必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.215.120.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.215.120.200.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 05:04:31 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
200.120.215.145.in-addr.arpa domain name pointer 145.215.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
200.120.215.145.in-addr.arpa	name = 145.215.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.64.78.116 attack
Invalid user cookie from 212.64.78.116 port 40364
2020-06-15 06:57:47
221.13.203.102 attackbotsspam
SSH brute-force: detected 11 distinct username(s) / 13 distinct password(s) within a 24-hour window.
2020-06-15 07:16:30
134.122.103.0 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-15 07:12:10
43.241.132.45 attackbots
Port Scan detected!
...
2020-06-15 07:11:13
200.56.2.74 attackbots
Automatic report - Port Scan Attack
2020-06-15 07:08:08
106.12.252.143 attack
Port probing on unauthorized port 1433
2020-06-15 07:00:27
1.11.201.18 attackbots
Jun 15 01:13:25 PorscheCustomer sshd[15556]: Failed password for root from 1.11.201.18 port 50224 ssh2
Jun 15 01:19:31 PorscheCustomer sshd[15853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.11.201.18
Jun 15 01:19:33 PorscheCustomer sshd[15853]: Failed password for invalid user atom from 1.11.201.18 port 58462 ssh2
...
2020-06-15 07:21:14
211.193.31.52 attack
Invalid user git from 211.193.31.52 port 57118
2020-06-15 07:13:47
49.88.112.55 attackbotsspam
Jun 15 00:59:53 home sshd[32762]: Failed password for root from 49.88.112.55 port 53479 ssh2
Jun 15 01:00:03 home sshd[32762]: Failed password for root from 49.88.112.55 port 53479 ssh2
Jun 15 01:00:07 home sshd[32762]: Failed password for root from 49.88.112.55 port 53479 ssh2
Jun 15 01:00:07 home sshd[32762]: error: maximum authentication attempts exceeded for root from 49.88.112.55 port 53479 ssh2 [preauth]
...
2020-06-15 07:01:10
5.188.62.147 attack
Automatic report - Banned IP Access
2020-06-15 07:01:38
182.252.135.42 attackbots
2020-06-09T19:45:03.176658vt3.awoom.xyz sshd[4155]: Invalid user edgar from 182.252.135.42 port 48912
2020-06-09T19:45:03.181425vt3.awoom.xyz sshd[4155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.252.135.42
2020-06-09T19:45:03.176658vt3.awoom.xyz sshd[4155]: Invalid user edgar from 182.252.135.42 port 48912
2020-06-09T19:45:05.359378vt3.awoom.xyz sshd[4155]: Failed password for invalid user edgar from 182.252.135.42 port 48912 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.252.135.42
2020-06-15 07:31:43
119.226.11.100 attackspam
Jun 15 01:28:46 vmd26974 sshd[15450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.226.11.100
Jun 15 01:28:48 vmd26974 sshd[15450]: Failed password for invalid user deploy from 119.226.11.100 port 39590 ssh2
...
2020-06-15 07:31:14
219.250.188.140 attack
Jun 14 23:19:13 server sshd[26309]: Failed password for invalid user account from 219.250.188.140 port 50737 ssh2
Jun 14 23:22:53 server sshd[30636]: Failed password for root from 219.250.188.140 port 51269 ssh2
Jun 14 23:26:38 server sshd[2099]: Failed password for root from 219.250.188.140 port 51794 ssh2
2020-06-15 07:11:27
82.140.128.213 attackbotsspam
Automatic report - XMLRPC Attack
2020-06-15 07:08:53
120.88.46.226 attackbotsspam
Jun 14 22:25:10 gestao sshd[26881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.88.46.226 
Jun 14 22:25:13 gestao sshd[26881]: Failed password for invalid user jht from 120.88.46.226 port 53676 ssh2
Jun 14 22:26:57 gestao sshd[26959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.88.46.226 
...
2020-06-15 07:00:01

最近上报的IP列表

76.248.204.36 80.161.56.241 139.9.218.150 15.86.7.244
36.208.112.108 222.114.90.61 64.65.203.139 190.83.73.200
45.128.89.88 103.35.254.19 162.16.60.216 30.39.68.128
213.115.210.29 242.220.2.141 66.64.84.222 40.221.35.249
215.18.144.117 133.69.124.110 134.201.32.126 250.128.133.51