必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.225.18.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.225.18.244.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 23:24:07 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 244.18.225.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.18.225.145.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.215.199.12 attack
May  2 16:15:11 *** sshd[20316]: Invalid user testuser from 31.215.199.12 port 31771
May  2 16:15:11 *** sshd[20316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.215.199.12
May  2 16:15:12 *** sshd[20316]: Failed password for invalid user testuser from 31.215.199.12 port 31771 ssh2
May  2 16:15:13 *** sshd[20316]: Received disconnect from 31.215.199.12 port 31771:11: Bye Bye [preauth]
May  2 16:15:13 *** sshd[20316]: Disconnected from 31.215.199.12 port 31771 [preauth]
May  2 16:20:15 *** sshd[20377]: Invalid user yyx from 31.215.199.12 port 9172
May  2 16:20:15 *** sshd[20377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.215.199.12
May  2 16:20:17 *** sshd[20377]: Failed password for invalid user yyx from 31.215.199.12 port 9172 ssh2
May  2 16:20:17 *** sshd[20377]: Received disconnect from 31.215.199.12 port 9172:11: Bye Bye [preauth]
May  2 16:20:17 *** sshd[20377]: Disconne........
-------------------------------
2020-05-04 03:10:16
106.12.149.253 attackbots
May  3 13:44:57 Tower sshd[29971]: Connection from 106.12.149.253 port 54876 on 192.168.10.220 port 22 rdomain ""
May  3 13:45:00 Tower sshd[29971]: Invalid user sahil from 106.12.149.253 port 54876
May  3 13:45:00 Tower sshd[29971]: error: Could not get shadow information for NOUSER
May  3 13:45:00 Tower sshd[29971]: Failed password for invalid user sahil from 106.12.149.253 port 54876 ssh2
May  3 13:45:01 Tower sshd[29971]: Received disconnect from 106.12.149.253 port 54876:11: Bye Bye [preauth]
May  3 13:45:01 Tower sshd[29971]: Disconnected from invalid user sahil 106.12.149.253 port 54876 [preauth]
2020-05-04 02:51:42
35.194.64.202 attack
May  3 22:07:08 web1 sshd[20162]: Invalid user mimi from 35.194.64.202 port 42320
May  3 22:07:08 web1 sshd[20162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.194.64.202
May  3 22:07:08 web1 sshd[20162]: Invalid user mimi from 35.194.64.202 port 42320
May  3 22:07:10 web1 sshd[20162]: Failed password for invalid user mimi from 35.194.64.202 port 42320 ssh2
May  3 22:15:48 web1 sshd[23560]: Invalid user zhen from 35.194.64.202 port 37492
May  3 22:15:48 web1 sshd[23560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.194.64.202
May  3 22:15:48 web1 sshd[23560]: Invalid user zhen from 35.194.64.202 port 37492
May  3 22:15:50 web1 sshd[23560]: Failed password for invalid user zhen from 35.194.64.202 port 37492 ssh2
May  3 22:19:25 web1 sshd[25276]: Invalid user chad from 35.194.64.202 port 49712
...
2020-05-04 03:01:36
106.52.200.132 attack
May  2 22:58:37 our-server-hostname sshd[4296]: Invalid user down from 106.52.200.132
May  2 22:58:37 our-server-hostname sshd[4296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.132 
May  2 22:58:39 our-server-hostname sshd[4296]: Failed password for invalid user down from 106.52.200.132 port 54892 ssh2
May  2 23:15:08 our-server-hostname sshd[7033]: Invalid user alusero from 106.52.200.132
May  2 23:15:08 our-server-hostname sshd[7033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.132 
May  2 23:15:09 our-server-hostname sshd[7033]: Failed password for invalid user alusero from 106.52.200.132 port 54842 ssh2
May  2 23:18:34 our-server-hostname sshd[7595]: Invalid user unhostnameek from 106.52.200.132
May  2 23:18:34 our-server-hostname sshd[7595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.132 


........
-----------------------------------------
2020-05-04 03:06:10
94.191.78.128 attackspambots
2020-05-03T11:58:50.361182abusebot-7.cloudsearch.cf sshd[14901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.78.128  user=root
2020-05-03T11:58:52.471860abusebot-7.cloudsearch.cf sshd[14901]: Failed password for root from 94.191.78.128 port 38680 ssh2
2020-05-03T12:04:23.317514abusebot-7.cloudsearch.cf sshd[15250]: Invalid user woc from 94.191.78.128 port 54310
2020-05-03T12:04:23.323932abusebot-7.cloudsearch.cf sshd[15250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.78.128
2020-05-03T12:04:23.317514abusebot-7.cloudsearch.cf sshd[15250]: Invalid user woc from 94.191.78.128 port 54310
2020-05-03T12:04:25.484351abusebot-7.cloudsearch.cf sshd[15250]: Failed password for invalid user woc from 94.191.78.128 port 54310 ssh2
2020-05-03T12:07:52.321566abusebot-7.cloudsearch.cf sshd[15431]: Invalid user chenyang from 94.191.78.128 port 49602
...
2020-05-04 02:35:50
51.68.212.114 attackspambots
May  3 20:04:15 * sshd[8788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.212.114
May  3 20:04:16 * sshd[8788]: Failed password for invalid user delivery from 51.68.212.114 port 51854 ssh2
2020-05-04 03:06:32
54.89.247.215 attackspambots
May  2 06:13:10 cumulus sshd[7491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.89.247.215  user=r.r
May  2 06:13:12 cumulus sshd[7491]: Failed password for r.r from 54.89.247.215 port 42488 ssh2
May  2 06:13:12 cumulus sshd[7491]: Received disconnect from 54.89.247.215 port 42488:11: Bye Bye [preauth]
May  2 06:13:12 cumulus sshd[7491]: Disconnected from 54.89.247.215 port 42488 [preauth]
May  2 06:21:49 cumulus sshd[7932]: Invalid user influxdb from 54.89.247.215 port 35458
May  2 06:21:49 cumulus sshd[7932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.89.247.215
May  2 06:21:51 cumulus sshd[7932]: Failed password for invalid user influxdb from 54.89.247.215 port 35458 ssh2
May  2 06:21:51 cumulus sshd[7932]: Received disconnect from 54.89.247.215 port 35458:11: Bye Bye [preauth]
May  2 06:21:51 cumulus sshd[7932]: Disconnected from 54.89.247.215 port 35458 [preauth]


........
-------------------------------------
2020-05-04 03:02:02
129.204.109.127 attackbots
prod6
...
2020-05-04 02:41:33
5.39.88.60 attackspam
May  3 11:19:00 mockhub sshd[8656]: Failed password for root from 5.39.88.60 port 33212 ssh2
May  3 11:25:11 mockhub sshd[8927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.88.60
...
2020-05-04 02:38:43
213.159.213.137 attackbots
Automatic report - Banned IP Access
2020-05-04 02:57:43
142.4.204.122 attackbots
May  3 13:59:53 eventyay sshd[6878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122
May  3 13:59:54 eventyay sshd[6878]: Failed password for invalid user database from 142.4.204.122 port 59733 ssh2
May  3 14:06:46 eventyay sshd[7168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122
...
2020-05-04 03:05:53
134.209.250.9 attack
May  3 20:31:09 rotator sshd\[16519\]: Invalid user dada from 134.209.250.9May  3 20:31:12 rotator sshd\[16519\]: Failed password for invalid user dada from 134.209.250.9 port 54418 ssh2May  3 20:35:01 rotator sshd\[16585\]: Invalid user zimbra from 134.209.250.9May  3 20:35:03 rotator sshd\[16585\]: Failed password for invalid user zimbra from 134.209.250.9 port 37982 ssh2May  3 20:38:39 rotator sshd\[17396\]: Invalid user openerp from 134.209.250.9May  3 20:38:41 rotator sshd\[17396\]: Failed password for invalid user openerp from 134.209.250.9 port 49778 ssh2
...
2020-05-04 02:39:00
102.89.2.186 attack
1588507600 - 05/03/2020 14:06:40 Host: 102.89.2.186/102.89.2.186 Port: 445 TCP Blocked
2020-05-04 03:08:15
141.101.77.131 attackbotsspam
Wordpress XMLRPC attack
2020-05-04 03:03:56
89.223.25.128 attackbotsspam
May  3 20:51:14 webhost01 sshd[31220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.223.25.128
May  3 20:51:16 webhost01 sshd[31220]: Failed password for invalid user geert from 89.223.25.128 port 35568 ssh2
...
2020-05-04 02:54:42

最近上报的IP列表

98.207.248.140 238.170.226.33 124.153.32.69 81.98.41.83
179.71.138.151 70.231.157.115 47.123.177.22 39.138.126.85
70.111.73.208 253.18.76.146 156.37.133.59 150.66.85.89
224.150.52.72 136.6.106.230 5.12.158.114 81.131.20.112
53.157.67.64 95.199.134.121 12.138.139.47 192.69.96.196