必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Austria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.244.8.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.244.8.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 22:56:54 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 45.8.244.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.8.244.145.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.231.190.146 attackspam
Unauthorized connection attempt from IP address 49.231.190.146 on Port 445(SMB)
2019-11-19 05:56:03
86.25.245.179 attackbotsspam
Nov 18 17:43:21 server sshd\[3759\]: Failed password for invalid user jovoni from 86.25.245.179 port 41456 ssh2
Nov 18 23:50:11 server sshd\[32136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpc1-warw17-2-0-cust434.3-2.cable.virginm.net  user=root
Nov 18 23:50:12 server sshd\[32136\]: Failed password for root from 86.25.245.179 port 53264 ssh2
Nov 19 00:05:56 server sshd\[4230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpc1-warw17-2-0-cust434.3-2.cable.virginm.net  user=root
Nov 19 00:05:58 server sshd\[4230\]: Failed password for root from 86.25.245.179 port 36542 ssh2
...
2019-11-19 05:26:09
159.89.134.64 attack
Nov 18 22:12:45 serwer sshd\[4174\]: Invalid user karibian from 159.89.134.64 port 58606
Nov 18 22:12:45 serwer sshd\[4174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.64
Nov 18 22:12:48 serwer sshd\[4174\]: Failed password for invalid user karibian from 159.89.134.64 port 58606 ssh2
...
2019-11-19 05:32:56
185.175.93.101 attackbots
185.175.93.101 was recorded 90 times by 35 hosts attempting to connect to the following ports: 5936,5942,5950,5935,5945,5940,5941,5938,5939,5937,5948,5949,5947,5951,5946,5944. Incident counter (4h, 24h, all-time): 90, 471, 4171
2019-11-19 05:41:10
123.30.236.77 attackbotsspam
3389BruteforceFW22
2019-11-19 05:23:36
54.148.3.123 attackspam
Unauthorized connection attempt from IP address 54.148.3.123 on Port 445(SMB)
2019-11-19 05:54:12
189.148.143.173 attack
Unauthorized connection attempt from IP address 189.148.143.173 on Port 445(SMB)
2019-11-19 05:34:44
125.24.115.28 attackspam
$f2bV_matches
2019-11-19 05:48:16
185.143.223.133 attackbotsspam
185.143.223.133 was recorded 124 times by 32 hosts attempting to connect to the following ports: 2999,96,55755,12125,46364,20208,64898,420,48488,4104,47642,24445,949,37172,25555,580,9585,2145,29024,44447,24248,49079,833,44499,22611,54253,920,240,42324,535,36505,53839,8916,7897,2713,64493,3455,29394,910,675,4050,22938,54765,61612,26394,230,28286,43794,36869,39392,34348,11314,45430,880,205,4654,58888,56162,15960,45459,44243,62442,930,62873,44344,49499,38103,22627,1331,58854,13940,9678,19,220,18747,55960,744,898,39715,25657,54434,42222,38389,46806,17576,33637,43431,58485,616,53532,52728,44442,31317,992,23236,50570,41768,17677,22266,25259,32526,31920,41162,54748,14748,15881,343,62715,54979,33130,27802,7567,15260,4075,55566,56039,6446,48876,25256,54541,33987,55556,48525. Incident counter (4h, 24h, all-time): 124, 663, 1964
2019-11-19 05:21:10
123.21.66.145 attackspambots
$f2bV_matches
2019-11-19 05:25:45
103.139.45.67 attack
Unauthorized connection attempt from IP address 103.139.45.67 on Port 25(SMTP)
2019-11-19 05:31:51
114.38.14.13 attackspambots
" "
2019-11-19 05:41:26
165.227.84.119 attackspam
Nov 18 18:57:51 heissa sshd\[16981\]: Invalid user dewald from 165.227.84.119 port 35414
Nov 18 18:57:51 heissa sshd\[16981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.84.119
Nov 18 18:57:53 heissa sshd\[16981\]: Failed password for invalid user dewald from 165.227.84.119 port 35414 ssh2
Nov 18 19:05:08 heissa sshd\[18091\]: Invalid user test from 165.227.84.119 port 36116
Nov 18 19:05:08 heissa sshd\[18091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.84.119
2019-11-19 05:35:06
36.81.6.101 attackspambots
Unauthorized connection attempt from IP address 36.81.6.101 on Port 445(SMB)
2019-11-19 05:46:49
163.53.75.237 attackbotsspam
Unauthorized connection attempt from IP address 163.53.75.237 on Port 445(SMB)
2019-11-19 05:56:56

最近上报的IP列表

14.19.252.187 152.240.115.172 107.88.211.165 29.232.144.244
156.214.91.222 123.236.222.237 162.67.247.3 160.203.212.70
156.244.220.181 117.115.186.197 12.100.180.10 27.45.141.161
243.126.25.18 210.34.154.255 188.213.161.126 53.84.22.74
65.243.189.60 249.139.26.6 12.177.95.58 74.62.69.22