必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.20.126.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.20.126.12.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 16:59:52 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
12.126.20.145.in-addr.arpa domain name pointer lnx-hrl-042v.ou.nl.
12.126.20.145.in-addr.arpa domain name pointer relay.ou.nl.
12.126.20.145.in-addr.arpa domain name pointer dns.ou.nl.
12.126.20.145.in-addr.arpa domain name pointer mailserv.ou.nl.
12.126.20.145.in-addr.arpa domain name pointer ntp0.ou.nl.
12.126.20.145.in-addr.arpa domain name pointer ns.ou.nl.
12.126.20.145.in-addr.arpa domain name pointer dsa.ou.nl.
12.126.20.145.in-addr.arpa domain name pointer aix-4.ou.nl.
12.126.20.145.in-addr.arpa domain name pointer mailgw1.ou.nl.
12.126.20.145.in-addr.arpa domain name pointer ouhi06.ou.nl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.126.20.145.in-addr.arpa	name = ns.ou.nl.
12.126.20.145.in-addr.arpa	name = dsa.ou.nl.
12.126.20.145.in-addr.arpa	name = aix-4.ou.nl.
12.126.20.145.in-addr.arpa	name = mailgw1.ou.nl.
12.126.20.145.in-addr.arpa	name = ouhi06.ou.nl.
12.126.20.145.in-addr.arpa	name = lnx-hrl-042v.ou.nl.
12.126.20.145.in-addr.arpa	name = relay.ou.nl.
12.126.20.145.in-addr.arpa	name = dns.ou.nl.
12.126.20.145.in-addr.arpa	name = mailserv.ou.nl.
12.126.20.145.in-addr.arpa	name = ntp0.ou.nl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
68.109.221.72 attack
81/tcp
[2019-07-13]1pkt
2019-07-14 09:34:39
46.237.207.106 attackbots
Jul 14 03:38:47 vps691689 sshd[27853]: Failed password for root from 46.237.207.106 port 35314 ssh2
Jul 14 03:44:04 vps691689 sshd[27917]: Failed password for root from 46.237.207.106 port 38858 ssh2
...
2019-07-14 09:44:29
198.50.215.125 attack
2019-07-13 UTC: 1x - ubuntu
2019-07-14 09:38:46
139.59.38.252 attackspambots
Jul 14 03:31:11 MK-Soft-Root2 sshd\[23543\]: Invalid user hex from 139.59.38.252 port 34498
Jul 14 03:31:11 MK-Soft-Root2 sshd\[23543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.38.252
Jul 14 03:31:13 MK-Soft-Root2 sshd\[23543\]: Failed password for invalid user hex from 139.59.38.252 port 34498 ssh2
...
2019-07-14 09:45:26
179.228.148.224 attack
445/tcp
[2019-07-13]1pkt
2019-07-14 10:05:53
220.181.108.110 attack
Bad bot/spoofed identity
2019-07-14 09:23:45
111.206.198.28 attackspambots
Bad bot/spoofed identity
2019-07-14 09:20:57
157.230.44.56 attack
Jul 14 04:43:05 srv-4 sshd\[31265\]: Invalid user wade from 157.230.44.56
Jul 14 04:43:05 srv-4 sshd\[31265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.44.56
Jul 14 04:43:08 srv-4 sshd\[31265\]: Failed password for invalid user wade from 157.230.44.56 port 59536 ssh2
...
2019-07-14 09:56:03
1.165.101.39 attack
23/tcp
[2019-07-13]1pkt
2019-07-14 09:58:41
41.190.92.194 attackbotsspam
Jul 14 01:42:08 MK-Soft-VM3 sshd\[23645\]: Invalid user test from 41.190.92.194 port 51108
Jul 14 01:42:08 MK-Soft-VM3 sshd\[23645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.92.194
Jul 14 01:42:09 MK-Soft-VM3 sshd\[23645\]: Failed password for invalid user test from 41.190.92.194 port 51108 ssh2
...
2019-07-14 09:53:25
94.53.225.69 attackspam
Honeypot attack, port: 23, PTR: 94-53-225-69.next-gen.ro.
2019-07-14 09:57:08
156.202.240.48 attack
23/tcp
[2019-07-13]1pkt
2019-07-14 09:34:06
5.188.87.19 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-14 09:32:16
162.247.73.192 attackspam
SSH bruteforce
2019-07-14 09:23:19
58.250.18.118 attackspambots
Jul 14 02:51:24 [host] sshd[24149]: Invalid user annlis from 58.250.18.118
Jul 14 02:51:24 [host] sshd[24149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.18.118
Jul 14 02:51:26 [host] sshd[24149]: Failed password for invalid user annlis from 58.250.18.118 port 57756 ssh2
2019-07-14 09:31:16

最近上报的IP列表

194.44.31.6 140.117.152.19 140.116.109.148 140.116.161.79
210.75.253.81 131.155.11.13 212.201.70.85 140.116.226.118
140.116.80.7 140.116.30.197 120.105.145.177 140.116.252.77
138.253.130.34 200.19.168.3 140.116.88.188 140.116.26.85
202.14.164.221 140.116.164.123 140.116.183.125 140.116.72.13