必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.116.91.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.116.91.245.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 11:06:51 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 245.91.116.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.91.116.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
24.188.2.25 attack
Honeypot attack, port: 4567, PTR: ool-18bc0219.dyn.optonline.net.
2020-02-27 15:11:54
175.45.1.34 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-27 15:17:55
120.71.145.166 attackspam
Feb 27 12:34:50 gw1 sshd[6847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.166
Feb 27 12:34:52 gw1 sshd[6847]: Failed password for invalid user debian from 120.71.145.166 port 51433 ssh2
...
2020-02-27 15:35:25
96.73.111.201 attackbotsspam
Honeypot attack, port: 81, PTR: 96-73-111-201-static.hfc.comcastbusiness.net.
2020-02-27 15:37:30
193.248.60.205 attackspambots
Invalid user tiancheng from 193.248.60.205 port 41552
2020-02-27 15:34:38
92.86.127.175 attack
Invalid user map from 92.86.127.175 port 55548
2020-02-27 15:14:14
82.221.105.6 attackspambots
Automatic report - Banned IP Access
2020-02-27 15:32:46
49.88.112.62 attack
Feb 27 08:37:43 MK-Soft-VM7 sshd[30032]: Failed password for root from 49.88.112.62 port 9070 ssh2
Feb 27 08:37:48 MK-Soft-VM7 sshd[30032]: Failed password for root from 49.88.112.62 port 9070 ssh2
...
2020-02-27 15:39:00
218.92.0.210 attackspambots
Feb 27 08:28:41 vps691689 sshd[6443]: Failed password for root from 218.92.0.210 port 52988 ssh2
Feb 27 08:29:25 vps691689 sshd[6522]: Failed password for root from 218.92.0.210 port 19106 ssh2
...
2020-02-27 15:41:24
61.69.17.174 attackspambots
Feb 26 04:10:22 cumulus sshd[11465]: Invalid user bruno from 61.69.17.174 port 46322
Feb 26 04:10:22 cumulus sshd[11465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.17.174
Feb 26 04:10:24 cumulus sshd[11465]: Failed password for invalid user bruno from 61.69.17.174 port 46322 ssh2
Feb 26 04:10:25 cumulus sshd[11465]: Received disconnect from 61.69.17.174 port 46322:11: Bye Bye [preauth]
Feb 26 04:10:25 cumulus sshd[11465]: Disconnected from 61.69.17.174 port 46322 [preauth]
Feb 26 04:17:34 cumulus sshd[11696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.69.17.174  user=nobody
Feb 26 04:17:37 cumulus sshd[11696]: Failed password for nobody from 61.69.17.174 port 55576 ssh2
Feb 26 04:17:37 cumulus sshd[11696]: Received disconnect from 61.69.17.174 port 55576:11: Bye Bye [preauth]
Feb 26 04:17:37 cumulus sshd[11696]: Disconnected from 61.69.17.174 port 55576 [preauth]


........
-------------------------------------
2020-02-27 15:37:10
115.78.2.247 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-27 15:13:45
123.20.124.163 attackbotsspam
unauthorized connection attempt
2020-02-27 15:26:32
5.3.6.82 attack
Feb 27 08:19:45 sd-53420 sshd\[24440\]: Invalid user Michelle from 5.3.6.82
Feb 27 08:19:45 sd-53420 sshd\[24440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82
Feb 27 08:19:47 sd-53420 sshd\[24440\]: Failed password for invalid user Michelle from 5.3.6.82 port 34410 ssh2
Feb 27 08:28:06 sd-53420 sshd\[25146\]: User root from 5.3.6.82 not allowed because none of user's groups are listed in AllowGroups
Feb 27 08:28:06 sd-53420 sshd\[25146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82  user=root
...
2020-02-27 15:43:23
148.235.82.68 attackbotsspam
Feb 27 07:50:26 MK-Soft-VM3 sshd[30134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.82.68 
Feb 27 07:50:28 MK-Soft-VM3 sshd[30134]: Failed password for invalid user airbot from 148.235.82.68 port 40788 ssh2
...
2020-02-27 15:46:32
87.210.120.21 attackspam
unauthorized connection attempt
2020-02-27 15:33:41

最近上报的IP列表

221.17.251.241 54.189.29.85 232.176.74.39 242.3.203.180
170.147.121.68 207.122.113.10 192.180.6.239 49.23.66.167
241.163.184.201 3.206.131.66 228.153.106.80 81.13.164.50
207.218.92.227 85.11.85.139 92.3.138.179 28.9.148.199
245.97.38.246 119.203.123.79 20.37.18.201 4.37.252.136