必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.239.54.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.239.54.211.			IN	A

;; AUTHORITY SECTION:
.			337	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:34:22 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
211.54.239.145.in-addr.arpa domain name pointer pmx3.srv30.axspace.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
211.54.239.145.in-addr.arpa	name = pmx3.srv30.axspace.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.182.78.87 attackspam
Nov  9 09:00:51 vps666546 sshd\[20583\]: Invalid user ts from 217.182.78.87 port 45072
Nov  9 09:00:51 vps666546 sshd\[20583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.78.87
Nov  9 09:00:54 vps666546 sshd\[20583\]: Failed password for invalid user ts from 217.182.78.87 port 45072 ssh2
Nov  9 09:04:45 vps666546 sshd\[20651\]: Invalid user lexus from 217.182.78.87 port 55274
Nov  9 09:04:45 vps666546 sshd\[20651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.78.87
...
2019-11-09 21:53:16
45.136.108.67 attack
Connection by 45.136.108.67 on port: 5909 got caught by honeypot at 11/9/2019 8:49:15 AM
2019-11-09 22:00:28
138.68.212.139 attackspam
138.68.212.139 was recorded 5 times by 5 hosts attempting to connect to the following ports: 1028. Incident counter (4h, 24h, all-time): 5, 16, 23
2019-11-09 22:03:05
97.74.24.202 attack
Automatic report - XMLRPC Attack
2019-11-09 21:58:07
34.213.88.137 attackspam
Automatic report - XMLRPC Attack
2019-11-09 21:57:10
61.130.28.210 attackbotsspam
2019-11-09T13:56:40.613274abusebot-3.cloudsearch.cf sshd\[14672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.130.28.210  user=root
2019-11-09 22:03:46
45.136.110.47 attack
Nov  9 14:50:41 mc1 kernel: \[4593730.471126\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.110.47 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=9898 PROTO=TCP SPT=50544 DPT=8095 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 14:52:49 mc1 kernel: \[4593857.941345\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.110.47 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=51260 PROTO=TCP SPT=50544 DPT=6677 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 14:57:30 mc1 kernel: \[4594139.323677\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.110.47 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=5317 PROTO=TCP SPT=50544 DPT=8268 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-09 22:04:29
95.174.102.70 attackspambots
Nov  9 14:46:44 minden010 sshd[2604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.174.102.70
Nov  9 14:46:46 minden010 sshd[2604]: Failed password for invalid user zsexdrcvb from 95.174.102.70 port 33206 ssh2
Nov  9 14:50:55 minden010 sshd[3961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.174.102.70
...
2019-11-09 21:52:20
213.133.99.236 attackbots
GET /administrator/index.php
2019-11-09 22:05:00
140.143.236.53 attackbots
2019-11-09T11:40:25.497563abusebot-5.cloudsearch.cf sshd\[12208\]: Invalid user cen from 140.143.236.53 port 57625
2019-11-09 22:13:14
49.73.157.233 attackbots
SASL broute force
2019-11-09 21:49:26
77.222.110.207 attackspam
19/11/9@01:18:15: FAIL: Alarm-Intrusion address from=77.222.110.207
...
2019-11-09 22:13:50
150.95.186.200 attackbots
Nov  9 11:28:35 XXX sshd[21600]: Invalid user deploy from 150.95.186.200 port 37738
2019-11-09 21:54:50
167.114.25.247 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/167.114.25.247/ 
 
 FR - 1H : (40)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN16276 
 
 IP : 167.114.25.247 
 
 CIDR : 167.114.0.0/17 
 
 PREFIX COUNT : 132 
 
 UNIQUE IP COUNT : 3052544 
 
 
 ATTACKS DETECTED ASN16276 :  
  1H - 1 
  3H - 1 
  6H - 5 
 12H - 9 
 24H - 20 
 
 DateTime : 2019-11-09 07:18:20 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-09 22:08:48
110.49.70.241 attack
Automatic report - Banned IP Access
2019-11-09 22:16:53

最近上报的IP列表

145.239.39.131 145.239.53.171 145.239.54.212 145.239.54.215
145.239.59.140 145.239.4.202 145.239.66.91 145.239.65.83
145.239.67.112 145.239.67.22 145.239.8.9 145.239.7.127
145.239.70.140 145.239.83.74 145.239.9.106 145.239.9.15
145.239.80.150 145.24.136.32 145.24.145.63 145.239.95.188