必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.14.152.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37790
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.14.152.92.			IN	A

;; AUTHORITY SECTION:
.			394	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:27:38 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 92.152.14.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 92.152.14.145.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.169 attackspambots
The IP 222.186.175.169 has just been banned by Fail2Ban after
3 attempts against sshd.
2020-06-18 23:27:41
187.141.128.42 attack
Jun 18 17:06:41 sip sshd[695936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.141.128.42  user=root
Jun 18 17:06:43 sip sshd[695936]: Failed password for root from 187.141.128.42 port 41426 ssh2
Jun 18 17:10:46 sip sshd[695949]: Invalid user stp from 187.141.128.42 port 39870
...
2020-06-18 23:43:28
178.94.14.90 attackbotsspam
Telnetd brute force attack detected by fail2ban
2020-06-18 23:33:01
54.37.149.233 attack
$f2bV_matches
2020-06-18 23:14:08
95.111.74.98 attack
2020-06-18T13:26:15.814345ionos.janbro.de sshd[2582]: Invalid user xpp from 95.111.74.98 port 60300
2020-06-18T13:26:18.382663ionos.janbro.de sshd[2582]: Failed password for invalid user xpp from 95.111.74.98 port 60300 ssh2
2020-06-18T13:29:29.785570ionos.janbro.de sshd[2588]: Invalid user ydy from 95.111.74.98 port 59606
2020-06-18T13:29:29.878504ionos.janbro.de sshd[2588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98
2020-06-18T13:29:29.785570ionos.janbro.de sshd[2588]: Invalid user ydy from 95.111.74.98 port 59606
2020-06-18T13:29:31.903513ionos.janbro.de sshd[2588]: Failed password for invalid user ydy from 95.111.74.98 port 59606 ssh2
2020-06-18T13:32:47.507498ionos.janbro.de sshd[2601]: Invalid user anand from 95.111.74.98 port 59122
2020-06-18T13:32:47.594372ionos.janbro.de sshd[2601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98
2020-06-18T13:32:47.507498ionos.janbro
...
2020-06-18 23:41:48
185.220.102.7 attackspam
$f2bV_matches
2020-06-18 23:17:51
203.195.130.233 attack
Jun 18 15:11:29 vps sshd[270022]: Failed password for root from 203.195.130.233 port 47042 ssh2
Jun 18 15:14:06 vps sshd[280134]: Invalid user kz from 203.195.130.233 port 48990
Jun 18 15:14:06 vps sshd[280134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.130.233
Jun 18 15:14:08 vps sshd[280134]: Failed password for invalid user kz from 203.195.130.233 port 48990 ssh2
Jun 18 15:16:53 vps sshd[294371]: Invalid user cloud from 203.195.130.233 port 50934
...
2020-06-18 23:26:15
37.153.173.56 attack
Jun 18 13:10:37 ns sshd[29620]: Connection from 37.153.173.56 port 57544 on 134.119.39.98 port 22
Jun 18 13:10:37 ns sshd[29620]: Invalid user oracle from 37.153.173.56 port 57544
Jun 18 13:10:37 ns sshd[29620]: Failed password for invalid user oracle from 37.153.173.56 port 57544 ssh2
Jun 18 13:10:37 ns sshd[29620]: Received disconnect from 37.153.173.56 port 57544:11: Bye Bye [preauth]
Jun 18 13:10:37 ns sshd[29620]: Disconnected from 37.153.173.56 port 57544 [preauth]
Jun 18 13:15:40 ns sshd[27173]: Connection from 37.153.173.56 port 44238 on 134.119.39.98 port 22
Jun 18 13:15:42 ns sshd[27173]: Invalid user wmdemo from 37.153.173.56 port 44238
Jun 18 13:15:42 ns sshd[27173]: Failed password for invalid user wmdemo from 37.153.173.56 port 44238 ssh2
Jun 18 13:15:42 ns sshd[27173]: Received disconnect from 37.153.173.56 port 44238:11: Bye Bye [preauth]
Jun 18 13:15:42 ns sshd[27173]: Disconnected from 37.153.173.56 port 44238 [preauth]
Jun 18 13:19:09 ns sshd[4546]: C........
-------------------------------
2020-06-18 23:11:05
115.159.153.180 attackspam
SSH Brute-Force reported by Fail2Ban
2020-06-18 23:09:09
128.199.106.169 attack
Jun 18 16:02:48 minden010 sshd[14541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.106.169
Jun 18 16:02:50 minden010 sshd[14541]: Failed password for invalid user mxx from 128.199.106.169 port 35838 ssh2
Jun 18 16:06:02 minden010 sshd[14950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.106.169
...
2020-06-18 23:11:56
94.102.51.17 attack
[H1.VM10] Blocked by UFW
2020-06-18 23:44:14
193.112.85.35 attack
Jun 18 15:48:39 vps647732 sshd[11796]: Failed password for root from 193.112.85.35 port 45708 ssh2
...
2020-06-18 23:30:07
129.226.174.139 attack
SSH Brute-Forcing (server2)
2020-06-18 23:16:17
94.237.73.111 attackbots
Jun 18 17:00:09 vps sshd[749595]: Failed password for invalid user sammy from 94.237.73.111 port 48738 ssh2
Jun 18 17:05:00 vps sshd[768387]: Invalid user yqc from 94.237.73.111 port 55358
Jun 18 17:05:00 vps sshd[768387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-237-73-111.sg-sin1.upcloud.host
Jun 18 17:05:02 vps sshd[768387]: Failed password for invalid user yqc from 94.237.73.111 port 55358 ssh2
Jun 18 17:08:05 vps sshd[784413]: Invalid user vncuser from 94.237.73.111 port 45804
...
2020-06-18 23:19:51
106.52.107.70 attackbots
Jun 18 14:31:54 srv1 sshd[30248]: Invalid user moodle from 106.52.107.70
Jun 18 14:31:56 srv1 sshd[30248]: Failed password for invalid user moodle from 106.52.107.70 port 59612 ssh2
Jun 18 15:06:04 srv1 sshd[25974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.107.70  user=r.r
Jun 18 15:06:06 srv1 sshd[25974]: Failed password for r.r from 106.52.107.70 port 58944 ssh2
Jun 18 15:07:55 srv1 sshd[27999]: Invalid user abi from 106.52.107.70


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.52.107.70
2020-06-18 23:43:45

最近上报的IP列表

145.14.152.148 145.14.151.38 145.14.151.24 145.14.152.94
145.14.153.127 145.14.153.200 145.14.153.181 145.14.154.142
145.14.153.84 145.14.154.160 145.14.154.195 145.14.154.102
145.14.154.71 145.226.175.245 145.226.55.40 145.14.154.129
145.236.70.189 145.237.193.157 145.237.204.138 145.237.204.154