必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.162.57.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7154
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.162.57.140.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 23:40:34 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
140.57.162.145.in-addr.arpa domain name pointer 145.162.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.57.162.145.in-addr.arpa	name = 145.162.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.191.28.88 attackspambots
Dec  9 09:06:56 xxxxxxx0 sshd[28136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.28.88  user=r.r
Dec  9 09:06:58 xxxxxxx0 sshd[28136]: Failed password for r.r from 94.191.28.88 port 42964 ssh2
Dec  9 09:17:53 xxxxxxx0 sshd[31359]: Invalid user ottsman from 94.191.28.88 port 46800
Dec  9 09:17:53 xxxxxxx0 sshd[31359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.28.88
Dec  9 09:17:56 xxxxxxx0 sshd[31359]: Failed password for invalid user ottsman from 94.191.28.88 port 46800 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.191.28.88
2019-12-09 17:29:23
45.82.153.82 attackspambots
2019-12-09 09:46:47 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data \(set_id=info@orogest.it\)
2019-12-09 09:46:57 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data
2019-12-09 09:47:08 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data
2019-12-09 09:47:15 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data
2019-12-09 09:47:29 dovecot_login authenticator failed for \(\[45.82.153.82\]\) \[45.82.153.82\]: 535 Incorrect authentication data
2019-12-09 17:25:28
89.110.39.34 attack
Dec  9 10:35:41 ns381471 sshd[1275]: Failed password for root from 89.110.39.34 port 34708 ssh2
2019-12-09 17:41:13
213.182.92.37 attack
Dec  9 09:06:21 zeus sshd[23880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.182.92.37 
Dec  9 09:06:23 zeus sshd[23880]: Failed password for invalid user never from 213.182.92.37 port 55150 ssh2
Dec  9 09:12:17 zeus sshd[24153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.182.92.37 
Dec  9 09:12:19 zeus sshd[24153]: Failed password for invalid user qwe123 from 213.182.92.37 port 36268 ssh2
2019-12-09 17:16:48
78.234.220.84 attackbots
Fail2Ban Ban Triggered
2019-12-09 17:41:40
177.69.237.53 attackbotsspam
Dec  8 22:52:47 eddieflores sshd\[15484\]: Invalid user martavion from 177.69.237.53
Dec  8 22:52:47 eddieflores sshd\[15484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.53
Dec  8 22:52:50 eddieflores sshd\[15484\]: Failed password for invalid user martavion from 177.69.237.53 port 37444 ssh2
Dec  8 23:00:02 eddieflores sshd\[16101\]: Invalid user beitris from 177.69.237.53
Dec  8 23:00:02 eddieflores sshd\[16101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.53
2019-12-09 17:28:11
82.159.138.57 attackbotsspam
--- report ---
Dec  9 05:56:30 sshd: Connection from 82.159.138.57 port 60739
Dec  9 05:56:31 sshd: Invalid user sinnie from 82.159.138.57
Dec  9 05:56:31 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.159.138.57.static.user.ono.com
Dec  9 05:56:34 sshd: Failed password for invalid user sinnie from 82.159.138.57 port 60739 ssh2
Dec  9 05:56:34 sshd: Received disconnect from 82.159.138.57: 11: Bye Bye [preauth]
2019-12-09 17:07:48
37.186.123.91 attack
Dec  9 14:30:02 gw1 sshd[3435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.186.123.91
Dec  9 14:30:05 gw1 sshd[3435]: Failed password for invalid user server from 37.186.123.91 port 37158 ssh2
...
2019-12-09 17:33:22
83.242.157.71 attackspambots
" "
2019-12-09 17:40:06
112.250.64.171 attack
Host Scan
2019-12-09 17:10:03
128.199.95.60 attackbots
2019-12-09T07:22:36.053935centos sshd\[9528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60  user=root
2019-12-09T07:22:38.206926centos sshd\[9528\]: Failed password for root from 128.199.95.60 port 33298 ssh2
2019-12-09T07:29:32.558629centos sshd\[9684\]: Invalid user Administrator from 128.199.95.60 port 46238
2019-12-09T07:29:32.563142centos sshd\[9684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60
2019-12-09 17:23:10
49.235.38.225 attackbots
Dec  8 20:23:31 auw2 sshd\[5208\]: Invalid user yamaguti from 49.235.38.225
Dec  8 20:23:31 auw2 sshd\[5208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.38.225
Dec  8 20:23:33 auw2 sshd\[5208\]: Failed password for invalid user yamaguti from 49.235.38.225 port 50184 ssh2
Dec  8 20:29:20 auw2 sshd\[5898\]: Invalid user Auftrag123 from 49.235.38.225
Dec  8 20:29:20 auw2 sshd\[5898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.38.225
2019-12-09 17:36:36
218.92.0.165 attack
Dec  9 10:16:42 root sshd[18461]: Failed password for root from 218.92.0.165 port 43554 ssh2
Dec  9 10:16:45 root sshd[18461]: Failed password for root from 218.92.0.165 port 43554 ssh2
Dec  9 10:16:50 root sshd[18461]: Failed password for root from 218.92.0.165 port 43554 ssh2
Dec  9 10:16:55 root sshd[18461]: Failed password for root from 218.92.0.165 port 43554 ssh2
...
2019-12-09 17:20:19
74.63.226.142 attackspambots
2019-12-09T10:30:49.469018scmdmz1 sshd\[21954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.226.142  user=nobody
2019-12-09T10:30:51.952445scmdmz1 sshd\[21954\]: Failed password for nobody from 74.63.226.142 port 39638 ssh2
2019-12-09T10:36:35.561316scmdmz1 sshd\[22142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.226.142  user=root
...
2019-12-09 17:38:16
200.29.108.214 attackbotsspam
Dec  9 03:48:32 ny01 sshd[25863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214
Dec  9 03:48:34 ny01 sshd[25863]: Failed password for invalid user gaile from 200.29.108.214 port 36513 ssh2
Dec  9 03:55:18 ny01 sshd[26996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214
2019-12-09 17:15:16

最近上报的IP列表

226.50.109.8 198.203.78.34 8.227.126.92 181.165.38.98
142.157.193.199 13.253.22.110 96.31.204.62 206.88.161.119
233.173.39.109 212.37.30.75 53.22.220.8 81.111.133.102
28.130.173.186 5.111.23.110 211.190.205.215 207.102.190.205
200.237.124.67 6.143.106.229 153.88.217.58 175.10.78.83