必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): University of Twente

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): University/College/School

用户上报:
类型 评论内容 时间
attackspambots
Port scan on 1 port(s): 53
2019-08-17 16:29:02
相同子网IP讨论:
IP 类型 评论内容 时间
145.102.6.73 attackspam
Port scan on 1 port(s): 53
2020-06-25 03:23:48
145.102.6.58 attackspam
Port scan on 1 port(s): 53
2020-06-25 03:15:42
145.102.6.49 attackbots
Port scan on 1 port(s): 53
2020-06-25 03:01:10
145.102.6.49 attack
Port scan on 1 port(s): 53
2020-05-16 22:39:45
145.102.6.86 attackspambots
Port scan on 1 port(s): 53
2020-05-16 22:39:01
145.102.6.46 attackbots
Port scan on 1 port(s): 53
2020-04-28 01:12:56
145.102.6.57 attack
Port scan on 1 port(s): 53
2020-04-28 01:12:42
145.102.6.58 attackbotsspam
Port scan on 1 port(s): 53
2020-04-28 01:10:27
145.102.6.49 attack
Port scan on 1 port(s): 53
2020-04-19 23:38:00
145.102.6.73 attackspam
Port scan on 1 port(s): 53
2020-04-19 23:37:49
145.102.6.57 attackbotsspam
Port scan on 1 port(s): 53
2020-04-11 03:33:54
145.102.6.86 attack
Port scan on 1 port(s): 53
2020-04-11 03:33:36
145.102.6.46 attackspambots
Port scan on 1 port(s): 53
2020-04-11 03:25:51
145.102.6.73 attackspam
Port scan detected on *
2020-03-21 05:29:57
145.102.6.55 attackbots
Port scan on 1 port(s): 53
2020-03-19 21:23:10
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.102.6.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7658
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.102.6.43.			IN	A

;; AUTHORITY SECTION:
.			1692	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061100 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 11 15:42:17 CST 2019
;; MSG SIZE  rcvd: 116

HOST信息:
43.6.102.145.in-addr.arpa domain name pointer please.visit.www.openintel.nl.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
43.6.102.145.in-addr.arpa	name = please.visit.www.openintel.nl.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.129.12.139 attack
Unauthorized connection attempt from IP address 190.129.12.139 on Port 445(SMB)
2020-03-30 21:34:58
178.176.172.123 attack
Unauthorized connection attempt from IP address 178.176.172.123 on Port 445(SMB)
2020-03-30 21:28:52
194.44.246.130 attackbotsspam
Brute force SMTP login attempted.
...
2020-03-30 21:30:15
194.50.254.170 attackspam
Brute force SMTP login attempted.
...
2020-03-30 21:21:55
58.87.68.226 attackbots
Mar 30 15:06:16 mout sshd[8401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.68.226  user=root
Mar 30 15:06:18 mout sshd[8401]: Failed password for root from 58.87.68.226 port 58168 ssh2
2020-03-30 21:25:51
194.67.197.109 attackspambots
Brute force SMTP login attempted.
...
2020-03-30 21:05:35
190.94.3.203 attackspambots
Unauthorized connection attempt from IP address 190.94.3.203 on Port 445(SMB)
2020-03-30 21:38:20
103.66.96.254 attackspambots
Invalid user hhb from 103.66.96.254 port 17691
2020-03-30 21:25:26
220.71.236.232 attackspam
Attempted connection to port 23.
2020-03-30 21:48:24
114.32.9.25 attack
Unauthorized connection attempt from IP address 114.32.9.25 on Port 445(SMB)
2020-03-30 21:03:15
200.233.204.145 attack
Mar 30 18:21:41 our-server-hostname sshd[15414]: reveeclipse mapping checking getaddrinfo for 200-233-204-145.dynamic.idial.com.br [200.233.204.145] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 30 18:21:41 our-server-hostname sshd[15414]: Invalid user ueu from 200.233.204.145
Mar 30 18:21:41 our-server-hostname sshd[15414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.233.204.145 
Mar 30 18:21:43 our-server-hostname sshd[15414]: Failed password for invalid user ueu from 200.233.204.145 port 20412 ssh2
Mar 30 18:27:10 our-server-hostname sshd[16145]: reveeclipse mapping checking getaddrinfo for 200-233-204-145.dynamic.idial.com.br [200.233.204.145] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 30 18:27:10 our-server-hostname sshd[16145]: Invalid user pietre from 200.233.204.145
Mar 30 18:27:10 our-server-hostname sshd[16145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.233.204.145 
Mar 30........
-------------------------------
2020-03-30 21:39:28
95.37.96.9 attackbots
Attempted connection to port 445.
2020-03-30 21:42:48
112.197.35.194 attackspambots
1585572349 - 03/30/2020 14:45:49 Host: 112.197.35.194/112.197.35.194 Port: 445 TCP Blocked
2020-03-30 21:06:27
185.53.88.39 attackspam
185.53.88.39 was recorded 10 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 10, 26, 335
2020-03-30 21:32:32
194.44.61.133 attackspambots
Brute force SMTP login attempted.
...
2020-03-30 21:27:16

最近上报的IP列表

217.249.4.151 102.39.48.158 201.253.253.214 222.25.222.109
153.215.114.171 128.199.240.173 103.67.218.11 83.13.191.18
45.67.14.148 216.231.25.51 185.177.154.8 106.110.241.78
12.130.99.46 4.247.254.56 46.21.209.140 64.95.20.72
17.217.85.148 237.119.181.93 151.193.186.168 181.198.114.107