必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.183.111.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18822
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.183.111.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 12:42:06 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 99.111.183.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.111.183.145.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.54.94.182 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/80.54.94.182/ 
 
 PL - 1H : (132)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 80.54.94.182 
 
 CIDR : 80.54.0.0/16 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 ATTACKS DETECTED ASN5617 :  
  1H - 3 
  3H - 9 
  6H - 15 
 12H - 28 
 24H - 56 
 
 DateTime : 2019-11-01 04:49:14 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-01 18:12:22
51.15.171.46 attackspambots
Nov  1 10:50:54 sso sshd[31340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.171.46
Nov  1 10:50:56 sso sshd[31340]: Failed password for invalid user as51230 from 51.15.171.46 port 40968 ssh2
...
2019-11-01 18:18:25
122.143.121.116 attack
" "
2019-11-01 18:27:50
217.182.253.230 attack
Nov  1 08:30:53 MainVPS sshd[18434]: Invalid user admin from 217.182.253.230 port 40690
Nov  1 08:30:53 MainVPS sshd[18434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.253.230
Nov  1 08:30:53 MainVPS sshd[18434]: Invalid user admin from 217.182.253.230 port 40690
Nov  1 08:30:55 MainVPS sshd[18434]: Failed password for invalid user admin from 217.182.253.230 port 40690 ssh2
Nov  1 08:34:18 MainVPS sshd[18686]: Invalid user azuracast from 217.182.253.230 port 50798
...
2019-11-01 18:25:14
90.188.116.169 attack
Chat Spam
2019-11-01 18:08:26
213.251.35.49 attackspam
Nov  1 11:26:26 MK-Soft-Root2 sshd[14622]: Failed password for root from 213.251.35.49 port 45598 ssh2
Nov  1 11:31:02 MK-Soft-Root2 sshd[15434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.35.49 
...
2019-11-01 18:42:05
18.184.155.204 attackbotsspam
18.184.155.204 - - \[01/Nov/2019:04:21:06 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/65.0.3325.181 Safari/537.36"
18.184.155.204 - - \[01/Nov/2019:04:37:01 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/65.0.3325.181 Safari/537.36"
...
2019-11-01 18:33:27
45.143.221.14 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-01 18:07:06
70.63.181.58 attackbotsspam
Nov  1 04:48:18 localhost sshd\[21141\]: Invalid user pi from 70.63.181.58
Nov  1 04:48:18 localhost sshd\[21141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.63.181.58
Nov  1 04:48:21 localhost sshd\[21141\]: Failed password for invalid user pi from 70.63.181.58 port 39124 ssh2
Nov  1 04:48:38 localhost sshd\[21143\]: Invalid user ubnt from 70.63.181.58
Nov  1 04:48:38 localhost sshd\[21143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.63.181.58
...
2019-11-01 18:30:33
84.194.203.119 attack
Nov  1 10:48:50 itv-usvr-02 sshd[12852]: Invalid user pi from 84.194.203.119 port 40680
Nov  1 10:48:50 itv-usvr-02 sshd[12851]: Invalid user pi from 84.194.203.119 port 40678
Nov  1 10:48:51 itv-usvr-02 sshd[12852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.194.203.119
Nov  1 10:48:50 itv-usvr-02 sshd[12852]: Invalid user pi from 84.194.203.119 port 40680
Nov  1 10:48:53 itv-usvr-02 sshd[12852]: Failed password for invalid user pi from 84.194.203.119 port 40680 ssh2
Nov  1 10:48:51 itv-usvr-02 sshd[12851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.194.203.119
Nov  1 10:48:50 itv-usvr-02 sshd[12851]: Invalid user pi from 84.194.203.119 port 40678
Nov  1 10:48:53 itv-usvr-02 sshd[12851]: Failed password for invalid user pi from 84.194.203.119 port 40678 ssh2
2019-11-01 18:25:39
130.207.1.71 attack
Port scan on 1 port(s): 53
2019-11-01 18:21:16
222.64.19.6 attackbots
Fail2Ban - FTP Abuse Attempt
2019-11-01 18:01:48
136.228.160.206 attackspam
Nov  1 10:19:36 server sshd\[10120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.160.206  user=ftp
Nov  1 10:19:38 server sshd\[10120\]: Failed password for ftp from 136.228.160.206 port 52424 ssh2
Nov  1 10:29:52 server sshd\[12263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.160.206  user=root
Nov  1 10:29:54 server sshd\[12263\]: Failed password for root from 136.228.160.206 port 57202 ssh2
Nov  1 10:34:30 server sshd\[13291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.160.206  user=root
...
2019-11-01 18:34:00
81.171.85.138 attackspam
\[2019-11-01 06:22:02\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.138:51689' - Wrong password
\[2019-11-01 06:22:02\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-01T06:22:02.209-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="291",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85.138/51689",Challenge="30fe8058",ReceivedChallenge="30fe8058",ReceivedHash="60e6ea38f5f89aa05a6b5e5590e46f64"
\[2019-11-01 06:22:54\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.138:61423' - Wrong password
\[2019-11-01 06:22:54\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-11-01T06:22:54.543-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="740",SessionID="0x7fdf2cda50b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85.138
2019-11-01 18:35:32
119.93.235.208 attackspam
Port scan: Attack repeated for 24 hours
2019-11-01 18:01:25

最近上报的IP列表

43.48.203.181 133.103.83.124 141.62.186.21 178.93.99.224
156.82.191.163 197.150.142.134 185.106.142.2 96.237.195.151
191.206.83.164 116.165.136.127 125.116.233.107 250.113.246.97
35.73.135.9 117.117.145.20 50.143.39.14 85.218.24.116
19.142.173.208 138.53.175.228 251.60.102.247 34.248.21.25