必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.114.30.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.114.30.245.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:01:47 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 245.30.114.144.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.30.114.144.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.211.131 attackbots
Apr 19 17:04:11 xeon sshd[2706]: Failed password for root from 122.51.211.131 port 54048 ssh2
2020-04-19 23:51:51
110.43.208.244 attackbotsspam
[MK-Root1] Blocked by UFW
2020-04-19 23:31:21
68.183.239.46 attackbotsspam
Lines containing failures of 68.183.239.46
Apr 19 13:40:49 shared06 sshd[893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.239.46  user=r.r
Apr 19 13:40:51 shared06 sshd[893]: Failed password for r.r from 68.183.239.46 port 59368 ssh2
Apr 19 13:40:51 shared06 sshd[893]: Received disconnect from 68.183.239.46 port 59368:11: Bye Bye [preauth]
Apr 19 13:40:51 shared06 sshd[893]: Disconnected from authenticating user r.r 68.183.239.46 port 59368 [preauth]
Apr 19 13:53:47 shared06 sshd[5783]: Invalid user postgres from 68.183.239.46 port 55290
Apr 19 13:53:47 shared06 sshd[5783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.239.46
Apr 19 13:53:48 shared06 sshd[5783]: Failed password for invalid user postgres from 68.183.239.46 port 55290 ssh2
Apr 19 13:53:49 shared06 sshd[5783]: Received disconnect from 68.183.239.46 port 55290:11: Bye Bye [preauth]
Apr 19 13:53:49 shared06 ss........
------------------------------
2020-04-19 23:35:38
37.123.163.106 attackbots
Apr 19 16:02:55 lukav-desktop sshd\[3128\]: Invalid user sw from 37.123.163.106
Apr 19 16:02:55 lukav-desktop sshd\[3128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.123.163.106
Apr 19 16:02:57 lukav-desktop sshd\[3128\]: Failed password for invalid user sw from 37.123.163.106 port 13645 ssh2
Apr 19 16:07:29 lukav-desktop sshd\[10892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.123.163.106  user=root
Apr 19 16:07:32 lukav-desktop sshd\[10892\]: Failed password for root from 37.123.163.106 port 13645 ssh2
2020-04-19 23:18:17
186.216.224.11 attackspambots
Apr 19 16:55:38 vps333114 sshd[13020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cwb.access-186.216.224.11.pektelecom.com  user=root
Apr 19 16:55:40 vps333114 sshd[13020]: Failed password for root from 186.216.224.11 port 49594 ssh2
...
2020-04-19 23:41:53
202.191.56.159 attackspam
(sshd) Failed SSH login from 202.191.56.159 (VN/Vietnam/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 19 16:34:04 amsweb01 sshd[29499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.56.159  user=root
Apr 19 16:34:06 amsweb01 sshd[29499]: Failed password for root from 202.191.56.159 port 60794 ssh2
Apr 19 16:44:52 amsweb01 sshd[31015]: Invalid user oracle from 202.191.56.159 port 51776
Apr 19 16:44:54 amsweb01 sshd[31015]: Failed password for invalid user oracle from 202.191.56.159 port 51776 ssh2
Apr 19 16:47:16 amsweb01 sshd[31476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.191.56.159  user=root
2020-04-19 23:28:32
134.175.191.248 attackspambots
Apr 19 19:10:01 itv-usvr-01 sshd[22933]: Invalid user ro from 134.175.191.248
Apr 19 19:10:01 itv-usvr-01 sshd[22933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.191.248
Apr 19 19:10:01 itv-usvr-01 sshd[22933]: Invalid user ro from 134.175.191.248
Apr 19 19:10:04 itv-usvr-01 sshd[22933]: Failed password for invalid user ro from 134.175.191.248 port 52466 ssh2
Apr 19 19:14:39 itv-usvr-01 sshd[23162]: Invalid user jz from 134.175.191.248
2020-04-19 23:41:29
212.95.154.101 attackbots
SSH invalid-user multiple login attempts
2020-04-19 23:30:04
50.236.62.30 attackbots
detected by Fail2Ban
2020-04-19 23:44:40
51.178.49.219 attack
2020-04-19T14:43:04.607469abusebot-7.cloudsearch.cf sshd[19649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.ip-51-178-49.eu  user=root
2020-04-19T14:43:06.491069abusebot-7.cloudsearch.cf sshd[19649]: Failed password for root from 51.178.49.219 port 49402 ssh2
2020-04-19T14:47:19.996213abusebot-7.cloudsearch.cf sshd[20232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.ip-51-178-49.eu  user=root
2020-04-19T14:47:21.884478abusebot-7.cloudsearch.cf sshd[20232]: Failed password for root from 51.178.49.219 port 59722 ssh2
2020-04-19T14:49:40.974381abusebot-7.cloudsearch.cf sshd[20483]: Invalid user by from 51.178.49.219 port 37042
2020-04-19T14:49:40.979463abusebot-7.cloudsearch.cf sshd[20483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.ip-51-178-49.eu
2020-04-19T14:49:40.974381abusebot-7.cloudsearch.cf sshd[20483]: Invalid user by from 51.178.49.21
...
2020-04-19 23:15:54
42.113.3.254 attack
1587297735 - 04/19/2020 14:02:15 Host: 42.113.3.254/42.113.3.254 Port: 445 TCP Blocked
2020-04-19 23:36:24
51.104.246.27 attack
Apr 19 13:51:37 server sshd[3429]: Failed password for invalid user wq from 51.104.246.27 port 60806 ssh2
Apr 19 13:57:43 server sshd[4926]: Failed password for invalid user admin from 51.104.246.27 port 58454 ssh2
Apr 19 14:01:58 server sshd[5824]: Failed password for invalid user hi from 51.104.246.27 port 50258 ssh2
2020-04-19 23:59:26
36.227.160.146 attackspam
Unauthorized connection attempt from IP address 36.227.160.146 on Port 445(SMB)
2020-04-19 23:57:31
128.199.186.75 attack
SSH/22 MH Probe, BF, Hack -
2020-04-19 23:46:04
201.0.37.229 attackbotsspam
Unauthorized connection attempt from IP address 201.0.37.229 on Port 445(SMB)
2020-04-19 23:49:35

最近上报的IP列表

40.202.193.95 244.244.145.102 190.207.227.186 220.123.119.78
161.146.253.173 254.201.98.69 28.32.241.194 83.124.115.132
207.211.17.56 15.56.52.13 129.248.185.241 82.122.112.6
237.144.164.198 60.255.224.25 245.42.78.225 123.156.49.224
232.126.131.240 104.129.142.93 6.162.115.192 88.170.178.157