必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.239.104.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.239.104.58.			IN	A

;; AUTHORITY SECTION:
.			399	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:27:48 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
58.104.239.145.in-addr.arpa domain name pointer in.superprof.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
58.104.239.145.in-addr.arpa	name = in.superprof.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
23.227.201.157 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 23.227.201.157 (US/United States/-): 5 in the last 3600 secs - Fri Aug 31 17:21:39 2018
2020-09-25 16:30:40
185.234.218.204 attackbots
Brute force blocker - service: proftpd1 - aantal: 65 - Wed Aug 29 06:40:16 2018
2020-09-25 16:43:27
161.35.163.8 attackbots
(mod_security) mod_security (id:210492) triggered by 161.35.163.8 (GB/United Kingdom/sub-55566111111.example.com): 5 in the last 3600 secs
2020-09-25 17:09:59
176.31.162.82 attack
Sep 24 20:11:58 web1 sshd\[2216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82  user=root
Sep 24 20:12:01 web1 sshd\[2216\]: Failed password for root from 176.31.162.82 port 43604 ssh2
Sep 24 20:15:35 web1 sshd\[2483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82  user=root
Sep 24 20:15:37 web1 sshd\[2483\]: Failed password for root from 176.31.162.82 port 50808 ssh2
Sep 24 20:19:04 web1 sshd\[2794\]: Invalid user user1 from 176.31.162.82
Sep 24 20:19:04 web1 sshd\[2794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82
2020-09-25 16:53:02
159.203.124.234 attackbotsspam
Sep 25 08:26:41 ncomp sshd[28821]: Invalid user auditor from 159.203.124.234 port 43689
Sep 25 08:26:41 ncomp sshd[28821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.124.234
Sep 25 08:26:41 ncomp sshd[28821]: Invalid user auditor from 159.203.124.234 port 43689
Sep 25 08:26:44 ncomp sshd[28821]: Failed password for invalid user auditor from 159.203.124.234 port 43689 ssh2
2020-09-25 16:49:12
194.61.24.177 attackspambots
Sep 25 11:04:18 host1 sshd[320622]: Disconnecting invalid user 0 194.61.24.177 port 26933: Change of username or service not allowed: (0,ssh-connection) -> (22,ssh-connection) [preauth]
Sep 25 11:04:27 host1 sshd[320628]: Invalid user 22 from 194.61.24.177 port 32552
Sep 25 11:04:28 host1 sshd[320628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.24.177 
Sep 25 11:04:27 host1 sshd[320628]: Invalid user 22 from 194.61.24.177 port 32552
Sep 25 11:04:30 host1 sshd[320628]: Failed password for invalid user 22 from 194.61.24.177 port 32552 ssh2
...
2020-09-25 17:15:01
222.95.20.244 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 222.95.20.244 (-): 5 in the last 3600 secs - Fri Aug 31 05:03:23 2018
2020-09-25 16:32:40
117.2.233.66 attackspam
Honeypot attack, port: 445, PTR: localhost.
2020-09-25 16:55:36
182.119.208.51 attackspam
Honeypot attack, port: 5555, PTR: hn.kd.ny.adsl.
2020-09-25 17:00:31
51.144.45.198 attack
Sep 25 10:37:13 db sshd[16296]: Invalid user oxxodata from 51.144.45.198 port 53970
...
2020-09-25 16:58:56
125.129.212.198 attack
lfd: (smtpauth) Failed SMTP AUTH login from 125.129.212.198 (KR/Republic of Korea/-): 5 in the last 3600 secs - Tue Aug 28 15:27:04 2018
2020-09-25 16:57:58
194.251.17.3 attackbotsspam
Sep 25 09:18:44 mail postfix/submission/smtpd[45232]: lost connection after AUTH from unknown[194.251.17.3]
2020-09-25 16:36:24
193.126.91.154 attack
lfd: (smtpauth) Failed SMTP AUTH login from 193.126.91.154 (193-126-91-154.net.novis.pt): 5 in the last 3600 secs - Thu Aug 30 12:06:43 2018
2020-09-25 16:37:25
165.232.38.24 attackbotsspam
Sep 24 16:21:23 r.ca sshd[10093]: Failed password for invalid user sonia from 165.232.38.24 port 51518 ssh2
2020-09-25 16:33:41
161.35.168.223 attack
Sep 24 16:29:23 r.ca sshd[12062]: Failed password for root from 161.35.168.223 port 41884 ssh2
2020-09-25 17:09:19

最近上报的IP列表

145.239.104.240 145.239.105.254 145.239.105.39 145.239.11.169
145.239.11.188 145.239.11.207 145.239.118.165 145.239.12.177
145.239.12.239 145.239.12.53 145.239.12.93 145.239.120.62
145.239.121.108 145.239.121.48 145.239.122.18 145.239.122.35
145.239.124.205 145.239.124.32 145.239.125.102 145.239.125.117