必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
145.239.220.229 attackbots
Automatic report - XMLRPC Attack
2020-05-25 20:44:27
145.239.222.147 attackspam
SMTP
2020-03-17 02:19:44
145.239.224.159 attackspam
SpamReport
2019-11-27 16:07:29
145.239.224.142 attackspam
Nov 25 07:08:38 mxgate1 postfix/postscreen[31676]: CONNECT from [145.239.224.142]:50739 to [176.31.12.44]:25
Nov 25 07:08:38 mxgate1 postfix/dnsblog[31678]: addr 145.239.224.142 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 25 07:08:38 mxgate1 postfix/dnsblog[31677]: addr 145.239.224.142 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 25 07:08:38 mxgate1 postfix/dnsblog[31677]: addr 145.239.224.142 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 25 07:08:44 mxgate1 postfix/postscreen[31676]: DNSBL rank 3 for [145.239.224.142]:50739
Nov 25 07:08:44 mxgate1 postfix/tlsproxy[31700]: CONNECT from [145.239.224.142]:50739
Nov x@x
Nov 25 07:08:44 mxgate1 postfix/postscreen[31676]: DISCONNECT [145.239.224.142]:50739
Nov 25 07:08:44 mxgate1 postfix/tlsproxy[31700]: DISCONNECT [145.239.224.142]:50739


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=145.239.224.142
2019-11-25 19:34:09
145.239.224.146 attackbotsspam
SpamReport
2019-11-18 15:43:06
145.239.224.138 attackspam
SpamReport
2019-11-13 14:46:07
145.239.224.138 attackbotsspam
Brute force attempt
2019-10-16 20:36:46
145.239.227.21 attackbotsspam
2019-10-03T02:37:09.576044  sshd[4251]: Invalid user ky from 145.239.227.21 port 51278
2019-10-03T02:37:09.589610  sshd[4251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
2019-10-03T02:37:09.576044  sshd[4251]: Invalid user ky from 145.239.227.21 port 51278
2019-10-03T02:37:11.532005  sshd[4251]: Failed password for invalid user ky from 145.239.227.21 port 51278 ssh2
2019-10-03T02:40:56.169656  sshd[4298]: Invalid user osvaldo from 145.239.227.21 port 34400
...
2019-10-03 09:24:46
145.239.227.21 attackspam
Sep 22 00:33:33 SilenceServices sshd[589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Sep 22 00:33:36 SilenceServices sshd[589]: Failed password for invalid user teste from 145.239.227.21 port 42708 ssh2
Sep 22 00:37:14 SilenceServices sshd[1586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
2019-09-22 06:52:16
145.239.227.21 attackspambots
Sep 17 05:11:18 hanapaa sshd\[13091\]: Invalid user recovery from 145.239.227.21
Sep 17 05:11:18 hanapaa sshd\[13091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip21.ip-145-239-227.eu
Sep 17 05:11:20 hanapaa sshd\[13091\]: Failed password for invalid user recovery from 145.239.227.21 port 48258 ssh2
Sep 17 05:15:36 hanapaa sshd\[13423\]: Invalid user ubnt from 145.239.227.21
Sep 17 05:15:36 hanapaa sshd\[13423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip21.ip-145-239-227.eu
2019-09-17 23:30:39
145.239.227.21 attack
Sep 17 01:34:01 aat-srv002 sshd[2316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Sep 17 01:34:02 aat-srv002 sshd[2316]: Failed password for invalid user password from 145.239.227.21 port 36462 ssh2
Sep 17 01:38:05 aat-srv002 sshd[2419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Sep 17 01:38:07 aat-srv002 sshd[2419]: Failed password for invalid user ionyszaa from 145.239.227.21 port 49454 ssh2
...
2019-09-17 14:56:33
145.239.227.21 attackspambots
Sep 14 23:21:13 vtv3 sshd\[28935\]: Invalid user maxwell from 145.239.227.21 port 34480
Sep 14 23:21:13 vtv3 sshd\[28935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Sep 14 23:21:14 vtv3 sshd\[28935\]: Failed password for invalid user maxwell from 145.239.227.21 port 34480 ssh2
Sep 14 23:24:45 vtv3 sshd\[30537\]: Invalid user scaner from 145.239.227.21 port 48498
Sep 14 23:24:45 vtv3 sshd\[30537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Sep 14 23:36:04 vtv3 sshd\[4036\]: Invalid user tx from 145.239.227.21 port 34078
Sep 14 23:36:04 vtv3 sshd\[4036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Sep 14 23:36:06 vtv3 sshd\[4036\]: Failed password for invalid user tx from 145.239.227.21 port 34078 ssh2
Sep 14 23:39:57 vtv3 sshd\[5638\]: Invalid user bill from 145.239.227.21 port 48092
Sep 14 23:39:57 vtv3 sshd\[5638\]: pam
2019-09-15 06:10:37
145.239.227.21 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Failed password for invalid user tomas from 145.239.227.21 port 41688 ssh2
Invalid user user123 from 145.239.227.21 port 56908
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Failed password for invalid user user123 from 145.239.227.21 port 56908 ssh2
2019-09-14 10:05:41
145.239.227.21 attackspam
Sep 12 19:43:37 nextcloud sshd\[23244\]: Invalid user temp from 145.239.227.21
Sep 12 19:43:37 nextcloud sshd\[23244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Sep 12 19:43:39 nextcloud sshd\[23244\]: Failed password for invalid user temp from 145.239.227.21 port 54314 ssh2
...
2019-09-13 06:52:24
145.239.227.21 attackspambots
Sep 12 10:59:26 SilenceServices sshd[20424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
Sep 12 10:59:28 SilenceServices sshd[20424]: Failed password for invalid user postgres from 145.239.227.21 port 57638 ssh2
Sep 12 11:05:12 SilenceServices sshd[22526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.227.21
2019-09-12 17:19:48
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.239.22.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.239.22.124.			IN	A

;; AUTHORITY SECTION:
.			371	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:17:59 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
124.22.239.145.in-addr.arpa domain name pointer ip124.ip-145-239-22.eu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
124.22.239.145.in-addr.arpa	name = ip124.ip-145-239-22.eu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.209.237.152 attackspam
Aug 25 03:02:25 lcprod sshd\[12012\]: Invalid user bwadmin from 134.209.237.152
Aug 25 03:02:25 lcprod sshd\[12012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.152
Aug 25 03:02:27 lcprod sshd\[12012\]: Failed password for invalid user bwadmin from 134.209.237.152 port 42632 ssh2
Aug 25 03:06:30 lcprod sshd\[12380\]: Invalid user cdoran from 134.209.237.152
Aug 25 03:06:30 lcprod sshd\[12380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.152
2019-08-25 21:15:59
223.130.100.157 attackspam
Reported by AbuseIPDB proxy server.
2019-08-25 21:22:49
167.99.55.254 attackbots
Invalid user git from 167.99.55.254 port 37690
2019-08-25 21:24:22
194.154.215.220 attackbotsspam
$f2bV_matches
2019-08-25 21:17:25
37.139.13.105 attackspam
Aug 25 14:48:08 [HOSTNAME] sshd[2645]: User **removed** from 37.139.13.105 not allowed because not listed in AllowUsers
Aug 25 14:53:00 [HOSTNAME] sshd[2683]: Invalid user photo from 37.139.13.105 port 47748
Aug 25 14:58:18 [HOSTNAME] sshd[2719]: Invalid user angel from 37.139.13.105 port 44948
...
2019-08-25 21:11:15
94.23.149.25 attack
Aug 25 07:53:43 hb sshd\[9418\]: Invalid user ubuntu from 94.23.149.25
Aug 25 07:53:43 hb sshd\[9418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip25.ip-94-23-149.eu
Aug 25 07:53:44 hb sshd\[9418\]: Failed password for invalid user ubuntu from 94.23.149.25 port 41836 ssh2
Aug 25 08:00:47 hb sshd\[9992\]: Invalid user rao from 94.23.149.25
Aug 25 08:00:47 hb sshd\[9992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip25.ip-94-23-149.eu
2019-08-25 21:40:41
185.142.236.34 attackspambots
firewall-block, port(s): 9009/tcp
2019-08-25 21:21:23
54.38.241.162 attackspambots
Aug 25 03:31:53 sachi sshd\[4069\]: Invalid user morrigan from 54.38.241.162
Aug 25 03:31:53 sachi sshd\[4069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-54-38-241.eu
Aug 25 03:31:54 sachi sshd\[4069\]: Failed password for invalid user morrigan from 54.38.241.162 port 49686 ssh2
Aug 25 03:39:11 sachi sshd\[4791\]: Invalid user oracle from 54.38.241.162
Aug 25 03:39:11 sachi sshd\[4791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.ip-54-38-241.eu
2019-08-25 21:46:43
41.75.69.30 attackbots
Unauthorized connection attempt from IP address 41.75.69.30 on Port 445(SMB)
2019-08-25 21:10:36
71.6.233.110 attackbotsspam
firewall-block, port(s): 8060/tcp
2019-08-25 22:01:20
198.108.67.90 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-08-25 21:29:18
104.248.162.218 attackspam
Aug 25 14:41:33 server sshd\[21673\]: Invalid user windows from 104.248.162.218 port 59192
Aug 25 14:41:33 server sshd\[21673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.162.218
Aug 25 14:41:35 server sshd\[21673\]: Failed password for invalid user windows from 104.248.162.218 port 59192 ssh2
Aug 25 14:45:35 server sshd\[9778\]: Invalid user test from 104.248.162.218 port 32878
Aug 25 14:45:35 server sshd\[9778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.162.218
2019-08-25 21:15:28
80.82.64.127 attackspambots
Splunk® : port scan detected:
Aug 25 09:08:22 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=80.82.64.127 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=8389 PROTO=TCP SPT=57498 DPT=1340 WINDOW=1024 RES=0x00 SYN URGP=0
2019-08-25 21:47:49
167.71.82.184 attackspam
Aug 25 03:34:31 tdfoods sshd\[28862\]: Invalid user Qwerty1 from 167.71.82.184
Aug 25 03:34:31 tdfoods sshd\[28862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.82.184
Aug 25 03:34:33 tdfoods sshd\[28862\]: Failed password for invalid user Qwerty1 from 167.71.82.184 port 47436 ssh2
Aug 25 03:38:28 tdfoods sshd\[29238\]: Invalid user 123456 from 167.71.82.184
Aug 25 03:38:28 tdfoods sshd\[29238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.82.184
2019-08-25 21:49:06
122.228.19.80 attack
25.08.2019 13:07:18 Connection to port 5007 blocked by firewall
2019-08-25 21:38:28

最近上报的IP列表

145.239.217.72 145.239.220.204 145.239.2.3 145.239.200.120
145.239.222.146 145.239.214.142 145.239.232.101 145.239.238.243
145.239.233.77 145.239.24.216 145.239.244.182 145.239.25.246
145.239.252.136 145.239.232.133 145.239.244.173 145.239.245.118
145.239.25.187 145.239.252.229 145.239.254.81 145.239.255.227