必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.45.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.148.45.40.			IN	A

;; AUTHORITY SECTION:
.			103	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:37:08 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
40.45.148.132.in-addr.arpa domain name pointer ip-132-148-45-40.ip.secureserver.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.45.148.132.in-addr.arpa	name = ip-132-148-45-40.ip.secureserver.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.250.115.121 attack
2019-07-16T11:15:39.038327abusebot-4.cloudsearch.cf sshd\[28941\]: Invalid user osmc from 180.250.115.121 port 35212
2019-07-16 19:37:19
186.232.153.254 attackspambots
Jul 16 19:14:58 localhost sshd[15635]: Invalid user oracle from 186.232.153.254 port 53280
Jul 16 19:14:58 localhost sshd[15635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.232.153.254
Jul 16 19:14:58 localhost sshd[15635]: Invalid user oracle from 186.232.153.254 port 53280
Jul 16 19:15:00 localhost sshd[15635]: Failed password for invalid user oracle from 186.232.153.254 port 53280 ssh2
...
2019-07-16 20:08:45
130.180.193.73 attack
Jul 16 12:54:00 shared05 sshd[10259]: Invalid user ka from 130.180.193.73
Jul 16 12:54:00 shared05 sshd[10259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.193.73
Jul 16 12:54:03 shared05 sshd[10259]: Failed password for invalid user ka from 130.180.193.73 port 40976 ssh2
Jul 16 12:54:03 shared05 sshd[10259]: Received disconnect from 130.180.193.73 port 40976:11: Bye Bye [preauth]
Jul 16 12:54:03 shared05 sshd[10259]: Disconnected from 130.180.193.73 port 40976 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=130.180.193.73
2019-07-16 20:23:55
77.81.107.220 attackbotsspam
abuse-sasl
2019-07-16 20:10:59
198.211.108.148 attackspam
10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined
node-superagent/4.1.0
2019-07-16 19:42:02
24.34.65.163 attackspambots
Jul 16 09:20:55 shared06 sshd[12082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.34.65.163  user=r.r
Jul 16 09:20:57 shared06 sshd[12082]: Failed password for r.r from 24.34.65.163 port 49138 ssh2
Jul 16 09:20:57 shared06 sshd[12082]: Received disconnect from 24.34.65.163 port 49138:11: Bye Bye [preauth]
Jul 16 09:20:57 shared06 sshd[12082]: Disconnected from 24.34.65.163 port 49138 [preauth]
Jul 16 10:45:43 shared06 sshd[30364]: Invalid user steam from 24.34.65.163
Jul 16 10:45:43 shared06 sshd[30364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.34.65.163
Jul 16 10:45:45 shared06 sshd[30364]: Failed password for invalid user steam from 24.34.65.163 port 43720 ssh2
Jul 16 10:45:45 shared06 sshd[30364]: Received disconnect from 24.34.65.163 port 43720:11: Bye Bye [preauth]
Jul 16 10:45:45 shared06 sshd[30364]: Disconnected from 24.34.65.163 port 43720 [preauth]


........
---------------------------------------------
2019-07-16 20:07:37
62.169.202.6 attack
" "
2019-07-16 19:32:19
80.199.0.78 attack
abuse-sasl
2019-07-16 19:47:31
51.89.17.237 attackspam
Jul 15 15:49:09 box kernel: [1313174.313524] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:68:c5:28:99:3a:4d:30:af:08:00 SRC=51.89.17.237 DST=[munged] LEN=439 TOS=0x00 PREC=0x00 TTL=53 ID=51439 DF PROTO=UDP SPT=5069 DPT=5060 LEN=419 
Jul 15 17:10:31 box kernel: [1318055.972099] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:68:c5:28:99:3a:4d:30:af:08:00 SRC=51.89.17.237 DST=[munged] LEN=437 TOS=0x00 PREC=0x00 TTL=53 ID=23045 DF PROTO=UDP SPT=5114 DPT=5060 LEN=417 
Jul 15 18:32:08 box kernel: [1322953.578005] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:68:c5:28:99:3a:4d:30:af:08:00 SRC=51.89.17.237 DST=[munged] LEN=439 TOS=0x00 PREC=0x00 TTL=53 ID=23053 DF PROTO=UDP SPT=5109 DPT=5060 LEN=419 
Jul 16 12:20:28 box kernel: [1387053.727958] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:68:c5:28:99:3a:4d:30:af:08:00 SRC=51.89.17.237 DST=[munged] LEN=437 TOS=0x00 PREC=0x00 TTL=53 ID=26315 DF PROTO=UDP SPT=5086 DPT=5060 LEN=417 
Jul 16 13:15:44 box kernel: [1390369.461878] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:68:c5:28:99:3a:4d:30:
2019-07-16 19:32:50
31.184.238.45 attackbots
Lines containing IP31.184.238.45:

31.184.238.45 - - [15/Jul/2019:19:56:08 +0000] "POST /pod/wp-comments-post.php HTTP/1.0" 200 66828 "-" "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKhostname/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36"

Username: MojokAcactulty
Used Mailaddress: 
User IP:  31.184.238.45
Message:  In the at cock crow years he contributed erudhostnamee papers on the pathology of carpal hole syn- drome and of Morton’s metatarsalgia, but whostnamehout delay developed his earth-shaking attentiveness in osteoarthrhostnameis of the wise to—or “predominant coxarthrosis,” as he pre- ferred to notice hostnameHe was a Regent of Robert Merle d’Aubigne was born in 1900 at the American College of SurgeonsSir William Arbuthnot Lane was a surgeon of sur- There is, anyway, no be in want of to horror that passing operative dexterhostnamey and by his pioneer Lambrinudi discretion be forgottenPeople—at least those w........
-----------------------------------------------
http
2019-07-16 20:05:46
51.75.26.106 attackspam
Jul 16 13:29:01 legacy sshd[14738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.26.106
Jul 16 13:29:03 legacy sshd[14738]: Failed password for invalid user chris from 51.75.26.106 port 49806 ssh2
Jul 16 13:33:36 legacy sshd[14868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.26.106
...
2019-07-16 19:42:23
80.211.137.191 attackbotsspam
abuse-sasl
2019-07-16 19:43:42
188.166.233.64 attack
Jul 16 12:36:28 localhost sshd\[17022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.233.64  user=root
Jul 16 12:36:30 localhost sshd\[17022\]: Failed password for root from 188.166.233.64 port 45613 ssh2
...
2019-07-16 19:42:49
221.166.246.14 attackspambots
Jul 16 19:15:40 localhost sshd[15649]: Invalid user oracle from 221.166.246.14 port 37832
Jul 16 19:15:40 localhost sshd[15649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.166.246.14
Jul 16 19:15:40 localhost sshd[15649]: Invalid user oracle from 221.166.246.14 port 37832
Jul 16 19:15:42 localhost sshd[15649]: Failed password for invalid user oracle from 221.166.246.14 port 37832 ssh2
...
2019-07-16 19:33:37
157.230.113.218 attackspam
Jul 16 14:33:53 microserver sshd[50708]: Invalid user adrien from 157.230.113.218 port 57740
Jul 16 14:33:53 microserver sshd[50708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
Jul 16 14:33:55 microserver sshd[50708]: Failed password for invalid user adrien from 157.230.113.218 port 57740 ssh2
Jul 16 14:40:25 microserver sshd[52062]: Invalid user akshay from 157.230.113.218 port 55694
Jul 16 14:40:25 microserver sshd[52062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
Jul 16 14:53:06 microserver sshd[53688]: Invalid user student from 157.230.113.218 port 50204
Jul 16 14:53:06 microserver sshd[53688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.113.218
Jul 16 14:53:07 microserver sshd[53688]: Failed password for invalid user student from 157.230.113.218 port 50204 ssh2
Jul 16 14:57:29 microserver sshd[54344]: Invalid user bogota from 157.23
2019-07-16 20:12:17

最近上报的IP列表

132.148.44.208 132.148.46.89 132.148.88.246 132.148.87.185
132.148.6.129 132.148.5.121 132.148.80.84 132.148.87.193
132.148.89.105 132.148.88.224 132.148.91.234 132.148.89.91
132.148.90.6 132.148.96.99 132.148.96.84 132.148.98.47
132.148.97.109 132.148.96.116 132.148.98.17 132.148.98.239