必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.58.249.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58527
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.58.249.245.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 05:32:26 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 245.249.58.145.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.249.58.145.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
109.224.57.14 attack
proto=tcp  .  spt=58597  .  dpt=25  .     (Listed on    MailSpike (spam wave plus L3-L5) also truncate-gbudb and unsubscore)     (156)
2019-12-04 06:19:41
149.202.135.114 attack
Lines containing failures of 149.202.135.114
Dec  3 11:58:16 *** sshd[39510]: Invalid user operator from 149.202.135.114 port 45134
Dec  3 11:58:16 *** sshd[39510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.135.114
Dec  3 11:58:19 *** sshd[39510]: Failed password for invalid user operator from 149.202.135.114 port 45134 ssh2
Dec  3 11:58:19 *** sshd[39510]: Received disconnect from 149.202.135.114 port 45134:11: Bye Bye [preauth]
Dec  3 11:58:19 *** sshd[39510]: Disconnected from invalid user operator 149.202.135.114 port 45134 [preauth]
Dec  3 12:04:28 *** sshd[40478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.135.114  user=r.r
Dec  3 12:04:29 *** sshd[40478]: Failed password for r.r from 149.202.135.114 port 45646 ssh2
Dec  3 12:04:29 *** sshd[40478]: Received disconnect from 149.202.135.114 port 45646:11: Bye Bye [preauth]
Dec  3 12:04:29 *** sshd[40478]: Discon........
------------------------------
2019-12-04 06:23:32
181.41.216.136 attackbots
Dec  3 22:01:28 relay postfix/smtpd\[9193\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.136\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[181.41.216.131\]\>
Dec  3 22:01:28 relay postfix/smtpd\[9193\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.136\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[181.41.216.131\]\>
Dec  3 22:01:28 relay postfix/smtpd\[9193\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.136\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[181.41.216.131\]\>
Dec  3 22:01:28 relay postfix/smtpd\[9193\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.136\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ pr
...
2019-12-04 06:09:42
40.73.97.99 attack
Dec  3 23:14:50 mail sshd[2737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.97.99 
Dec  3 23:14:52 mail sshd[2737]: Failed password for invalid user hubert123 from 40.73.97.99 port 59074 ssh2
Dec  3 23:22:03 mail sshd[6154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.97.99
2019-12-04 06:25:49
107.170.132.133 attackbotsspam
2019-12-03T22:19:40.529571vps751288.ovh.net sshd\[18009\]: Invalid user ephren from 107.170.132.133 port 52149
2019-12-03T22:19:40.541137vps751288.ovh.net sshd\[18009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.132.133
2019-12-03T22:19:42.500689vps751288.ovh.net sshd\[18009\]: Failed password for invalid user ephren from 107.170.132.133 port 52149 ssh2
2019-12-03T22:29:23.695354vps751288.ovh.net sshd\[18123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.132.133  user=operator
2019-12-03T22:29:25.690192vps751288.ovh.net sshd\[18123\]: Failed password for operator from 107.170.132.133 port 57784 ssh2
2019-12-04 06:27:14
14.116.222.170 attackspambots
Apr  8 05:23:26 vtv3 sshd[30967]: Invalid user teamspeak3 from 14.116.222.170 port 35341
Apr  8 05:23:26 vtv3 sshd[30967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170
Apr  8 05:23:28 vtv3 sshd[30967]: Failed password for invalid user teamspeak3 from 14.116.222.170 port 35341 ssh2
Apr  8 05:27:36 vtv3 sshd[32682]: Invalid user m-takeda from 14.116.222.170 port 43124
Apr  8 05:27:36 vtv3 sshd[32682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170
Apr 11 14:37:45 vtv3 sshd[2616]: Invalid user Saul from 14.116.222.170 port 33879
Apr 11 14:37:45 vtv3 sshd[2616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.222.170
Apr 11 14:37:47 vtv3 sshd[2616]: Failed password for invalid user Saul from 14.116.222.170 port 33879 ssh2
Apr 11 14:42:39 vtv3 sshd[4937]: Invalid user matthew from 14.116.222.170 port 41929
Apr 11 14:42:39 vtv3 sshd[4937]: pam_unix(sshd:aut
2019-12-04 06:07:23
45.55.67.128 attack
IP blocked
2019-12-04 06:34:47
162.243.14.185 attack
Dec  3 17:09:22 linuxvps sshd\[54173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.14.185  user=root
Dec  3 17:09:24 linuxvps sshd\[54173\]: Failed password for root from 162.243.14.185 port 35150 ssh2
Dec  3 17:15:06 linuxvps sshd\[57632\]: Invalid user kuwano from 162.243.14.185
Dec  3 17:15:06 linuxvps sshd\[57632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.14.185
Dec  3 17:15:08 linuxvps sshd\[57632\]: Failed password for invalid user kuwano from 162.243.14.185 port 46616 ssh2
2019-12-04 06:18:59
120.70.100.54 attack
Dec  3 22:01:07 lnxmysql61 sshd[30992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.54
2019-12-04 06:14:49
188.131.213.192 attackbotsspam
Dec  3 22:46:49 vs01 sshd[4810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.213.192 
Dec  3 22:46:50 vs01 sshd[4810]: Failed password for invalid user owner from 188.131.213.192 port 44488 ssh2
Dec  3 22:52:43 vs01 sshd[8599]: Failed password for root from 188.131.213.192 port 49784 ssh2
2019-12-04 06:13:13
193.70.43.220 attack
21 attempts against mh-ssh on cloud.magehost.pro
2019-12-04 06:26:30
192.99.100.51 attackbotsspam
192.99.100.51 - - \[03/Dec/2019:20:45:44 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
192.99.100.51 - - \[03/Dec/2019:20:45:45 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-12-04 06:05:48
36.155.113.218 attackspam
Dec  3 22:33:05 icinga sshd[32192]: Failed password for root from 36.155.113.218 port 45183 ssh2
...
2019-12-04 06:32:51
138.68.218.135 attack
Fail2Ban Ban Triggered
2019-12-04 06:26:47
81.92.149.58 attack
Dec  3 22:55:27 markkoudstaal sshd[18335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.92.149.58
Dec  3 22:55:29 markkoudstaal sshd[18335]: Failed password for invalid user dubost from 81.92.149.58 port 56910 ssh2
Dec  3 23:01:14 markkoudstaal sshd[18892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.92.149.58
2019-12-04 06:11:03

最近上报的IP列表

227.255.154.100 141.52.149.98 80.231.147.164 208.160.30.42
141.234.176.214 116.28.39.248 238.255.218.233 213.99.40.146
146.177.104.206 145.0.67.249 74.174.21.160 125.97.173.228
86.130.54.204 30.54.122.165 83.80.180.90 66.97.228.57
181.48.47.61 34.66.227.40 92.124.211.224 167.148.15.71