必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Rotterdam

省份(region): South Holland

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): SURFnet bv

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.51.100.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5537
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.51.100.20.			IN	A

;; AUTHORITY SECTION:
.			2972	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050201 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 03 02:08:04 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 20.100.51.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 20.100.51.145.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
78.139.216.116 attackbots
Dec 17 04:46:15 thevastnessof sshd[25353]: Failed password for invalid user kasi from 78.139.216.116 port 34376 ssh2
...
2019-12-17 13:06:38
174.138.26.48 attackbots
Dec 17 05:50:21 vpn01 sshd[31849]: Failed password for uucp from 174.138.26.48 port 37306 ssh2
...
2019-12-17 13:00:47
77.78.201.59 attackspambots
3389BruteforceFW21
2019-12-17 09:07:50
106.12.22.73 attackspambots
Dec 17 00:30:46 srv01 sshd[31448]: Invalid user benussi from 106.12.22.73 port 46110
Dec 17 00:30:46 srv01 sshd[31448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.22.73
Dec 17 00:30:46 srv01 sshd[31448]: Invalid user benussi from 106.12.22.73 port 46110
Dec 17 00:30:47 srv01 sshd[31448]: Failed password for invalid user benussi from 106.12.22.73 port 46110 ssh2
Dec 17 00:36:56 srv01 sshd[31928]: Invalid user posta from 106.12.22.73 port 47798
...
2019-12-17 09:12:14
173.252.95.20 attackbots
[Tue Dec 17 04:56:41.127067 2019] [:error] [pid 1500:tid 139777859467008] [client 173.252.95.20:61858] [client 173.252.95.20] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/prakiraan-bulanan/prakiraan-potensi-banjir-bulanan/prakiraan-daerah-potensi-banjir-di-provinsi-jawa-timur/4009-prakiraan-bulanan-daerah-potensi-banjir-provinsi-jawa-timur-tahun-2020/555557717-prakiraan-bulanan-daerah-potensi-banjir-di-provinsi-jawa-timur-untuk
...
2019-12-17 09:02:05
106.243.162.3 attackspambots
Dec 16 23:50:35 linuxvps sshd\[50295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3  user=root
Dec 16 23:50:37 linuxvps sshd\[50295\]: Failed password for root from 106.243.162.3 port 56284 ssh2
Dec 16 23:56:49 linuxvps sshd\[54385\]: Invalid user hung from 106.243.162.3
Dec 16 23:56:49 linuxvps sshd\[54385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3
Dec 16 23:56:52 linuxvps sshd\[54385\]: Failed password for invalid user hung from 106.243.162.3 port 60040 ssh2
2019-12-17 13:04:57
125.227.236.60 attack
Dec 17 01:31:29 localhost sshd\[6155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.236.60  user=root
Dec 17 01:31:31 localhost sshd\[6155\]: Failed password for root from 125.227.236.60 port 50656 ssh2
Dec 17 01:37:22 localhost sshd\[10966\]: Invalid user madarus from 125.227.236.60 port 57820
2019-12-17 08:49:36
58.246.6.238 attackspambots
Dec 17 01:17:53 eventyay sshd[26815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.6.238
Dec 17 01:17:55 eventyay sshd[26815]: Failed password for invalid user webadmin from 58.246.6.238 port 25127 ssh2
Dec 17 01:21:51 eventyay sshd[26947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.6.238
...
2019-12-17 08:50:47
222.186.173.238 attackbots
Dec 17 05:02:57 thevastnessof sshd[26538]: Failed password for root from 222.186.173.238 port 39008 ssh2
...
2019-12-17 13:07:20
221.143.48.143 attackbotsspam
Invalid user raul from 221.143.48.143 port 39672
2019-12-17 09:12:45
134.175.128.69 attackbotsspam
SSH Bruteforce attempt
2019-12-17 08:57:26
68.183.178.162 attack
Dec 16 13:36:45 auw2 sshd\[1953\]: Invalid user Qwer@2016 from 68.183.178.162
Dec 16 13:36:45 auw2 sshd\[1953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162
Dec 16 13:36:47 auw2 sshd\[1953\]: Failed password for invalid user Qwer@2016 from 68.183.178.162 port 39130 ssh2
Dec 16 13:42:52 auw2 sshd\[2714\]: Invalid user hubing from 68.183.178.162
Dec 16 13:42:52 auw2 sshd\[2714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162
2019-12-17 09:03:29
51.77.231.213 attack
Dec 16 12:20:24 eddieflores sshd\[26399\]: Invalid user anna from 51.77.231.213
Dec 16 12:20:24 eddieflores sshd\[26399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.ip-51-77-231.eu
Dec 16 12:20:27 eddieflores sshd\[26399\]: Failed password for invalid user anna from 51.77.231.213 port 44670 ssh2
Dec 16 12:26:03 eddieflores sshd\[26893\]: Invalid user user from 51.77.231.213
Dec 16 12:26:03 eddieflores sshd\[26893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.ip-51-77-231.eu
2019-12-17 09:01:41
62.60.135.19 attackspambots
Dec 17 01:06:17 cp sshd[16638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.60.135.19
2019-12-17 09:09:30
197.248.161.162 attackspambots
Unauthorized connection attempt detected from IP address 197.248.161.162 to port 445
2019-12-17 09:13:56

最近上报的IP列表

115.182.102.156 116.24.215.101 104.131.9.59 71.58.81.67
183.17.239.118 179.127.100.109 116.31.82.218 82.174.96.11
190.57.231.227 26.115.163.108 46.186.106.22 132.232.135.73
6.193.50.51 30.94.248.14 177.234.174.115 74.133.39.98
62.184.254.139 36.90.52.17 134.119.95.208 186.212.61.90