必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.202.161.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.202.161.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 09:35:03 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
19.161.202.145.in-addr.arpa domain name pointer 145.202.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.161.202.145.in-addr.arpa	name = 145.202.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.216.103.121 attackspambots
Sep 28 13:32:53 propaganda sshd[92464]: Connection from 41.216.103.121 port 59110 on 10.0.0.161 port 22 rdomain ""
Sep 28 13:32:53 propaganda sshd[92464]: error: kex_exchange_identification: Connection closed by remote host
2020-09-29 19:00:07
106.13.39.56 attackbots
Sep 29 10:31:13 ip-172-31-42-142 sshd\[1572\]: Invalid user magic from 106.13.39.56\
Sep 29 10:31:15 ip-172-31-42-142 sshd\[1572\]: Failed password for invalid user magic from 106.13.39.56 port 51132 ssh2\
Sep 29 10:34:21 ip-172-31-42-142 sshd\[1591\]: Invalid user demo2 from 106.13.39.56\
Sep 29 10:34:24 ip-172-31-42-142 sshd\[1591\]: Failed password for invalid user demo2 from 106.13.39.56 port 35768 ssh2\
Sep 29 10:37:41 ip-172-31-42-142 sshd\[1615\]: Failed password for root from 106.13.39.56 port 48630 ssh2\
2020-09-29 18:52:17
63.80.187.50 attackbotsspam
email spam
2020-09-29 18:50:05
42.235.27.173 attack
Port Scan detected!
...
2020-09-29 18:33:24
208.186.113.106 attack
Spam
2020-09-29 18:44:56
185.232.65.36 attackspam
UDP ports : 17 / 69 / 2362 / 5060
2020-09-29 18:51:22
157.230.38.102 attackbotsspam
 TCP (SYN) 157.230.38.102:49598 -> port 18652, len 44
2020-09-29 18:58:14
107.170.184.26 attackspambots
Automatic report - Banned IP Access
2020-09-29 18:37:54
177.107.35.26 attack
Invalid user oscar from 177.107.35.26 port 35510
2020-09-29 19:00:47
45.138.74.165 attack
Lines containing failures of 45.138.74.165
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: warning: hostname 19639.vm.hostglobal.ws does not resolve to address 45.138.74.165
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: connect from unknown[45.138.74.165]
Sep x@x
Sep 27 05:41:31 nbi-636 postfix/smtpd[19199]: disconnect from unknown[45.138.74.165] ehlo=1 mail=1 rcpt=0/1 quhostname=1 commands=3/4
Übereinsservermungen in Binärdatei /var/log/apache/pucorp.org.log


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.138.74.165
2020-09-29 18:52:41
91.234.128.42 attackspambots
Port Scan: TCP/443
2020-09-29 18:40:34
156.96.47.42 attackbots
E-Mail Spam (RBL) [REJECTED]
2020-09-29 18:49:00
124.89.2.42 attackspam
Sep 29 07:14:19 Invalid user ftpuser from 124.89.2.42 port 2053
2020-09-29 18:59:26
31.210.70.45 attackbots
Icarus honeypot on github
2020-09-29 19:06:28
45.146.167.167 attackbots
RDP Brute-Force (honeypot 9)
2020-09-29 18:39:40

最近上报的IP列表

216.185.28.31 107.164.202.96 211.97.181.56 121.9.77.230
251.114.211.235 197.224.35.33 204.208.38.251 76.114.129.251
223.151.53.176 24.168.67.149 205.93.55.233 28.247.43.208
200.231.206.123 251.246.161.125 132.46.239.73 245.158.78.144
251.49.90.151 189.190.111.196 114.184.150.139 115.81.69.133