必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.252.9.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.252.9.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 18:15:14 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 58.9.252.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.9.252.145.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.35.64.222 attack
Sep 13 20:21:04 cp sshd[14898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.35.64.222
Sep 13 20:21:04 cp sshd[14898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.35.64.222
2019-09-14 02:38:34
150.95.135.190 attackbotsspam
Sep 13 20:35:02 www sshd\[42376\]: Invalid user 123123 from 150.95.135.190Sep 13 20:35:04 www sshd\[42376\]: Failed password for invalid user 123123 from 150.95.135.190 port 47754 ssh2Sep 13 20:39:29 www sshd\[42513\]: Invalid user pass from 150.95.135.190
...
2019-09-14 01:58:23
112.172.147.34 attackspam
Sep 13 14:51:08 hcbbdb sshd\[16788\]: Invalid user p@ssw0rd from 112.172.147.34
Sep 13 14:51:08 hcbbdb sshd\[16788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.172.147.34
Sep 13 14:51:10 hcbbdb sshd\[16788\]: Failed password for invalid user p@ssw0rd from 112.172.147.34 port 61608 ssh2
Sep 13 14:56:25 hcbbdb sshd\[17333\]: Invalid user test from 112.172.147.34
Sep 13 14:56:25 hcbbdb sshd\[17333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.172.147.34
2019-09-14 02:17:49
173.254.194.70 attackbotsspam
Brute force attempt
2019-09-14 02:32:37
45.136.109.31 attack
Multiport scan : 88 ports scanned 6 7 14 33 37 49 57 66 68 76 80 87 88 104 111 118 123 124 147 154 166 178 184 185 238 250 269 281 285 314 317 334 387 403 420 429 438 439 452 455 470 478 481 482 485 489 497 502 528 533 540 545 555 564 604 616 621 639 651 679 682 683 689 701 721 725 731 746 757 769 788 796 807 826 827 845 859 876 887 890 895 917 921 935 947 957 966 996
2019-09-14 02:33:34
88.206.137.9 attackspam
SMTP brute-force
2019-09-14 02:03:49
95.46.181.21 attackbotsspam
Sep 13 12:55:57 mxgate1 postfix/postscreen[16125]: CONNECT from [95.46.181.21]:58046 to [176.31.12.44]:25
Sep 13 12:55:57 mxgate1 postfix/dnsblog[16129]: addr 95.46.181.21 listed by domain cbl.abuseat.org as 127.0.0.2
Sep 13 12:55:57 mxgate1 postfix/dnsblog[16128]: addr 95.46.181.21 listed by domain bl.spamcop.net as 127.0.0.2
Sep 13 12:55:58 mxgate1 postfix/postscreen[16125]: PREGREET 20 after 0.69 from [95.46.181.21]:58046: HELO agdysmsgu.com

Sep 13 12:55:58 mxgate1 postfix/dnsblog[16130]: addr 95.46.181.21 listed by domain zen.spamhaus.org as 127.0.0.4
Sep 13 12:55:58 mxgate1 postfix/dnsblog[16130]: addr 95.46.181.21 listed by domain zen.spamhaus.org as 127.0.0.3
Sep 13 12:55:58 mxgate1 postfix/postscreen[16125]: DNSBL rank 4 for [95.46.181.21]:58046
Sep x@x
Sep 13 12:56:00 mxgate1 postfix/postscreen[16125]: HANGUP after 2.1 from [95.46.181.21]:58046 in tests after SMTP handshake
Sep 13 12:56:00 mxgate1 postfix/postscreen[16125]: DISCONNECT [95.46.181.21]:58046


........
---------------------------------
2019-09-14 01:49:16
37.187.248.39 attackspam
Sep 13 18:32:09 dedicated sshd[640]: Invalid user user from 37.187.248.39 port 55126
2019-09-14 02:24:40
58.47.177.158 attackbotsspam
Sep 13 16:26:58 nextcloud sshd\[4786\]: Invalid user user8 from 58.47.177.158
Sep 13 16:26:58 nextcloud sshd\[4786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.47.177.158
Sep 13 16:27:00 nextcloud sshd\[4786\]: Failed password for invalid user user8 from 58.47.177.158 port 41956 ssh2
...
2019-09-14 02:22:46
185.196.54.68 attackspambots
RecipientDoesNotExist    Timestamp : 13-Sep-19 11:38          Listed on   rbldns-ru     (403)
2019-09-14 01:56:57
188.233.76.1 attackbots
firewall-block, port(s): 23/tcp
2019-09-14 02:40:16
39.115.65.152 attackbotsspam
Automatic report - Port Scan Attack
2019-09-14 01:49:59
112.86.98.172 attackbotsspam
Sep 13 19:04:50 mars sshd\[6498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.86.98.172  user=root
Sep 13 19:04:50 mars sshd\[6499\]: Invalid user admin from 112.86.98.172
Sep 13 19:04:50 mars sshd\[6499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.86.98.172
...
2019-09-14 02:01:01
167.71.56.82 attack
SSH Brute-Force reported by Fail2Ban
2019-09-14 02:35:21
164.132.44.25 attackbotsspam
Sep 13 01:09:55 php1 sshd\[20983\]: Invalid user webcam from 164.132.44.25
Sep 13 01:09:55 php1 sshd\[20983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu
Sep 13 01:09:56 php1 sshd\[20983\]: Failed password for invalid user webcam from 164.132.44.25 port 43798 ssh2
Sep 13 01:13:54 php1 sshd\[21459\]: Invalid user test from 164.132.44.25
Sep 13 01:13:54 php1 sshd\[21459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-164-132-44.eu
2019-09-14 01:57:25

最近上报的IP列表

138.126.215.98 46.254.3.78 90.17.96.14 25.58.151.151
52.214.72.245 66.45.157.158 36.96.59.81 219.192.206.23
175.12.101.142 174.100.234.136 4.191.68.244 229.219.239.144
225.193.30.37 95.114.146.246 249.240.168.108 152.53.54.89
215.213.9.51 87.243.75.48 252.72.230.156 204.22.169.16