必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.203.80.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.203.80.100.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 20:53:25 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
100.80.203.145.in-addr.arpa domain name pointer 145.203.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
100.80.203.145.in-addr.arpa	name = 145.203.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.114.251.164 attackbotsspam
Mar  8 00:10:02 lnxmysql61 sshd[19043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.251.164
Mar  8 00:10:02 lnxmysql61 sshd[19043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.251.164
2020-03-08 07:46:05
49.234.91.122 attack
Mar  8 00:41:37 sd-53420 sshd\[12557\]: Invalid user rstudio from 49.234.91.122
Mar  8 00:41:37 sd-53420 sshd\[12557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.91.122
Mar  8 00:41:40 sd-53420 sshd\[12557\]: Failed password for invalid user rstudio from 49.234.91.122 port 44404 ssh2
Mar  8 00:45:42 sd-53420 sshd\[13022\]: Invalid user ts3bot from 49.234.91.122
Mar  8 00:45:42 sd-53420 sshd\[13022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.91.122
...
2020-03-08 07:59:28
111.229.36.204 attackspambots
Lines containing failures of 111.229.36.204
Mar  2 01:38:09 shared07 sshd[18647]: Invalid user xor from 111.229.36.204 port 35030
Mar  2 01:38:09 shared07 sshd[18647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.36.204
Mar  2 01:38:11 shared07 sshd[18647]: Failed password for invalid user xor from 111.229.36.204 port 35030 ssh2
Mar  2 01:38:11 shared07 sshd[18647]: Received disconnect from 111.229.36.204 port 35030:11: Bye Bye [preauth]
Mar  2 01:38:11 shared07 sshd[18647]: Disconnected from invalid user xor 111.229.36.204 port 35030 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.229.36.204
2020-03-08 08:15:51
176.122.144.57 attackspambots
fail2ban
2020-03-08 07:38:49
49.233.182.246 attackbotsspam
Invalid user odroid from 49.233.182.246 port 40662
2020-03-08 08:16:07
82.131.245.230 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-03-08 07:45:48
178.89.82.225 attackspam
1583618911 - 03/07/2020 23:08:31 Host: 178.89.82.225/178.89.82.225 Port: 445 TCP Blocked
2020-03-08 07:37:30
144.217.214.13 attack
Mar  8 00:24:58 vps647732 sshd[26959]: Failed password for root from 144.217.214.13 port 49612 ssh2
...
2020-03-08 07:42:56
192.161.161.170 attack
Mar  7 22:49:59 hermescis postfix/smtpd[16317]: NOQUEUE: reject: RCPT from unknown[192.161.161.170]: 550 5.1.1 : Recipient address rejected:* from=<425*@*l.phiscamsk.casa> to= proto=ESMTP helo=
2020-03-08 07:38:11
35.226.165.144 attackbotsspam
Mar  2 00:57:46 pegasus sshguard[1303]: Blocking 35.226.165.144:4 for >630secs: 10 danger in 1 attacks over 0 seconds (all: 10d in 1 abuses over 0s).
Mar  2 00:57:47 pegasus sshd[19719]: Failed password for invalid user rizon from 35.226.165.144 port 40600 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=35.226.165.144
2020-03-08 08:00:57
222.186.190.2 attackbotsspam
Mar  8 05:40:31 areeb-Workstation sshd[4923]: Failed password for root from 222.186.190.2 port 23808 ssh2
Mar  8 05:40:36 areeb-Workstation sshd[4923]: Failed password for root from 222.186.190.2 port 23808 ssh2
...
2020-03-08 08:12:16
119.192.55.100 attackspambots
Mar  7 13:18:10 tdfoods sshd\[23972\]: Invalid user ftp from 119.192.55.100
Mar  7 13:18:10 tdfoods sshd\[23972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.192.55.100
Mar  7 13:18:12 tdfoods sshd\[23972\]: Failed password for invalid user ftp from 119.192.55.100 port 44098 ssh2
Mar  7 13:24:23 tdfoods sshd\[24400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.192.55.100  user=www-data
Mar  7 13:24:25 tdfoods sshd\[24400\]: Failed password for www-data from 119.192.55.100 port 33727 ssh2
2020-03-08 07:39:52
162.243.42.225 attack
Mar  7 22:03:09 raspberrypi sshd\[20745\]: Invalid user zbl from 162.243.42.225Mar  7 22:03:10 raspberrypi sshd\[20745\]: Failed password for invalid user zbl from 162.243.42.225 port 48590 ssh2Mar  7 22:07:46 raspberrypi sshd\[21046\]: Invalid user solr from 162.243.42.225Mar  7 22:07:48 raspberrypi sshd\[21046\]: Failed password for invalid user solr from 162.243.42.225 port 47356 ssh2
...
2020-03-08 07:59:03
45.134.179.246 attackbotsspam
Triggered: repeated knocking on closed ports.
2020-03-08 07:45:20
222.186.42.155 attack
Mar  8 00:13:33 localhost sshd[115708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Mar  8 00:13:34 localhost sshd[115708]: Failed password for root from 222.186.42.155 port 63470 ssh2
Mar  8 00:13:36 localhost sshd[115708]: Failed password for root from 222.186.42.155 port 63470 ssh2
Mar  8 00:13:33 localhost sshd[115708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Mar  8 00:13:34 localhost sshd[115708]: Failed password for root from 222.186.42.155 port 63470 ssh2
Mar  8 00:13:36 localhost sshd[115708]: Failed password for root from 222.186.42.155 port 63470 ssh2
Mar  8 00:13:33 localhost sshd[115708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Mar  8 00:13:34 localhost sshd[115708]: Failed password for root from 222.186.42.155 port 63470 ssh2
Mar  8 00:13:36 localhost sshd[11
...
2020-03-08 08:14:28

最近上报的IP列表

169.91.176.169 98.37.103.52 248.224.105.138 206.155.209.38
195.54.160.43 250.133.96.175 208.47.65.192 14.175.14.79
125.17.77.68 62.185.222.70 252.22.165.95 168.244.192.180
23.105.62.46 173.218.107.2 244.222.206.149 114.36.110.149
213.0.72.89 107.57.172.37 234.90.23.193 203.52.137.15