必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.208.190.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35620
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.208.190.116.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 10:59:44 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
116.190.208.145.in-addr.arpa domain name pointer 145.208.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.190.208.145.in-addr.arpa	name = 145.208.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.252.143.76 attackspambots
Sep 24 00:08:33 herz-der-gamer sshd[28820]: Invalid user fc from 82.252.143.76 port 29592
Sep 24 00:08:33 herz-der-gamer sshd[28820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.252.143.76
Sep 24 00:08:33 herz-der-gamer sshd[28820]: Invalid user fc from 82.252.143.76 port 29592
Sep 24 00:08:34 herz-der-gamer sshd[28820]: Failed password for invalid user fc from 82.252.143.76 port 29592 ssh2
...
2019-09-24 07:34:16
104.168.246.59 attackbotsspam
Sep 24 01:51:26 jane sshd[30736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.246.59 
Sep 24 01:51:28 jane sshd[30736]: Failed password for invalid user carrera from 104.168.246.59 port 48802 ssh2
...
2019-09-24 08:01:43
218.1.18.78 attackspambots
Sep 23 13:36:16 auw2 sshd\[30239\]: Invalid user upload from 218.1.18.78
Sep 23 13:36:16 auw2 sshd\[30239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78
Sep 23 13:36:19 auw2 sshd\[30239\]: Failed password for invalid user upload from 218.1.18.78 port 22980 ssh2
Sep 23 13:40:33 auw2 sshd\[30717\]: Invalid user purala from 218.1.18.78
Sep 23 13:40:33 auw2 sshd\[30717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78
2019-09-24 07:52:53
118.1.115.83 attack
23/tcp
[2019-09-23]1pkt
2019-09-24 08:04:30
106.105.204.202 attackbotsspam
Honeypot attack, port: 23, PTR: 106.105.204.202.adsl.dynamic.seed.net.tw.
2019-09-24 07:58:06
142.112.87.158 attackbotsspam
Sep 24 01:18:06 MK-Soft-VM7 sshd[30637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.112.87.158 
Sep 24 01:18:07 MK-Soft-VM7 sshd[30637]: Failed password for invalid user xxx from 142.112.87.158 port 34148 ssh2
...
2019-09-24 07:30:39
5.67.8.236 attack
Automatic report - Port Scan Attack
2019-09-24 07:27:30
220.202.132.252 attackspambots
3389/tcp 3389/tcp
[2019-09-23]2pkt
2019-09-24 07:35:54
106.13.78.171 attack
2019-09-23T17:12:00.2021901495-001 sshd\[19062\]: Invalid user beruf from 106.13.78.171 port 55308
2019-09-23T17:12:00.2067781495-001 sshd\[19062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.171
2019-09-23T17:12:02.4017911495-001 sshd\[19062\]: Failed password for invalid user beruf from 106.13.78.171 port 55308 ssh2
2019-09-23T17:16:05.8623211495-001 sshd\[19328\]: Invalid user house from 106.13.78.171 port 34692
2019-09-23T17:16:05.8663941495-001 sshd\[19328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.171
2019-09-23T17:16:08.0309111495-001 sshd\[19328\]: Failed password for invalid user house from 106.13.78.171 port 34692 ssh2
...
2019-09-24 07:55:31
92.34.75.118 attack
Honeypot attack, port: 5555, PTR: c-764b225c.015-862-6f72651.bbcust.telenor.se.
2019-09-24 07:54:12
194.150.254.183 attackbotsspam
Automatic report - Port Scan Attack
2019-09-24 07:51:20
172.105.4.227 attackbotsspam
Blocked for port scanning.
Time: Mon Sep 23. 21:41:20 2019 +0200
IP: 172.105.4.227 (CA/Canada/protoscan.ampereinnotech.com)

Sample of block hits:
Sep 23 21:40:51 vserv kernel: [18912235.624536] Firewall: *TCP_IN Blocked* IN=venet0 OUT= MAC= SRC=172.105.4.227 DST=[removed] LEN=44 TOS=0x00 PREC=0x00 TTL=26 ID=40040 PROTO=TCP SPT=38315 DPT=23 WINDOW=1024 RES=0x00 SYN URGP=0
Sep 23 21:40:51 vserv kernel: [18912235.725825] Firewall: *TCP_IN Blocked* IN=venet0 OUT= MAC= SRC=172.105.4.227 DST=[removed] LEN=44 TOS=0x00 PREC=0x00 TTL=35 ID=63574 PROTO=TCP SPT=38316 DPT=23 WINDOW=1024 RES=0x00 SYN URGP=0
Sep 23 21:41:01 vserv kernel: [18912245.232775] Firewall: *TCP_IN Blocked* IN=venet0 OUT= MAC= SRC=172.105.4.227 DST=[removed] LEN=44 TOS=0x08 PREC=0x20 TTL=26 ID=57485 PROTO=TCP SPT=38317 DPT=23 WINDOW=1024 RES=0x00 SYN URGP=0
Sep 23 21:41:01 vserv kernel: [18912245.237658] Firewall: *TCP_IN Blocked* IN=venet0 OUT= MAC= SRC=172.105.4.227 DST=[removed] LEN=44 TOS=0x00 PREC=0x00 TTL=34 ID=8858 PROTO ....
2019-09-24 07:46:19
46.101.103.207 attackbots
Reported by AbuseIPDB proxy server.
2019-09-24 07:59:52
154.73.22.107 attackbotsspam
Sep 24 01:36:00 markkoudstaal sshd[26335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.22.107
Sep 24 01:36:02 markkoudstaal sshd[26335]: Failed password for invalid user ftpuser from 154.73.22.107 port 50736 ssh2
Sep 24 01:41:35 markkoudstaal sshd[26884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.22.107
2019-09-24 08:06:16
186.1.195.181 attack
2019-09-23 17:18:14 H=([186.1.195.181]) [186.1.195.181]:16500 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=186.1.195.181)
2019-09-23 17:18:31 unexpected disconnection while reading SMTP command from ([186.1.195.181]) [186.1.195.181]:16500 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-09-23 18:58:43 H=([186.1.195.181]) [186.1.195.181]:23456 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=186.1.195.181)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=186.1.195.181
2019-09-24 07:40:52

最近上报的IP列表

176.69.133.71 138.87.14.97 53.22.243.45 31.230.11.174
199.199.1.165 190.229.29.30 202.116.153.207 135.227.80.57
12.235.11.123 236.58.88.12 147.123.7.185 138.247.174.183
177.148.8.203 207.87.187.31 223.154.217.43 131.24.48.38
26.106.78.58 165.84.3.192 27.21.61.252 117.219.75.120