必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.0.191.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37507
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.0.191.111.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:52:55 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 111.191.0.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.191.0.145.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
70.37.104.34 attack
May 18 21:51:01 uapps sshd[29301]: Failed password for invalid user my from 70.37.104.34 port 49170 ssh2
May 18 21:51:01 uapps sshd[29301]: Received disconnect from 70.37.104.34: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=70.37.104.34
2020-05-20 02:09:27
186.225.102.58 attack
$f2bV_matches
2020-05-20 02:19:44
122.114.30.17 attack
Lines containing failures of 122.114.30.17
May 18 21:16:42 own sshd[20100]: Invalid user wjt from 122.114.30.17 port 35824
May 18 21:16:42 own sshd[20100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.30.17
May 18 21:16:43 own sshd[20100]: Failed password for invalid user wjt from 122.114.30.17 port 35824 ssh2
May 18 21:16:44 own sshd[20100]: Received disconnect from 122.114.30.17 port 35824:11: Bye Bye [preauth]
May 18 21:16:44 own sshd[20100]: Disconnected from invalid user wjt 122.114.30.17 port 35824 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.114.30.17
2020-05-20 02:08:08
128.1.132.221 attackspambots
May 19 11:44:33 lnxweb62 sshd[17307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.132.221
2020-05-20 02:12:48
116.203.184.246 attackbots
Port scan denied
2020-05-20 02:21:31
103.230.39.3 attackbotsspam
May 19 10:46:29 sd1 sshd[22810]: Invalid user admin from 103.230.39.3
May 19 10:46:29 sd1 sshd[22810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.230.39.3
May 19 10:46:31 sd1 sshd[22810]: Failed password for invalid user admin from 103.230.39.3 port 46345 ssh2
May 19 11:13:19 sd1 sshd[23738]: Invalid user admin from 103.230.39.3
May 19 11:13:19 sd1 sshd[23738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.230.39.3

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.230.39.3
2020-05-20 02:34:20
122.51.195.104 attackspam
May 19 11:39:06 vserver sshd\[22132\]: Invalid user bwt from 122.51.195.104May 19 11:39:09 vserver sshd\[22132\]: Failed password for invalid user bwt from 122.51.195.104 port 46030 ssh2May 19 11:44:19 vserver sshd\[22166\]: Invalid user nch from 122.51.195.104May 19 11:44:20 vserver sshd\[22166\]: Failed password for invalid user nch from 122.51.195.104 port 47796 ssh2
...
2020-05-20 02:16:16
213.226.114.41 attack
" "
2020-05-20 02:06:49
220.128.136.92 attackbots
1589881473 - 05/19/2020 11:44:33 Host: 220.128.136.92/220.128.136.92 Port: 445 TCP Blocked
2020-05-20 02:12:16
94.191.51.47 attack
2020-05-19T11:40:22.204951scmdmz1 sshd[17971]: Invalid user yhb from 94.191.51.47 port 45454
2020-05-19T11:40:24.551715scmdmz1 sshd[17971]: Failed password for invalid user yhb from 94.191.51.47 port 45454 ssh2
2020-05-19T11:45:07.574199scmdmz1 sshd[18550]: Invalid user kqp from 94.191.51.47 port 40200
...
2020-05-20 02:05:37
2.50.125.47 attackbots
port scan and connect, tcp 80 (http)
2020-05-20 02:03:21
14.116.211.178 attackbotsspam
19.05.2020 18:14:25 SSH access blocked by firewall
2020-05-20 02:31:31
116.101.140.111 attack
1589881432 - 05/19/2020 11:43:52 Host: 116.101.140.111/116.101.140.111 Port: 445 TCP Blocked
2020-05-20 02:20:15
91.201.245.29 attack
May 19 17:41:56 our-server-hostname postfix/smtpd[22679]: connect from unknown[91.201.245.29]
May 19 17:41:57 our-server-hostname postfix/smtpd[22679]: NOQUEUE: reject: RCPT from unknown[91.201.245.29]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
May 19 17:41:57 our-server-hostname postfix/smtpd[22679]: lost connection after eclipseT from unknown[91.201.245.29]
May 19 17:41:57 our-server-hostname postfix/smtpd[22679]: disconnect from unknown[91.201.245.29]
May 19 17:47:03 our-server-hostname postfix/smtpd[18288]: connect from unknown[91.201.245.29]
May 19 17:47:04 our-server-hostname postfix/smtpd[18288]: NOQUEUE: reject: RCPT from unknown[91.201.245.29]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
May 19 17:47:05 our-server-hostname postfix/smtpd[18288]: lost connection after eclipseT from unknown[91.201.245.29]
May 19 17:47:05 our-server-hostname postfix/smtpd[18288]: disconn........
-------------------------------
2020-05-20 02:28:28
157.230.151.241 attackspambots
May 19 11:42:54 ns37 sshd[21187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.151.241
May 19 11:42:54 ns37 sshd[21187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.151.241
2020-05-20 02:32:54

最近上报的IP列表

219.154.147.243 234.85.10.85 195.197.107.241 149.46.159.120
217.113.247.196 243.85.55.217 98.250.53.216 121.86.116.116
202.133.34.113 64.194.50.43 191.204.95.84 159.248.35.196
87.20.135.88 206.49.71.51 182.147.48.59 228.79.116.142
212.166.119.1 187.152.178.86 245.8.37.89 185.61.110.166