必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.45.117.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19964
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.45.117.125.			IN	A

;; AUTHORITY SECTION:
.			349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100801 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 09 12:59:12 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
125.117.45.146.in-addr.arpa domain name pointer non-routed-un-exposed-IP.45.146.in-addr.arpa.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.117.45.146.in-addr.arpa	name = non-routed-un-exposed-IP.45.146.in-addr.arpa.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
143.208.180.212 attackbots
*Port Scan* detected from 143.208.180.212 (GT/Guatemala/iflex.tigobusiness.com.gt). 4 hits in the last 130 seconds
2019-10-16 07:15:23
222.186.180.17 attackbotsspam
Oct 16 00:58:24 MK-Soft-Root1 sshd[15271]: Failed password for root from 222.186.180.17 port 6352 ssh2
Oct 16 00:58:29 MK-Soft-Root1 sshd[15271]: Failed password for root from 222.186.180.17 port 6352 ssh2
...
2019-10-16 06:58:45
183.82.100.141 attackbotsspam
2019-10-15T23:08:01.644285shield sshd\[24772\]: Invalid user limin from 183.82.100.141 port 18346
2019-10-15T23:08:01.649654shield sshd\[24772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.100.141
2019-10-15T23:08:03.871360shield sshd\[24772\]: Failed password for invalid user limin from 183.82.100.141 port 18346 ssh2
2019-10-15T23:14:56.139231shield sshd\[25585\]: Invalid user administrator from 183.82.100.141 port 5410
2019-10-15T23:14:56.144830shield sshd\[25585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.100.141
2019-10-16 07:18:00
118.107.233.29 attackspambots
Oct 16 01:02:28 bouncer sshd\[17573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.107.233.29  user=root
Oct 16 01:02:30 bouncer sshd\[17573\]: Failed password for root from 118.107.233.29 port 38454 ssh2
Oct 16 01:06:41 bouncer sshd\[17592\]: Invalid user navis from 118.107.233.29 port 48036
...
2019-10-16 07:27:48
192.99.175.113 attackbots
2019-10-15 14:54:21 dovecot_login authenticator failed for (GJbCqgN) [192.99.175.113]:59078 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=habu@lerctr.org)
2019-10-15 14:54:37 dovecot_login authenticator failed for (kbypEi) [192.99.175.113]:59988 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=habu@lerctr.org)
2019-10-15 14:54:57 dovecot_login authenticator failed for (2BG0LRm) [192.99.175.113]:61413 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=habu@lerctr.org)
...
2019-10-16 07:19:37
191.34.162.186 attack
2019-10-15T15:50:10.879723ns525875 sshd\[1682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.162.186  user=root
2019-10-15T15:50:12.419750ns525875 sshd\[1682\]: Failed password for root from 191.34.162.186 port 58882 ssh2
2019-10-15T15:54:39.574563ns525875 sshd\[7311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.34.162.186  user=root
2019-10-15T15:54:41.376218ns525875 sshd\[7311\]: Failed password for root from 191.34.162.186 port 56301 ssh2
...
2019-10-16 07:26:00
115.159.65.195 attack
$f2bV_matches
2019-10-16 07:05:28
178.62.244.194 attackspambots
Oct 15 12:34:03 sachi sshd\[3779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.244.194  user=root
Oct 15 12:34:05 sachi sshd\[3779\]: Failed password for root from 178.62.244.194 port 51711 ssh2
Oct 15 12:38:44 sachi sshd\[4134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.244.194  user=root
Oct 15 12:38:46 sachi sshd\[4134\]: Failed password for root from 178.62.244.194 port 43209 ssh2
Oct 15 12:43:24 sachi sshd\[4577\]: Invalid user aagesen from 178.62.244.194
Oct 15 12:43:24 sachi sshd\[4577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.244.194
2019-10-16 07:06:13
116.203.25.217 attackbots
LGS,WP GET /wp-login.php
2019-10-16 07:26:32
103.24.97.250 attackspambots
Oct 16 00:12:53 localhost sshd\[25453\]: Invalid user asd from 103.24.97.250 port 50972
Oct 16 00:12:53 localhost sshd\[25453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.24.97.250
Oct 16 00:12:55 localhost sshd\[25453\]: Failed password for invalid user asd from 103.24.97.250 port 50972 ssh2
2019-10-16 07:28:41
222.186.180.223 attack
Oct 16 01:17:21 MK-Soft-Root2 sshd[17522]: Failed password for root from 222.186.180.223 port 55728 ssh2
Oct 16 01:17:27 MK-Soft-Root2 sshd[17522]: Failed password for root from 222.186.180.223 port 55728 ssh2
...
2019-10-16 07:21:17
101.36.150.231 attackspam
Lines containing failures of 101.36.150.231
Oct 15 18:56:21 nextcloud sshd[6956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.150.231  user=r.r
Oct 15 18:56:23 nextcloud sshd[6956]: Failed password for r.r from 101.36.150.231 port 45980 ssh2
Oct 15 18:56:24 nextcloud sshd[6956]: Received disconnect from 101.36.150.231 port 45980:11: Bye Bye [preauth]
Oct 15 18:56:24 nextcloud sshd[6956]: Disconnected from authenticating user r.r 101.36.150.231 port 45980 [preauth]
Oct 15 19:14:34 nextcloud sshd[9838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.150.231  user=games
Oct 15 19:14:36 nextcloud sshd[9838]: Failed password for games from 101.36.150.231 port 32958 ssh2
Oct 15 19:14:36 nextcloud sshd[9838]: Received disconnect from 101.36.150.231 port 32958:11: Bye Bye [preauth]
Oct 15 19:14:36 nextcloud sshd[9838]: Disconnected from authenticating user games 101.36.150.231 port........
------------------------------
2019-10-16 07:08:07
92.40.248.93 attackspam
$f2bV_matches
2019-10-16 07:29:18
45.70.217.198 attack
fraudulent SSH attempt
2019-10-16 06:53:10
103.248.120.2 attack
Oct 16 00:43:37 vmd17057 sshd\[12162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.248.120.2  user=root
Oct 16 00:43:39 vmd17057 sshd\[12162\]: Failed password for root from 103.248.120.2 port 36310 ssh2
Oct 16 00:52:02 vmd17057 sshd\[12699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.248.120.2  user=root
...
2019-10-16 07:15:44

最近上报的IP列表

112.166.202.202 232.89.201.39 30.230.78.109 94.19.129.239
53.82.197.139 137.39.3.75 242.174.156.32 216.230.75.245
156.195.133.176 6.172.231.9 26.134.101.43 19.109.100.121
84.43.4.20 98.99.201.63 127.11.47.93 193.61.26.21
150.117.0.219 60.22.214.226 20.81.46.95 85.2.234.224