必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.139.142.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.139.142.161.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 02:22:32 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
161.142.139.145.in-addr.arpa domain name pointer 145.139.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
161.142.139.145.in-addr.arpa	name = 145.139.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
128.199.240.120 attackspam
$f2bV_matches
2019-12-09 21:23:46
148.204.211.136 attackspambots
Dec  9 06:19:39 game-panel sshd[13234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.204.211.136
Dec  9 06:19:41 game-panel sshd[13234]: Failed password for invalid user server from 148.204.211.136 port 51004 ssh2
Dec  9 06:26:02 game-panel sshd[13552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.204.211.136
2019-12-09 21:32:53
45.6.93.222 attack
$f2bV_matches
2019-12-09 21:31:54
52.162.253.241 attackbotsspam
Dec  9 12:13:46 srv01 sshd[32252]: Invalid user cifersky from 52.162.253.241 port 1024
Dec  9 12:13:46 srv01 sshd[32252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.162.253.241
Dec  9 12:13:46 srv01 sshd[32252]: Invalid user cifersky from 52.162.253.241 port 1024
Dec  9 12:13:48 srv01 sshd[32252]: Failed password for invalid user cifersky from 52.162.253.241 port 1024 ssh2
Dec  9 12:19:35 srv01 sshd[32745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.162.253.241  user=root
Dec  9 12:19:37 srv01 sshd[32745]: Failed password for root from 52.162.253.241 port 1024 ssh2
...
2019-12-09 21:42:46
134.175.151.155 attackbots
Dec  9 09:29:21 lnxweb62 sshd[23688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.151.155
2019-12-09 21:24:19
81.252.228.195 attackspam
Dec  9 06:17:33 web8 sshd\[8120\]: Invalid user todsen from 81.252.228.195
Dec  9 06:17:33 web8 sshd\[8120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.252.228.195
Dec  9 06:17:35 web8 sshd\[8120\]: Failed password for invalid user todsen from 81.252.228.195 port 42683 ssh2
Dec  9 06:25:57 web8 sshd\[12732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.252.228.195  user=root
Dec  9 06:25:59 web8 sshd\[12732\]: Failed password for root from 81.252.228.195 port 48275 ssh2
2019-12-09 21:42:14
123.206.47.228 attackspam
$f2bV_matches
2019-12-09 21:43:07
139.59.161.78 attack
Dec  9 03:28:58 web1 sshd\[3460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78  user=root
Dec  9 03:28:59 web1 sshd\[3460\]: Failed password for root from 139.59.161.78 port 55648 ssh2
Dec  9 03:34:14 web1 sshd\[4097\]: Invalid user grantley from 139.59.161.78
Dec  9 03:34:14 web1 sshd\[4097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78
Dec  9 03:34:16 web1 sshd\[4097\]: Failed password for invalid user grantley from 139.59.161.78 port 11704 ssh2
2019-12-09 21:35:08
106.12.178.246 attackspam
Brute-force attempt banned
2019-12-09 21:41:36
111.38.216.94 attackspam
Dec  9 07:02:58 xxxxxxx0 sshd[28372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.38.216.94  user=r.r
Dec  9 07:03:00 xxxxxxx0 sshd[28372]: Failed password for r.r from 111.38.216.94 port 36736 ssh2
Dec  9 07:19:30 xxxxxxx0 sshd[448]: Invalid user has from 111.38.216.94 port 44614
Dec  9 07:19:30 xxxxxxx0 sshd[448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.38.216.94
Dec  9 07:19:32 xxxxxxx0 sshd[448]: Failed password for invalid user has from 111.38.216.94 port 44614 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.38.216.94
2019-12-09 21:36:43
117.2.50.240 attackspambots
19/12/9@01:26:01: FAIL: Alarm-Intrusion address from=117.2.50.240
...
2019-12-09 21:36:14
203.172.66.222 attackbotsspam
Dec  9 13:55:58 ns3042688 sshd\[874\]: Invalid user sitruk from 203.172.66.222
Dec  9 13:55:58 ns3042688 sshd\[874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.222 
Dec  9 13:56:00 ns3042688 sshd\[874\]: Failed password for invalid user sitruk from 203.172.66.222 port 44322 ssh2
Dec  9 14:02:53 ns3042688 sshd\[2818\]: Invalid user kimstacey from 203.172.66.222
Dec  9 14:02:53 ns3042688 sshd\[2818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.222 
...
2019-12-09 21:08:04
84.135.61.56 attackbots
ssh failed login
2019-12-09 21:15:27
206.189.91.4 attackspambots
206.189.91.4 - - [09/Dec/2019:07:25:56 +0100] "POST /wp-login.php HTTP/1.1" 200 3123 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.91.4 - - [09/Dec/2019:07:26:04 +0100] "POST /wp-login.php HTTP/1.1" 200 3102 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-09 21:31:03
104.244.79.146 attackbots
Dec  9 07:07:09 XXX sshd[51973]: Invalid user fake from 104.244.79.146 port 36258
2019-12-09 21:37:13

最近上报的IP列表

182.167.193.194 70.22.28.205 20.118.174.199 135.235.4.225
125.204.48.71 108.203.65.76 148.163.231.221 209.149.201.200
160.88.12.93 39.154.166.163 4.87.97.149 18.35.23.55
70.184.154.180 252.147.205.153 38.192.248.166 178.185.70.59
57.42.129.56 211.156.154.3 93.15.74.230 236.128.183.109