必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hoogland

省份(region): Utrecht

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.44.50.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.44.50.220.			IN	A

;; AUTHORITY SECTION:
.			170	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031002 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 11 08:05:50 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 220.50.44.145.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 145.44.50.220.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.54.160.135 attack
Jun  4 07:31:19 debian kernel: [147642.919130] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=195.54.160.135 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=35299 PROTO=TCP SPT=43385 DPT=2375 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-04 12:56:46
62.234.153.213 attackbots
2020-06-04T07:20:14.145307centos sshd[20462]: Failed password for root from 62.234.153.213 port 37084 ssh2
2020-06-04T07:23:53.920628centos sshd[20721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.153.213  user=root
2020-06-04T07:23:56.067218centos sshd[20721]: Failed password for root from 62.234.153.213 port 47758 ssh2
...
2020-06-04 13:24:04
190.205.103.12 attack
Jun  4 06:57:42 abendstille sshd\[21120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.205.103.12  user=root
Jun  4 06:57:44 abendstille sshd\[21120\]: Failed password for root from 190.205.103.12 port 5491 ssh2
Jun  4 07:01:02 abendstille sshd\[24417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.205.103.12  user=root
Jun  4 07:01:04 abendstille sshd\[24417\]: Failed password for root from 190.205.103.12 port 8699 ssh2
Jun  4 07:04:23 abendstille sshd\[27875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.205.103.12  user=root
...
2020-06-04 13:18:15
111.231.141.141 attackspam
Jun  4 05:48:39 legacy sshd[8680]: Failed password for root from 111.231.141.141 port 45088 ssh2
Jun  4 05:53:21 legacy sshd[8808]: Failed password for root from 111.231.141.141 port 41938 ssh2
...
2020-06-04 12:47:07
111.231.113.236 attack
Jun  4 06:59:03 [host] sshd[1362]: pam_unix(sshd:a
Jun  4 06:59:05 [host] sshd[1362]: Failed password
Jun  4 07:02:09 [host] sshd[1456]: pam_unix(sshd:a
2020-06-04 13:16:45
124.158.169.178 attackbotsspam
Port Scanner
2020-06-04 12:52:59
218.149.128.186 attackspam
Jun  4 06:56:33 legacy sshd[11233]: Failed password for root from 218.149.128.186 port 56882 ssh2
Jun  4 06:59:22 legacy sshd[11301]: Failed password for root from 218.149.128.186 port 49177 ssh2
...
2020-06-04 13:05:37
123.136.107.18 attack
2020-06-04 12:55:13
162.243.140.93 attack
Jun  3 20:57:08 propaganda sshd[37476]: Connection from 162.243.140.93 port 48792 on 10.0.0.160 port 22 rdomain ""
Jun  3 20:57:18 propaganda sshd[37476]: error: kex_exchange_identification: Connection closed by remote host
2020-06-04 13:19:17
123.162.182.243 attackspam
" "
2020-06-04 13:22:11
124.239.168.74 attack
Jun  4 07:43:19 hosting sshd[31547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.168.74  user=root
Jun  4 07:43:20 hosting sshd[31547]: Failed password for root from 124.239.168.74 port 46970 ssh2
...
2020-06-04 13:06:30
160.16.61.235 attackspam
Jun  4 05:59:34 ncomp sshd[891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.61.235  user=root
Jun  4 05:59:36 ncomp sshd[891]: Failed password for root from 160.16.61.235 port 34288 ssh2
Jun  4 06:10:37 ncomp sshd[1179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.61.235  user=root
Jun  4 06:10:40 ncomp sshd[1179]: Failed password for root from 160.16.61.235 port 51614 ssh2
2020-06-04 12:51:16
103.96.150.135 attackbots
20 attempts against mh_ha-misbehave-ban on dawn
2020-06-04 13:01:57
35.224.204.56 attack
Jun  4 07:07:49 vps647732 sshd[29235]: Failed password for root from 35.224.204.56 port 49764 ssh2
...
2020-06-04 13:20:04
103.76.211.87 attackspam
Automatic report - XMLRPC Attack
2020-06-04 12:50:19

最近上报的IP列表

115.157.122.114 98.122.159.132 192.81.73.56 90.99.174.85
20.165.212.69 64.27.86.191 49.6.151.243 177.236.33.174
149.56.110.110 165.169.199.168 222.75.233.33 184.224.33.77
246.192.23.151 188.142.52.188 80.16.98.8 65.47.207.29
44.134.234.13 155.160.253.20 84.12.58.40 42.115.25.69