必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.203.93.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.203.93.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:17:24 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
2.93.203.145.in-addr.arpa domain name pointer 145.203.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.93.203.145.in-addr.arpa	name = 145.203.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.53.254.1 attack
failed_logins
2019-07-23 06:12:19
92.50.186.82 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 15:39:50,202 INFO [shellcode_manager] (92.50.186.82) no match, writing hexdump (cdbdc8826e6bfb7c300145ba6ddb7d0f :2039040) - MS17010 (EternalBlue)
2019-07-23 05:54:32
188.255.237.143 attackspambots
Honeypot attack, port: 23, PTR: free-237-143.mediaworksit.net.
2019-07-23 06:21:13
81.22.45.252 attackspambots
Jul 23 00:15:58 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.252 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=4577 PROTO=TCP SPT=43974 DPT=12107 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-23 06:34:21
103.129.220.42 attackbotsspam
WordPress brute force
2019-07-23 06:20:35
165.227.39.71 attack
Jul 22 16:05:07 OPSO sshd\[11953\]: Invalid user love from 165.227.39.71 port 36724
Jul 22 16:05:07 OPSO sshd\[11953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.39.71
Jul 22 16:05:09 OPSO sshd\[11953\]: Failed password for invalid user love from 165.227.39.71 port 36724 ssh2
Jul 22 16:12:02 OPSO sshd\[12957\]: Invalid user odoo from 165.227.39.71 port 33188
Jul 22 16:12:02 OPSO sshd\[12957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.39.71
2019-07-23 05:58:45
185.156.177.20 attackbots
[21/Jul/2019:14:59:58 -0400] "\x03" Blank UA
2019-07-23 06:26:59
186.224.180.73 attack
$f2bV_matches
2019-07-23 06:13:13
41.33.58.100 attackspambots
Honeypot attack, port: 445, PTR: host-41.33.58.100.tedata.net.
2019-07-23 06:06:36
58.87.109.107 attackspam
Jul 22 18:11:12 lnxded64 sshd[25790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.109.107
2019-07-23 06:16:01
115.238.251.175 attack
scan z
2019-07-23 05:53:40
103.249.100.22 attackbots
<38>1 2019-07-22T14:00:03.051739-05:00 thebighonker.lerctr.org sshd 21002 - - Failed unknown for invalid user butter from 103.249.100.22 port 37396 ssh2
<38>1 2019-07-22T14:00:12.233888-05:00 thebighonker.lerctr.org sshd 21075 - - Failed unknown for invalid user butter from 103.249.100.22 port 41188 ssh2
<38>1 2019-07-22T14:00:17.458627-05:00 thebighonker.lerctr.org sshd 21087 - - Failed unknown for invalid user minecraft from 103.249.100.22 port 51406 ssh2
...
2019-07-23 05:59:33
211.80.89.37 attack
Jul 22 14:59:47 mxgate1 postfix/postscreen[7227]: CONNECT from [211.80.89.37]:23842 to [176.31.12.44]:25
Jul 22 14:59:47 mxgate1 postfix/dnsblog[7952]: addr 211.80.89.37 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 22 14:59:47 mxgate1 postfix/dnsblog[7943]: addr 211.80.89.37 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 22 14:59:53 mxgate1 postfix/postscreen[7227]: DNSBL rank 3 for [211.80.89.37]:23842
Jul x@x
Jul 22 14:59:54 mxgate1 postfix/postscreen[7227]: HANGUP after 1.6 from [211.80.89.37]:23842 in tests after SMTP handshake
Jul 22 14:59:54 mxgate1 postfix/postscreen[7227]: DISCONNECT [211.80.89.37]:23842


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=211.80.89.37
2019-07-23 06:04:10
187.109.52.241 attack
$f2bV_matches
2019-07-23 06:17:54
43.228.226.21 attack
Jul 22 14:56:05 pl3server postfix/smtpd[1051640]: connect from unknown[43.228.226.21]
Jul 22 14:56:07 pl3server postfix/smtpd[1051640]: warning: unknown[43.228.226.21]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 22 14:56:07 pl3server postfix/smtpd[1051640]: warning: unknown[43.228.226.21]: SASL PLAIN authentication failed: authentication failure
Jul 22 14:56:08 pl3server postfix/smtpd[1051640]: warning: unknown[43.228.226.21]: SASL LOGIN authentication failed: authentication failure
Jul 22 14:56:09 pl3server postfix/smtpd[1051640]: disconnect from unknown[43.228.226.21]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=43.228.226.21
2019-07-23 05:59:56

最近上报的IP列表

97.225.60.75 240.5.19.99 19.143.130.75 34.117.24.128
81.196.187.103 208.147.129.25 10.165.129.181 24.3.5.164
195.103.192.19 60.237.109.104 31.23.103.145 250.158.195.135
248.23.19.146 176.150.147.16 97.14.109.108 194.59.187.18
142.107.109.129 243.0.129.22 108.200.12.162 122.7.102.130