必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
132.148.104.36 attackspam
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-15 19:53:30
132.148.104.132 attackspambots
C1,WP GET /manga/web/wp-includes/wlwmanifest.xml
2020-07-24 12:37:32
132.148.104.142 attackspam
Automatic report - XMLRPC Attack
2020-07-13 03:30:43
132.148.106.2 attack
REQUESTED PAGE: /xmlrpc.php
2020-07-10 07:05:51
132.148.104.135 attack
Automatic report - XMLRPC Attack
2020-07-08 17:30:47
132.148.104.129 attack
Automatic report - XMLRPC Attack
2020-07-01 07:58:05
132.148.104.29 attack
Automatic report - XMLRPC Attack
2020-06-29 14:08:25
132.148.104.7 attackspam
Automatic report - XMLRPC Attack
2020-06-22 17:21:12
132.148.104.135 attack
132.148.104.135 - - [12/Jun/2020:12:18:33 -0600] "GET /newsite/wp-includes/wlwmanifest.xml HTTP/1.1" 404 10057 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36"
...
2020-06-13 05:30:53
132.148.104.4 attackspambots
Wordpress_xmlrpc_attack
2020-05-25 22:40:46
132.148.104.144 attackspam
2020-05-16T12:07:59.000Z "GET /store/wp-includes/wlwmanifest.xml HTTP/1.1" "-" "-"
2020-05-16T12:07:59.000Z "GET /store/wp-includes/wlwmanifest.xml HTTP/1.1" "-" "-"
2020-05-17 04:01:16
132.148.104.150 attackspam
Automatic report - XMLRPC Attack
2020-04-28 20:23:37
132.148.106.24 attack
132.148.106.24 - - [25/Feb/2020:07:34:52 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
132.148.106.24 - - [25/Feb/2020:07:34:52 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-02-25 16:45:42
132.148.104.160 attackspam
Automatic report - XMLRPC Attack
2020-02-23 01:20:24
132.148.106.2 attackbots
Automatic report - XMLRPC Attack
2020-02-15 05:37:41
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.10.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.148.10.145.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:14:53 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
145.10.148.132.in-addr.arpa domain name pointer ip-132-148-10-145.ip.secureserver.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.10.148.132.in-addr.arpa	name = ip-132-148-10-145.ip.secureserver.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.108.67.110 attackspambots
firewall-block, port(s): 12403/tcp
2020-05-11 01:30:40
102.96.154.82 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-11 01:31:06
193.202.45.202 attackbots
Excessive unauthorized requests: 5060
2020-05-11 01:01:07
92.35.61.122 attackspam
Unauthorized connection attempt detected from IP address 92.35.61.122 to port 5555
2020-05-11 01:28:03
181.165.198.76 attackspam
Automatic report - Port Scan Attack
2020-05-11 00:54:30
54.37.159.12 attackbotsspam
May 10 17:47:33 rotator sshd\[9977\]: Invalid user user1 from 54.37.159.12May 10 17:47:35 rotator sshd\[9977\]: Failed password for invalid user user1 from 54.37.159.12 port 59046 ssh2May 10 17:51:23 rotator sshd\[10760\]: Invalid user snovelor from 54.37.159.12May 10 17:51:24 rotator sshd\[10760\]: Failed password for invalid user snovelor from 54.37.159.12 port 39812 ssh2May 10 17:55:02 rotator sshd\[10849\]: Invalid user usuario from 54.37.159.12May 10 17:55:04 rotator sshd\[10849\]: Failed password for invalid user usuario from 54.37.159.12 port 48810 ssh2
...
2020-05-11 01:22:08
89.7.36.128 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-11 01:36:42
94.97.7.7 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-11 01:32:53
187.170.227.42 attackspam
Attempted connection to port 23.
2020-05-11 01:25:02
111.229.116.240 attackbotsspam
Bruteforce detected by fail2ban
2020-05-11 01:34:13
42.114.202.117 attackbots
"Unauthorized connection attempt on SSHD detected"
2020-05-11 01:16:46
94.141.237.42 attackspam
20/5/10@08:11:11: FAIL: Alarm-Network address from=94.141.237.42
20/5/10@08:11:11: FAIL: Alarm-Network address from=94.141.237.42
...
2020-05-11 00:54:00
193.70.37.148 attackbotsspam
SSH brutforce
2020-05-11 01:35:36
61.7.147.29 attack
May 10 19:15:55 minden010 sshd[24761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.29
May 10 19:15:57 minden010 sshd[24761]: Failed password for invalid user PBX from 61.7.147.29 port 37794 ssh2
May 10 19:20:15 minden010 sshd[27086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.29
...
2020-05-11 01:39:42
185.50.149.25 attackspam
May 10 18:41:16 relay postfix/smtpd\[17649\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 18:41:33 relay postfix/smtpd\[15094\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 18:42:56 relay postfix/smtpd\[15094\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 18:43:13 relay postfix/smtpd\[15092\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 18:43:31 relay postfix/smtpd\[17277\]: warning: unknown\[185.50.149.25\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-11 00:57:14

最近上报的IP列表

132.145.82.138 132.145.73.47 132.148.100.65 132.148.103.77
132.148.114.125 132.147.119.33 132.148.113.198 132.148.115.116
132.148.102.53 132.148.164.4 132.148.135.165 132.148.135.250
132.148.156.96 132.148.167.26 132.148.183.92 132.148.164.135
132.148.19.105 132.148.156.13 132.148.156.143 132.148.140.136