必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.142.101.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.142.101.213.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 07:43:21 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
213.101.142.145.in-addr.arpa domain name pointer 145.142.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.101.142.145.in-addr.arpa	name = 145.142.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.202.0.27 attackspam
Unauthorized connection attempt detected from IP address 185.202.0.27 to port 3375
2020-06-22 23:30:36
122.51.241.12 attackspam
2020-06-22T16:27:23.966714sd-86998 sshd[30345]: Invalid user oracle from 122.51.241.12 port 39884
2020-06-22T16:27:23.973875sd-86998 sshd[30345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.241.12
2020-06-22T16:27:23.966714sd-86998 sshd[30345]: Invalid user oracle from 122.51.241.12 port 39884
2020-06-22T16:27:25.775033sd-86998 sshd[30345]: Failed password for invalid user oracle from 122.51.241.12 port 39884 ssh2
2020-06-22T16:32:04.833990sd-86998 sshd[30880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.241.12  user=nagios
2020-06-22T16:32:06.880669sd-86998 sshd[30880]: Failed password for nagios from 122.51.241.12 port 60908 ssh2
...
2020-06-22 23:29:07
60.250.147.218 attack
2020-06-22T16:21:19.982335vps773228.ovh.net sshd[18462]: Invalid user xyz from 60.250.147.218 port 48826
2020-06-22T16:21:19.992414vps773228.ovh.net sshd[18462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-250-147-218.hinet-ip.hinet.net
2020-06-22T16:21:19.982335vps773228.ovh.net sshd[18462]: Invalid user xyz from 60.250.147.218 port 48826
2020-06-22T16:21:21.835133vps773228.ovh.net sshd[18462]: Failed password for invalid user xyz from 60.250.147.218 port 48826 ssh2
2020-06-22T16:24:29.424237vps773228.ovh.net sshd[18478]: Invalid user iaw from 60.250.147.218 port 46404
...
2020-06-22 23:58:03
51.89.148.69 attack
Jun 22 14:40:21 vps sshd[559990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.ip-51-89-148.eu
Jun 22 14:40:23 vps sshd[559990]: Failed password for invalid user postgres from 51.89.148.69 port 42124 ssh2
Jun 22 14:43:34 vps sshd[571668]: Invalid user raquel from 51.89.148.69 port 41712
Jun 22 14:43:34 vps sshd[571668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.ip-51-89-148.eu
Jun 22 14:43:36 vps sshd[571668]: Failed password for invalid user raquel from 51.89.148.69 port 41712 ssh2
...
2020-06-22 23:59:06
170.239.108.74 attackspam
Jun 22 14:49:16 eventyay sshd[23039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.239.108.74
Jun 22 14:49:19 eventyay sshd[23039]: Failed password for invalid user public from 170.239.108.74 port 58033 ssh2
Jun 22 14:53:21 eventyay sshd[23205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.239.108.74
...
2020-06-22 23:28:23
177.104.254.68 attackspambots
Jun 22 14:03:30 s1 postfix/submission/smtpd\[32372\]: warning: unknown\[177.104.254.68\]: SASL PLAIN authentication failed:
Jun 22 14:03:37 s1 postfix/submission/smtpd\[32372\]: warning: unknown\[177.104.254.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:03:48 s1 postfix/submission/smtpd\[32399\]: warning: unknown\[177.104.254.68\]: SASL PLAIN authentication failed:
Jun 22 14:03:59 s1 postfix/submission/smtpd\[32399\]: warning: unknown\[177.104.254.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:04:05 s1 postfix/smtps/smtpd\[1101\]: warning: unknown\[177.104.254.68\]: SASL PLAIN authentication failed:
Jun 22 14:04:09 s1 postfix/smtps/smtpd\[1101\]: warning: unknown\[177.104.254.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 14:04:35 s1 postfix/submission/smtpd\[32372\]: warning: unknown\[177.104.254.68\]: SASL PLAIN authentication failed:
Jun 22 14:04:38 s1 postfix/submission/smtpd\[32372\]: warning: unknown\[177.104.254.68\]: SASL LOGIN authentication failed: UGFzc
2020-06-22 23:46:22
149.91.90.155 attack
2020-06-22T14:25:11.948406shield sshd\[8201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.91.90.155  user=root
2020-06-22T14:25:14.296314shield sshd\[8201\]: Failed password for root from 149.91.90.155 port 44406 ssh2
2020-06-22T14:28:50.337081shield sshd\[8758\]: Invalid user dbadmin from 149.91.90.155 port 47980
2020-06-22T14:28:50.340754shield sshd\[8758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.91.90.155
2020-06-22T14:28:52.753838shield sshd\[8758\]: Failed password for invalid user dbadmin from 149.91.90.155 port 47980 ssh2
2020-06-22 23:49:53
218.60.41.136 attackbots
Jun 22 17:46:19 vpn01 sshd[7586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.41.136
Jun 22 17:46:22 vpn01 sshd[7586]: Failed password for invalid user user from 218.60.41.136 port 33980 ssh2
...
2020-06-22 23:52:04
23.129.64.203 attackbotsspam
SNORT TCP  Port: 25 Classtype misc-attack - ET TOR Known Tor Exit Node Traffic group 99 - - Destination xx.xx.4.1 Port: 25 - - Source 23.129.64.203 Port: 59504   (Listed on  dnsbl-sorbs abuseat-org barracuda spamcop zen-spamhaus eatingmonkey spam-sorbs MailSpike (spam wave plus L3-L5))     (143)
2020-06-22 23:34:59
49.88.112.111 attack
Jun 22 08:05:52 dignus sshd[3327]: Failed password for root from 49.88.112.111 port 51268 ssh2
Jun 22 08:06:30 dignus sshd[3390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Jun 22 08:06:32 dignus sshd[3390]: Failed password for root from 49.88.112.111 port 54793 ssh2
Jun 22 08:07:14 dignus sshd[3479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Jun 22 08:07:16 dignus sshd[3479]: Failed password for root from 49.88.112.111 port 62510 ssh2
...
2020-06-22 23:21:12
114.33.18.56 attackspambots
Honeypot attack, port: 81, PTR: 114-33-18-56.HINET-IP.hinet.net.
2020-06-22 23:40:49
94.102.56.215 attackbotsspam
94.102.56.215 was recorded 7 times by 4 hosts attempting to connect to the following ports: 7958,7941,7961. Incident counter (4h, 24h, all-time): 7, 51, 13958
2020-06-22 23:21:44
213.217.1.32 attack
06/22/2020-08:04:34.897005 213.217.1.32 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-23 00:00:33
210.245.92.228 attackspam
Jun 22 14:26:16 abendstille sshd\[18135\]: Invalid user inspur from 210.245.92.228
Jun 22 14:26:16 abendstille sshd\[18135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.228
Jun 22 14:26:18 abendstille sshd\[18135\]: Failed password for invalid user inspur from 210.245.92.228 port 45006 ssh2
Jun 22 14:31:42 abendstille sshd\[23400\]: Invalid user lwy from 210.245.92.228
Jun 22 14:31:43 abendstille sshd\[23400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.228
...
2020-06-23 00:00:52
119.45.125.168 attack
21 attempts against mh-ssh on river
2020-06-22 23:37:30

最近上报的IP列表

145.105.61.235 98.104.176.15 147.84.192.63 158.115.200.207
79.101.60.236 232.191.24.40 116.0.11.61 46.171.32.86
115.125.226.206 122.119.103.127 177.127.83.44 180.25.28.152
114.18.235.140 198.2.203.164 156.67.88.196 79.184.79.50
178.54.27.118 95.182.80.219 162.18.147.38 240.84.147.94