必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.203.67.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.203.67.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 00:26:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
21.67.203.145.in-addr.arpa domain name pointer 145.203.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.67.203.145.in-addr.arpa	name = 145.203.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.102.148.67 attackspambots
Jun 23 22:21:19 cvbmail sshd\[19456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.67  user=root
Jun 23 22:21:21 cvbmail sshd\[19456\]: Failed password for root from 62.102.148.67 port 33611 ssh2
Jun 23 22:21:42 cvbmail sshd\[19458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.67  user=root
2019-06-24 07:34:36
68.183.80.186 attackbotsspam
15 failed attempt(s) in the last 24h
2019-06-24 07:42:13
92.119.160.80 attackspambots
Jun 23 16:03:31 cac1d2 sshd\[9539\]: Invalid user admin from 92.119.160.80 port 25290
Jun 23 16:03:31 cac1d2 sshd\[9539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.119.160.80
Jun 23 16:03:34 cac1d2 sshd\[9539\]: Failed password for invalid user admin from 92.119.160.80 port 25290 ssh2
...
2019-06-24 07:13:47
88.214.26.10 attackspambots
Jun 23 06:26:40 *** sshd[17555]: Failed password for invalid user admin from 88.214.26.10 port 46412 ssh2
Jun 23 07:09:35 *** sshd[17987]: Failed password for invalid user admin from 88.214.26.10 port 36638 ssh2
Jun 23 07:31:36 *** sshd[18113]: Failed password for invalid user admin from 88.214.26.10 port 49432 ssh2
Jun 23 07:58:30 *** sshd[18354]: Failed password for invalid user admin from 88.214.26.10 port 34476 ssh2
Jun 23 08:47:15 *** sshd[18922]: Failed password for invalid user admin from 88.214.26.10 port 36940 ssh2
Jun 23 09:08:45 *** sshd[19039]: Failed password for invalid user admin from 88.214.26.10 port 57194 ssh2
Jun 23 09:48:49 *** sshd[19450]: Failed password for invalid user admin from 88.214.26.10 port 57822 ssh2
Jun 23 10:14:28 *** sshd[19626]: Failed password for invalid user admin from 88.214.26.10 port 43178 ssh2
Jun 23 10:36:20 *** sshd[19858]: Failed password for invalid user admin from 88.214.26.10 port 49134 ssh2
Jun 23 11:08:38 *** sshd[20225]: Failed password for invalid user admi
2019-06-24 07:14:22
201.111.88.254 attackspambots
port scan and connect, tcp 23 (telnet)
2019-06-24 07:48:20
37.187.159.53 attackspam
2019-06-23T22:02:56.921802scmdmz1 sshd\[11353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns330785.ip-37-187-159.eu  user=admin
2019-06-23T22:02:59.123549scmdmz1 sshd\[11353\]: Failed password for admin from 37.187.159.53 port 58106 ssh2
2019-06-23T22:03:01.402237scmdmz1 sshd\[11353\]: Failed password for admin from 37.187.159.53 port 58106 ssh2
...
2019-06-24 07:50:15
203.57.232.199 attackbotsspam
Trying ports that it shouldn't be.
2019-06-24 07:54:06
46.101.107.118 attackspam
Jun 24 01:40:30 host sshd\[15043\]: Invalid user fake from 46.101.107.118 port 41574
Jun 24 01:40:30 host sshd\[15043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.107.118
...
2019-06-24 07:45:39
23.225.177.162 attackspambots
port scan and connect, tcp 443 (https)
2019-06-24 07:40:19
118.67.219.101 attackbots
Jun 23 20:01:26 MK-Soft-VM7 sshd\[11988\]: Invalid user admin from 118.67.219.101 port 57656
Jun 23 20:01:26 MK-Soft-VM7 sshd\[11988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.67.219.101
Jun 23 20:01:28 MK-Soft-VM7 sshd\[11988\]: Failed password for invalid user admin from 118.67.219.101 port 57656 ssh2
...
2019-06-24 07:55:05
202.51.74.189 attackspam
Jun 23 07:45:24 *** sshd[18284]: Failed password for invalid user student1 from 202.51.74.189 port 36638 ssh2
Jun 23 07:48:00 *** sshd[18294]: Failed password for invalid user user from 202.51.74.189 port 60418 ssh2
Jun 23 07:49:29 *** sshd[18300]: Failed password for invalid user duo from 202.51.74.189 port 46152 ssh2
Jun 23 07:50:55 *** sshd[18305]: Failed password for invalid user oracle from 202.51.74.189 port 60108 ssh2
Jun 23 07:52:21 *** sshd[18317]: Failed password for invalid user iw from 202.51.74.189 port 45842 ssh2
Jun 23 07:53:48 *** sshd[18322]: Failed password for invalid user yin from 202.51.74.189 port 59800 ssh2
Jun 23 07:55:12 *** sshd[18336]: Failed password for invalid user stephan from 202.51.74.189 port 45530 ssh2
Jun 23 07:56:37 *** sshd[18342]: Failed password for invalid user appserver from 202.51.74.189 port 59484 ssh2
Jun 23 07:58:06 *** sshd[18349]: Failed password for invalid user coder from 202.51.74.189 port 45218 ssh2
Jun 23 07:59:38 *** sshd[18361]: Failed password for invali
2019-06-24 07:27:13
193.93.78.216 attack
Triggered by Fail2Ban at Ares web server
2019-06-24 07:39:24
193.201.224.199 attackspam
Jun 23 12:50:20 *** sshd[21212]: Failed password for invalid user admin from 193.201.224.199 port 51532 ssh2
Jun 23 12:50:22 *** sshd[21214]: Failed password for invalid user support from 193.201.224.199 port 57544 ssh2
Jun 23 12:52:16 *** sshd[21221]: Failed password for invalid user user from 193.201.224.199 port 32489 ssh2
Jun 23 12:52:27 *** sshd[21224]: Failed password for invalid user admin from 193.201.224.199 port 58886 ssh2
Jun 23 12:54:07 *** sshd[21237]: Failed password for invalid user 0 from 193.201.224.199 port 46352 ssh2
Jun 23 12:55:38 *** sshd[21250]: Failed password for invalid user admin from 193.201.224.199 port 50793 ssh2
Jun 23 12:55:44 *** sshd[21252]: Failed password for invalid user ubnt from 193.201.224.199 port 61166 ssh2
Jun 23 12:55:49 *** sshd[21254]: Failed password for invalid user 1234 from 193.201.224.199 port 11656 ssh2
Jun 23 12:56:23 *** sshd[21257]: Failed password for invalid user 111111 from 193.201.224.199 port 27249 ssh2
Jun 23 12:57:14 *** sshd[21261]: Failed passwor
2019-06-24 07:27:50
183.166.190.82 attackspambots
3389BruteforceIDS
2019-06-24 07:51:13
114.143.107.194 attack
SQL Injection
2019-06-24 07:24:13

最近上报的IP列表

171.206.58.14 245.23.46.235 209.210.245.105 74.232.18.3
9.186.219.121 222.94.155.214 9.13.207.153 26.167.156.123
179.12.79.203 65.176.89.60 37.175.51.138 33.145.29.230
195.19.84.218 16.241.156.126 231.255.77.139 15.100.133.56
253.236.138.11 114.15.37.35 38.41.111.253 226.155.54.128