspam
k+ssh-bruteforce
2020-04-16 23:18:36
132.145.200.223 attack
Apr 15 21:16:41 vps58358 sshd\[31149\]: Invalid user admin from 132.145.200.223Apr 15 21:16:43 vps58358 sshd\[31149\]: Failed password for invalid user admin from 132.145.200.223 port 34070 ssh2Apr 15 21:21:01 vps58358 sshd\[31207\]: Invalid user test from 132.145.200.223Apr 15 21:21:03 vps58358 sshd\[31207\]: Failed password for invalid user test from 132.145.200.223 port 43744 ssh2Apr 15 21:25:31 vps58358 sshd\[31256\]: Invalid user nagios from 132.145.200.223Apr 15 21:25:33 vps58358 sshd\[31256\]: Failed password for invalid user nagios from 132.145.200.223 port 53400 ssh2
...
2020-04-16 05:21:23
132.145.200.223 attackbots
Apr 14 02:10:27 lukav-desktop sshd\[25824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.200.223  user=root
Apr 14 02:10:28 lukav-desktop sshd\[25824\]: Failed password for root from 132.145.200.223 port 41038 ssh2
Apr 14 02:14:52 lukav-desktop sshd\[26118\]: Invalid user jamaica from 132.145.200.223
Apr 14 02:14:52 lukav-desktop sshd\[26118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.200.223
Apr 14 02:14:54 lukav-desktop sshd\[26118\]: Failed password for invalid user jamaica from 132.145.200.223 port 53466 ssh2
2020-04-14 08:03:17
132.145.209.1 attack
SSH brute force
2020-04-11 01:30:37
132.145.209.1 attackspam
Lines containing failures of 132.145.209.1
Mar 11 22:54:02 myhost sshd[22787]: Invalid user ghostnamelab-prometheus from 132.145.209.1 port 35926
Mar 11 22:54:02 myhost sshd[22787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.209.1
Mar 11 22:54:04 myhost sshd[22787]: Failed password for invalid user ghostnamelab-prometheus from 132.145.209.1 port 35926 ssh2
Mar 11 22:54:04 myhost sshd[22787]: Received disconnect from 132.145.209.1 port 35926:11: Bye Bye [preauth]
Mar 11 22:54:04 myhost sshd[22787]: Disconnected from invalid user ghostnamelab-prometheus 132.145.209.1 port 35926 [preauth]
Mar 11 23:10:51 myhost sshd[22932]: User r.r from 132.145.209.1 not allowed because not listed in AllowUsers
Mar 11 23:10:51 myhost sshd[22932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.209.1  user=r.r
Mar 11 23:10:52 myhost sshd[22932]: Failed password for invalid user r.r from 132.........
------------------------------
2020-03-13 05:08:55
132.145.202.224 attackspambots
serveres are UTC 
Lines containing failures of 132.145.202.224
Feb 13 12:05:44 tux2 sshd[31017]: Invalid user support from 132.145.202.224 port 52096
Feb 13 12:05:44 tux2 sshd[31017]: Failed password for invalid user support from 132.145.202.224 port 52096 ssh2
Feb 14 14:26:13 tux2 sshd[19640]: Invalid user support from 132.145.202.224 port 53277
Feb 14 14:26:13 tux2 sshd[19640]: Failed password for invalid user support from 132.145.202.224 port 53277 ssh2
Feb 14 17:02:39 tux2 sshd[29101]: Invalid user support from 132.145.202.224 port 54868
Feb 14 17:02:39 tux2 sshd[29101]: Failed password for invalid user support from 132.145.202.224 port 54868 ssh2



........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=132.145.202.224
2020-02-15 10:52:24
132.145.208.81 attackspambots
Nov 29 08:26:06 rtr-mst-350 sshd[12945]: Connection closed by 132.145.208.81 [preauth]
Nov 30 00:29:40 rtr-mst-350 sshd[24624]: Failed password for invalid user master from 132.145.208.81 port 55256 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=132.145.208.81
2019-12-01 01:48:56
132.145.201.163 attackbots
50 failed attempt(s) in the last 24h
2019-11-15 08:15:52
132.145.201.163 attack
Nov 14 05:11:48 auw2 sshd\[20644\]: Invalid user csgoserver from 132.145.201.163
Nov 14 05:11:48 auw2 sshd\[20644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.201.163
Nov 14 05:11:50 auw2 sshd\[20644\]: Failed password for invalid user csgoserver from 132.145.201.163 port 34674 ssh2
Nov 14 05:15:46 auw2 sshd\[20960\]: Invalid user guest from 132.145.201.163
Nov 14 05:15:46 auw2 sshd\[20960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.201.163
2019-11-14 23:27:18
132.145.201.163 attackbots
Nov  4 15:19:29 gw1 sshd[25766]: Failed password for root from 132.145.201.163 port 21329 ssh2
...
2019-11-04 21:17:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.145.20.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.145.20.172.			IN	A

;; AUTHORITY SECTION:
.			526	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023101102 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 12 10:30:11 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 172.20.145.132.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.20.145.132.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.47.19 attackspambots
(sshd) Failed SSH login from 106.13.47.19 (CN/China/-): 5 in the last 3600 secs
2020-06-03 00:48:45
1.235.192.218 attackbotsspam
SSH Brute Force
2020-06-03 00:24:56
196.34.18.94 attackbots
Jun  2 16:07:01 vps639187 sshd\[6146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.34.18.94  user=root
Jun  2 16:07:03 vps639187 sshd\[6146\]: Failed password for root from 196.34.18.94 port 59304 ssh2
Jun  2 16:09:47 vps639187 sshd\[6205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.34.18.94  user=root
...
2020-06-03 00:34:33
185.38.175.71 attackbots
Automatic report - Banned IP Access
2020-06-03 00:17:39
119.207.126.21 attackspambots
2020-06-02T16:28:57.473476struts4.enskede.local sshd\[4323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.126.21  user=root
2020-06-02T16:28:59.581103struts4.enskede.local sshd\[4323\]: Failed password for root from 119.207.126.21 port 45996 ssh2
2020-06-02T16:33:12.938455struts4.enskede.local sshd\[4353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.126.21  user=root
2020-06-02T16:33:16.558807struts4.enskede.local sshd\[4353\]: Failed password for root from 119.207.126.21 port 52430 ssh2
2020-06-02T16:37:33.990461struts4.enskede.local sshd\[4373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.126.21  user=root
...
2020-06-03 00:21:02
118.89.69.159 attackspam
Jun  2 18:11:29 piServer sshd[24446]: Failed password for root from 118.89.69.159 port 58598 ssh2
Jun  2 18:14:57 piServer sshd[24691]: Failed password for root from 118.89.69.159 port 38408 ssh2
...
2020-06-03 00:30:57
2.228.163.157 attackspambots
2020-06-02T16:59:25.063868mail.broermann.family sshd[29268]: Failed password for root from 2.228.163.157 port 52778 ssh2
2020-06-02T17:03:00.070396mail.broermann.family sshd[29707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2-228-163-157.ip192.fastwebnet.it  user=root
2020-06-02T17:03:01.943074mail.broermann.family sshd[29707]: Failed password for root from 2.228.163.157 port 58446 ssh2
2020-06-02T17:06:32.518155mail.broermann.family sshd[30123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2-228-163-157.ip192.fastwebnet.it  user=root
2020-06-02T17:06:34.825878mail.broermann.family sshd[30123]: Failed password for root from 2.228.163.157 port 35874 ssh2
...
2020-06-03 00:32:43
54.162.223.100 attack
2020/06/02 13:03:55 \[error\] 27758\#27758: \*15553 open\(\) "/volume1/web/wordpress/404javascript.js" failed \(2: No such file or directory\), client: 54.162.223.100, server: blog.rakkor.uk, request: "GET /404javascript.js HTTP/1.1", host: "blog.rakkor.uk", referrer: "http://blog.rakkor.uk/404javascript.js"
2020/06/02 13:03:55 \[error\] 27759\#27759: \*15551 open\(\) "/volume1/web/wordpress/404testpage4525d2fdc" failed \(2: No such file or directory\), client: 54.162.223.100, server: blog.rakkor.uk, request: "GET /404testpage4525d2fdc HTTP/1.1", host: "blog.rakkor.uk", referrer: "http://blog.rakkor.uk/404testpage4525d2fdc"
2020/06/02 13:03:55 \[error\] 27758\#27758: \*15554 open\(\) "/volume1/web/wordpress/.git/HEAD" failed \(2: No such file or directory\), client: 54.162.223.100, server: blog.rakkor.uk, request: "GET /.git/HEAD HTTP/1.1", host: "blog.rakkor.uk", referrer: "http://blog.rakkor.uk/.git/HEAD"
2020-06-03 00:56:35
104.198.176.196 attackbots
May 31 13:32:53 v2202003116398111542 sshd[1527614]: Invalid user zxin10 from 104.198.176.196 port 33066
May 31 13:32:53 v2202003116398111542 sshd[1527614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.198.176.196 
May 31 13:32:56 v2202003116398111542 sshd[1527614]: Failed password for invalid user zxin10 from 104.198.176.196 port 33066 ssh2
May 31 13:32:57 v2202003116398111542 sshd[1527614]: Disconnected from invalid user zxin10 104.198.176.196 port 33066 [preauth]
2020-06-03 00:27:55
177.1.214.84 attackspam
2020-06-02T10:22:58.947575server.mjenks.net sshd[2903852]: Failed password for root from 177.1.214.84 port 3655 ssh2
2020-06-02T10:24:42.798265server.mjenks.net sshd[2904023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84  user=root
2020-06-02T10:24:44.745184server.mjenks.net sshd[2904023]: Failed password for root from 177.1.214.84 port 35020 ssh2
2020-06-02T10:26:28.776391server.mjenks.net sshd[2904270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84  user=root
2020-06-02T10:26:30.276450server.mjenks.net sshd[2904270]: Failed password for root from 177.1.214.84 port 19411 ssh2
...
2020-06-03 00:40:06
144.217.214.100 attackbots
Blocked until: 2020.07.20 20:52:41 TCPMSS DPT=24021 LEN=40 TOS=0x18 PREC=0x00 TTL=243 ID=65213 PROTO=TCP WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-03 00:42:42
92.63.103.154 attackspambots
20 attempts against mh-misbehave-ban on pole
2020-06-03 00:43:11
190.55.158.182 attackbotsspam
Jun  2 13:57:52 mxgate1 postfix/postscreen[1621]: CONNECT from [190.55.158.182]:14039 to [176.31.12.44]:25
Jun  2 13:57:52 mxgate1 postfix/dnsblog[1624]: addr 190.55.158.182 listed by domain zen.spamhaus.org as 127.0.0.4
Jun  2 13:57:52 mxgate1 postfix/dnsblog[1624]: addr 190.55.158.182 listed by domain zen.spamhaus.org as 127.0.0.11
Jun  2 13:57:52 mxgate1 postfix/dnsblog[1622]: addr 190.55.158.182 listed by domain cbl.abuseat.org as 127.0.0.2
Jun  2 13:57:53 mxgate1 postfix/dnsblog[1627]: addr 190.55.158.182 listed by domain b.barracudacentral.org as 127.0.0.2
Jun  2 13:57:58 mxgate1 postfix/postscreen[1621]: DNSBL rank 4 for [190.55.158.182]:14039
Jun x@x
Jun  2 13:57:59 mxgate1 postfix/postscreen[1621]: HANGUP after 1.2 from [190.55.158.182]:14039 in tests after SMTP handshake
Jun  2 13:57:59 mxgate1 postfix/postscreen[1621]: DISCONNECT [190.55.158.182]:14039


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.55.158.182
2020-06-03 00:43:34
89.205.227.164 attackspambots
port scan and connect, tcp 443 (https)
2020-06-03 00:37:46
106.54.87.169 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-06-03 00:38:22

最近上报的IP列表

218.61.26.1 91.74.48.200 52.70.240.171 185.182.56.170
6.48.242.72 167.172.79.103 190.98.240.85 164.68.102.224
194.180.48.86 5.161.201.55 220.79.110.219 76.36.120.119
52.100.172.226 45.249.90.14 103.148.165.207 118.163.94.248
59.124.2.12 152.199.43.61 203.69.81.49 162.0.234.14