必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.53.120.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10591
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.53.120.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 01:37:12 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
98.120.53.145.in-addr.arpa domain name pointer 145-53-120-98.fixed.kpn.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
98.120.53.145.in-addr.arpa	name = 145-53-120-98.fixed.kpn.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.73.134.138 attack
Mar  4 05:49:43 OPSO sshd\[9178\]: Invalid user ftpuser from 220.73.134.138 port 40874
Mar  4 05:49:43 OPSO sshd\[9178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.73.134.138
Mar  4 05:49:45 OPSO sshd\[9178\]: Failed password for invalid user ftpuser from 220.73.134.138 port 40874 ssh2
Mar  4 05:54:20 OPSO sshd\[9764\]: Invalid user opso from 220.73.134.138 port 38668
Mar  4 05:54:20 OPSO sshd\[9764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.73.134.138
2020-03-04 13:00:35
198.20.87.98 attack
Portscan or hack attempt detected by psad/fwsnort
2020-03-04 10:15:00
187.155.233.118 attackspambots
Mar  4 01:13:32 localhost sshd[5118]: Invalid user deploy from 187.155.233.118 port 56810
Mar  4 01:13:32 localhost sshd[5118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.155.233.118
Mar  4 01:13:32 localhost sshd[5118]: Invalid user deploy from 187.155.233.118 port 56810
Mar  4 01:13:34 localhost sshd[5118]: Failed password for invalid user deploy from 187.155.233.118 port 56810 ssh2
Mar  4 01:22:49 localhost sshd[6105]: Invalid user hdfs from 187.155.233.118 port 40158
...
2020-03-04 10:17:38
185.137.233.125 attackbotsspam
Mar  4 02:24:20 debian-2gb-nbg1-2 kernel: \[5544237.354509\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.137.233.125 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=8523 PROTO=TCP SPT=41717 DPT=1313 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-04 10:30:47
222.186.173.215 attackspam
Mar  4 05:00:04 combo sshd[30362]: Failed password for root from 222.186.173.215 port 7402 ssh2
Mar  4 05:00:07 combo sshd[30362]: Failed password for root from 222.186.173.215 port 7402 ssh2
Mar  4 05:00:10 combo sshd[30362]: Failed password for root from 222.186.173.215 port 7402 ssh2
...
2020-03-04 13:15:31
189.124.231.32 attackspambots
Automatic report - Port Scan Attack
2020-03-04 10:37:35
194.105.205.42 attackbotsspam
Mar  3 23:21:43 XXX sshd[37295]: Invalid user ethos from 194.105.205.42 port 38786
2020-03-04 10:42:36
189.213.37.170 attackspam
Automatic report - Port Scan Attack
2020-03-04 10:36:28
66.249.64.130 attackbotsspam
404 NOT FOUND
2020-03-04 13:11:42
218.92.0.173 attack
Mar  4 06:00:15 srv206 sshd[25155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Mar  4 06:00:17 srv206 sshd[25155]: Failed password for root from 218.92.0.173 port 43053 ssh2
...
2020-03-04 13:08:43
129.211.62.131 attack
2020-03-04T03:58:34.915860  sshd[25634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.62.131
2020-03-04T03:58:34.902429  sshd[25634]: Invalid user plexuser from 129.211.62.131 port 32808
2020-03-04T03:58:37.630592  sshd[25634]: Failed password for invalid user plexuser from 129.211.62.131 port 32808 ssh2
2020-03-04T06:00:12.883854  sshd[27924]: Invalid user ec2-user from 129.211.62.131 port 33531
...
2020-03-04 13:14:44
201.229.157.27 attackspam
invalid login attempt
2020-03-04 13:03:56
1.63.226.147 attackbotsspam
"SSH brute force auth login attempt."
2020-03-04 10:47:42
122.228.19.79 attackspam
122.228.19.79 was recorded 18 times by 5 hosts attempting to connect to the following ports: 1234,2000,389,1194,1311,1521,179,623,53,1022,5050,264,4070,28015,28784,311,2181. Incident counter (4h, 24h, all-time): 18, 112, 15257
2020-03-04 10:18:44
185.53.88.113 attack
SIPVicious Scanner Detection
2020-03-04 13:13:37

最近上报的IP列表

230.111.123.56 142.178.24.154 61.199.146.56 93.98.28.77
132.241.135.220 136.159.244.85 27.17.42.122 71.192.163.108
208.46.99.196 2.118.137.164 184.248.37.214 255.181.205.101
94.179.17.212 9.151.35.105 221.141.53.67 93.76.234.46
16.123.77.122 87.64.122.6 34.134.35.246 226.111.192.229