必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Diemen

省份(region): North Holland

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.113.178.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.113.178.44.			IN	A

;; AUTHORITY SECTION:
.			539	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120401 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 04 21:15:46 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
44.178.113.145.in-addr.arpa domain name pointer SURFnet-NL.IPv4.PTR.145.113.x.INVALID.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.178.113.145.in-addr.arpa	name = SURFnet-NL.IPv4.PTR.145.113.x.INVALID.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.168.202 attackspam
7403/tcp 7421/tcp 7408/tcp...
[2019-08-13/10-14]3997pkt,1137pt.(tcp)
2019-10-15 06:14:04
118.69.174.108 attack
Automatic report - Banned IP Access
2019-10-15 06:09:50
177.92.27.30 attackbots
Oct 14 11:14:03 hanapaa sshd\[4201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.27.30  user=root
Oct 14 11:14:04 hanapaa sshd\[4201\]: Failed password for root from 177.92.27.30 port 51800 ssh2
Oct 14 11:18:55 hanapaa sshd\[4658\]: Invalid user network2 from 177.92.27.30
Oct 14 11:18:55 hanapaa sshd\[4658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.27.30
Oct 14 11:18:57 hanapaa sshd\[4658\]: Failed password for invalid user network2 from 177.92.27.30 port 36008 ssh2
2019-10-15 05:59:23
154.120.242.70 attackspambots
Invalid user ftpuser from 154.120.242.70 port 34502
2019-10-15 06:00:33
186.121.203.94 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/186.121.203.94/ 
 BO - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BO 
 NAME ASN : ASN26210 
 
 IP : 186.121.203.94 
 
 CIDR : 186.121.203.0/24 
 
 PREFIX COUNT : 179 
 
 UNIQUE IP COUNT : 57344 
 
 
 WYKRYTE ATAKI Z ASN26210 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-14 21:56:10 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-15 06:04:00
80.82.70.239 attackspam
firewall-block, port(s): 8640/tcp
2019-10-15 05:44:46
51.83.78.56 attackspambots
Invalid user ubuntu from 51.83.78.56 port 49614
2019-10-15 06:17:07
222.186.175.167 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-10-15 05:58:07
128.199.138.31 attackbotsspam
SSH bruteforce
2019-10-15 05:52:11
81.182.254.124 attack
Oct 14 11:19:42 sachi sshd\[18923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl51b6fe7c.fixip.t-online.hu  user=root
Oct 14 11:19:44 sachi sshd\[18923\]: Failed password for root from 81.182.254.124 port 38030 ssh2
Oct 14 11:23:51 sachi sshd\[19274\]: Invalid user teamspeak1 from 81.182.254.124
Oct 14 11:23:51 sachi sshd\[19274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl51b6fe7c.fixip.t-online.hu
Oct 14 11:23:53 sachi sshd\[19274\]: Failed password for invalid user teamspeak1 from 81.182.254.124 port 50426 ssh2
2019-10-15 05:43:07
34.208.194.162 attack
bad bot
2019-10-15 06:07:28
121.202.9.250 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/121.202.9.250/ 
 HK - 1H : (25)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : HK 
 NAME ASN : ASN17924 
 
 IP : 121.202.9.250 
 
 CIDR : 121.202.0.0/18 
 
 PREFIX COUNT : 113 
 
 UNIQUE IP COUNT : 464896 
 
 
 WYKRYTE ATAKI Z ASN17924 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-14 21:56:49 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-15 05:46:23
95.210.45.30 attack
Oct 14 21:16:39 lola sshd[27063]: Invalid user dark from 95.210.45.30
Oct 14 21:16:39 lola sshd[27063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-210-45-30.ip.skylogicnet.com 
Oct 14 21:16:41 lola sshd[27063]: Failed password for invalid user dark from 95.210.45.30 port 44281 ssh2
Oct 14 21:16:42 lola sshd[27063]: Received disconnect from 95.210.45.30: 11: Bye Bye [preauth]
Oct 14 21:49:24 lola sshd[31009]: Invalid user philip from 95.210.45.30
Oct 14 21:49:24 lola sshd[31009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-210-45-30.ip.skylogicnet.com 
Oct 14 21:49:26 lola sshd[31009]: Failed password for invalid user philip from 95.210.45.30 port 52983 ssh2
Oct 14 21:49:27 lola sshd[31009]: Received disconnect from 95.210.45.30: 11: Bye Bye [preauth]
Oct 14 21:56:15 lola sshd[32222]: Invalid user awanish from 95.210.45.30
Oct 14 21:56:15 lola sshd[32222]: pam_unix(sshd:auth): ........
-------------------------------
2019-10-15 06:12:12
222.186.180.8 attack
Oct 15 00:07:58 srv206 sshd[29604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Oct 15 00:08:00 srv206 sshd[29604]: Failed password for root from 222.186.180.8 port 16298 ssh2
...
2019-10-15 06:08:14
51.15.17.95 attack
740:20191014:223003.949 failed to accept an incoming connection: connection from "51.15.17.95" rejected
   738:20191014:223003.983 failed to accept an incoming connection: connection from "51.15.17.95" rejected
2019-10-15 05:48:17

最近上报的IP列表

73.21.114.139 35.119.90.247 49.51.161.209 62.109.243.39
41.197.176.191 216.49.78.175 170.79.87.178 192.236.177.181
104.85.1.60 109.252.34.70 173.39.230.0 98.21.213.247
156.15.117.140 182.111.3.193 218.41.151.202 222.122.133.232
39.200.234.120 187.11.78.185 107.98.143.227 81.142.159.124