必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): SURFnet bv

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.0.31.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22281
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.0.31.208.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 02 01:38:55 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
Host 208.31.0.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 208.31.0.145.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.230.132.130 attackbots
May 17 02:54:44 ubuntu sshd[19148]: Failed password for invalid user bk from 111.230.132.130 port 57170 ssh2
May 17 02:58:09 ubuntu sshd[19214]: Failed password for git from 111.230.132.130 port 53794 ssh2
May 17 03:01:37 ubuntu sshd[19273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.132.130
2019-10-08 18:41:32
119.191.89.37 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/119.191.89.37/ 
 CN - 1H : (517)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 119.191.89.37 
 
 CIDR : 119.176.0.0/12 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 WYKRYTE ATAKI Z ASN4837 :  
  1H - 13 
  3H - 31 
  6H - 57 
 12H - 109 
 24H - 214 
 
 DateTime : 2019-10-08 05:51:45 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-08 18:31:35
178.62.194.63 attack
Aug  6 04:15:14 dallas01 sshd[23047]: Failed password for invalid user minecraft from 178.62.194.63 port 42790 ssh2
Aug  6 04:19:32 dallas01 sshd[23623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.194.63
Aug  6 04:19:34 dallas01 sshd[23623]: Failed password for invalid user mk from 178.62.194.63 port 37818 ssh2
Aug  6 04:23:36 dallas01 sshd[24528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.194.63
2019-10-08 18:29:32
68.183.188.123 attackspambots
Oct  6 01:11:06 sanyalnet-cloud-vps3 sshd[7543]: Connection from 68.183.188.123 port 56526 on 45.62.248.66 port 22
Oct  6 01:11:07 sanyalnet-cloud-vps3 sshd[7543]: User r.r from 68.183.188.123 not allowed because not listed in AllowUsers
Oct  6 01:11:07 sanyalnet-cloud-vps3 sshd[7543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.188.123  user=r.r
Oct  6 01:11:09 sanyalnet-cloud-vps3 sshd[7543]: Failed password for invalid user r.r from 68.183.188.123 port 56526 ssh2
Oct  6 01:11:09 sanyalnet-cloud-vps3 sshd[7543]: Received disconnect from 68.183.188.123: 11: Bye Bye [preauth]
Oct  6 01:18:43 sanyalnet-cloud-vps3 sshd[7763]: Connection from 68.183.188.123 port 39534 on 45.62.248.66 port 22
Oct  6 01:18:44 sanyalnet-cloud-vps3 sshd[7763]: User r.r from 68.183.188.123 not allowed because not listed in AllowUsers
Oct  6 01:18:44 sanyalnet-cloud-vps3 sshd[7763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui........
-------------------------------
2019-10-08 18:43:52
106.12.27.130 attackspambots
Oct  8 10:39:45 heissa sshd\[8670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.130  user=root
Oct  8 10:39:47 heissa sshd\[8670\]: Failed password for root from 106.12.27.130 port 42308 ssh2
Oct  8 10:43:29 heissa sshd\[9241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.130  user=root
Oct  8 10:43:31 heissa sshd\[9241\]: Failed password for root from 106.12.27.130 port 46074 ssh2
Oct  8 10:47:22 heissa sshd\[9820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.130  user=root
2019-10-08 18:49:14
111.230.135.96 attack
Jul  1 13:29:08 dallas01 sshd[10763]: Failed password for invalid user info from 111.230.135.96 port 43592 ssh2
Jul  1 13:30:25 dallas01 sshd[10979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.135.96
Jul  1 13:30:27 dallas01 sshd[10979]: Failed password for invalid user jie from 111.230.135.96 port 57750 ssh2
Jul  1 13:31:42 dallas01 sshd[11118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.135.96
2019-10-08 18:38:15
167.71.145.149 attackbotsspam
WordPress wp-login brute force :: 167.71.145.149 0.144 BYPASS [08/Oct/2019:14:51:35  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-08 18:38:43
178.63.13.154 attackbots
abuseConfidenceScore blocked for 12h
2019-10-08 18:20:14
111.230.157.219 attackbots
Apr 19 22:24:57 ubuntu sshd[17664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.157.219
Apr 19 22:24:59 ubuntu sshd[17664]: Failed password for invalid user vowel from 111.230.157.219 port 54768 ssh2
Apr 19 22:27:45 ubuntu sshd[17739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.157.219
Apr 19 22:27:47 ubuntu sshd[17739]: Failed password for invalid user oracle from 111.230.157.219 port 48964 ssh2
2019-10-08 18:33:14
159.203.201.192 attack
10/08/2019-08:40:22.595455 159.203.201.192 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-08 18:52:49
149.56.89.123 attackbots
Oct  8 12:28:15 legacy sshd[6534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123
Oct  8 12:28:17 legacy sshd[6534]: Failed password for invalid user 123 from 149.56.89.123 port 46801 ssh2
Oct  8 12:37:14 legacy sshd[6811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123
...
2019-10-08 18:42:46
111.62.12.169 attackbotsspam
Automatic report - Banned IP Access
2019-10-08 18:35:07
79.143.186.36 attackspam
Oct  8 06:15:44 eventyay sshd[25004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.186.36
Oct  8 06:15:46 eventyay sshd[25004]: Failed password for invalid user $RFV%TGB from 79.143.186.36 port 43630 ssh2
Oct  8 06:20:09 eventyay sshd[25091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.186.36
...
2019-10-08 18:21:08
142.93.47.125 attackspam
Oct  8 05:17:03 xtremcommunity sshd\[307554\]: Invalid user Geo@123 from 142.93.47.125 port 56746
Oct  8 05:17:03 xtremcommunity sshd\[307554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.47.125
Oct  8 05:17:04 xtremcommunity sshd\[307554\]: Failed password for invalid user Geo@123 from 142.93.47.125 port 56746 ssh2
Oct  8 05:21:08 xtremcommunity sshd\[307655\]: Invalid user P@ss@2018 from 142.93.47.125 port 39894
Oct  8 05:21:08 xtremcommunity sshd\[307655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.47.125
...
2019-10-08 18:55:36
103.249.100.22 attack
2019-10-08T04:02:08.518556shield sshd\[5644\]: Invalid user shinken from 103.249.100.22 port 36392
2019-10-08T04:02:08.522791shield sshd\[5644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.249.100.22
2019-10-08T04:02:10.651012shield sshd\[5644\]: Failed password for invalid user shinken from 103.249.100.22 port 36392 ssh2
2019-10-08T04:02:35.639156shield sshd\[5664\]: Invalid user shinken from 103.249.100.22 port 45514
2019-10-08T04:02:35.643617shield sshd\[5664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.249.100.22
2019-10-08 18:30:39

最近上报的IP列表

114.32.127.78 187.1.27.245 76.157.174.195 57.221.149.137
147.14.81.125 52.15.29.210 197.234.132.115 63.19.19.191
177.223.48.74 73.254.116.87 38.211.28.189 175.100.20.254
203.75.63.141 223.148.148.70 97.134.0.124 47.38.166.141
167.23.161.50 141.117.168.9 161.50.247.82 63.221.250.244