必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): SURFnet bv

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.194.104.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2405
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.194.104.108.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042100 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Apr 21 23:20:01 +08 2019
;; MSG SIZE  rcvd: 119

HOST信息:
108.104.194.145.in-addr.arpa domain name pointer 145.194.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
108.104.194.145.in-addr.arpa	name = 145.194.early-registration.of.surfnet.invalid.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.209.167.27 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-07-17 09:50:12
88.99.167.103 attack
Jul 16 22:59:51 h2421860 postfix/postscreen[27985]: CONNECT from [88.99.167.103]:32822 to [85.214.119.52]:25
Jul 16 22:59:51 h2421860 postfix/dnsblog[27987]: addr 88.99.167.103 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 16 22:59:51 h2421860 postfix/dnsblog[27987]: addr 88.99.167.103 listed by domain Unknown.trblspam.com as 185.53.179.7
Jul 16 22:59:51 h2421860 postfix/dnsblog[27989]: addr 88.99.167.103 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 16 22:59:57 h2421860 postfix/postscreen[27985]: DNSBL rank 4 for [88.99.167.103]:32822
Jul x@x
Jul 16 22:59:57 h2421860 postfix/postscreen[27985]: HANGUP after 0.51 from [88.99.167.103]:32822 in tests after SMTP handshake
Jul 16 22:59:57 h2421860 postfix/postscreen[27985]: DISCONNECT [88.99.167.103]:32822


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=88.99.167.103
2019-07-17 09:36:16
119.147.88.77 attack
May  2 15:50:14 server sshd\[242609\]: Invalid user applmgr from 119.147.88.77
May  2 15:50:14 server sshd\[242609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.147.88.77
May  2 15:50:16 server sshd\[242609\]: Failed password for invalid user applmgr from 119.147.88.77 port 46012 ssh2
...
2019-07-17 09:14:41
118.89.239.232 attackbots
May  3 13:58:15 server sshd\[36479\]: Invalid user monica from 118.89.239.232
May  3 13:58:15 server sshd\[36479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.239.232
May  3 13:58:17 server sshd\[36479\]: Failed password for invalid user monica from 118.89.239.232 port 56999 ssh2
...
2019-07-17 09:44:45
118.89.26.58 attackspambots
May 16 05:20:10 server sshd\[51121\]: Invalid user deploy from 118.89.26.58
May 16 05:20:10 server sshd\[51121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.26.58
May 16 05:20:12 server sshd\[51121\]: Failed password for invalid user deploy from 118.89.26.58 port 48996 ssh2
...
2019-07-17 09:42:51
188.166.31.205 attackbotsspam
2019-07-17T01:47:29.888665abusebot-7.cloudsearch.cf sshd\[13423\]: Invalid user martins from 188.166.31.205 port 54718
2019-07-17 09:59:55
118.67.219.101 attackspambots
May 10 14:12:34 server sshd\[57946\]: Invalid user rx from 118.67.219.101
May 10 14:12:34 server sshd\[57946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.67.219.101
May 10 14:12:37 server sshd\[57946\]: Failed password for invalid user rx from 118.67.219.101 port 46886 ssh2
...
2019-07-17 09:57:30
23.89.109.11 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-16 20:29:08,888 INFO [amun_request_handler] PortScan Detected on Port: 445 (23.89.109.11)
2019-07-17 09:20:39
91.134.140.32 attackbots
Jul 17 01:33:27 mail sshd\[7946\]: Invalid user sysadmin from 91.134.140.32 port 50598
Jul 17 01:33:27 mail sshd\[7946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
Jul 17 01:33:29 mail sshd\[7946\]: Failed password for invalid user sysadmin from 91.134.140.32 port 50598 ssh2
Jul 17 01:37:54 mail sshd\[7978\]: Invalid user dewi from 91.134.140.32 port 48208
Jul 17 01:37:54 mail sshd\[7978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
...
2019-07-17 09:50:56
189.34.32.234 attack
Jul 16 22:56:22 mxgate1 postfix/postscreen[26624]: CONNECT from [189.34.32.234]:36870 to [176.31.12.44]:25
Jul 16 22:56:22 mxgate1 postfix/dnsblog[26762]: addr 189.34.32.234 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 16 22:56:22 mxgate1 postfix/dnsblog[26762]: addr 189.34.32.234 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 16 22:56:22 mxgate1 postfix/dnsblog[26763]: addr 189.34.32.234 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 16 22:56:22 mxgate1 postfix/dnsblog[26759]: addr 189.34.32.234 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 16 22:56:22 mxgate1 postfix/dnsblog[26760]: addr 189.34.32.234 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 16 22:56:23 mxgate1 postfix/dnsblog[26761]: addr 189.34.32.234 listed by domain bl.spamcop.net as 127.0.0.2
Jul 16 22:56:28 mxgate1 postfix/postscreen[26624]: DNSBL rank 6 for [189.34.32.234]:36870
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=189.34.32.234
2019-07-17 09:23:44
51.38.125.177 attackspambots
Jul 17 01:37:29 ip-172-31-1-72 sshd\[2607\]: Invalid user jitendra from 51.38.125.177
Jul 17 01:37:29 ip-172-31-1-72 sshd\[2607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.125.177
Jul 17 01:37:31 ip-172-31-1-72 sshd\[2607\]: Failed password for invalid user jitendra from 51.38.125.177 port 60908 ssh2
Jul 17 01:41:57 ip-172-31-1-72 sshd\[2770\]: Invalid user popuser from 51.38.125.177
Jul 17 01:41:57 ip-172-31-1-72 sshd\[2770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.125.177
2019-07-17 09:47:46
185.53.88.129 attack
\[2019-07-16 20:49:55\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-16T20:49:55.517-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441519470495",SessionID="0x7f06f823f758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.129/53469",ACLName="no_extension_match"
\[2019-07-16 20:51:39\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-16T20:51:39.255-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441519470495",SessionID="0x7f06f8009f28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.129/64159",ACLName="no_extension_match"
\[2019-07-16 20:53:18\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-16T20:53:18.949-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441519470495",SessionID="0x7f06f804c2c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.129/60404",ACLName="n
2019-07-17 09:18:50
1.202.91.252 attack
2019-07-17T01:04:34.807540abusebot.cloudsearch.cf sshd\[13807\]: Invalid user oradev from 1.202.91.252 port 37650
2019-07-17 09:38:31
185.222.211.235 attackspambots
MagicSpam Rule: valid_helo_domain; Spammer IP: 185.222.211.235
2019-07-17 09:31:28
187.94.215.13 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-16 20:27:18,414 INFO [amun_request_handler] PortScan Detected on Port: 445 (187.94.215.13)
2019-07-17 09:49:17

最近上报的IP列表

187.253.252.37 150.173.33.206 219.33.185.250 64.17.19.1
179.171.37.60 193.178.141.174 160.11.167.143 106.13.70.85
2001:67c:288::48 122.182.14.215 160.121.172.41 23.34.153.31
166.109.85.180 5.88.187.185 191.102.154.156 44.11.86.125
102.135.34.221 185.63.218.123 32.114.189.224 80.224.252.191