必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Mexico

运营商(isp): Naviomar

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Commercial

用户上报:
类型 评论内容 时间
attackspambots
Invalid user andy from 148.245.13.21 port 46054
2020-10-04 07:10:02
attack
Invalid user andy from 148.245.13.21 port 46054
2020-10-03 23:24:10
attackspambots
$f2bV_matches
2020-10-03 15:08:03
attackspambots
$f2bV_matches
2020-08-23 01:51:37
attackspam
Repeated brute force against a port
2020-07-20 04:26:13
attackbotsspam
2020-06-29T02:28:39.566329devel sshd[8908]: Failed password for invalid user wch from 148.245.13.21 port 47118 ssh2
2020-06-29T02:38:40.690878devel sshd[9626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21  user=root
2020-06-29T02:38:42.537193devel sshd[9626]: Failed password for root from 148.245.13.21 port 33048 ssh2
2020-06-29 16:07:05
attackbotsspam
2020-06-01T12:32:22.574738shield sshd\[957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21  user=root
2020-06-01T12:32:24.803853shield sshd\[957\]: Failed password for root from 148.245.13.21 port 34056 ssh2
2020-06-01T12:34:57.259983shield sshd\[1386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21  user=root
2020-06-01T12:34:59.434639shield sshd\[1386\]: Failed password for root from 148.245.13.21 port 53244 ssh2
2020-06-01T12:37:35.410227shield sshd\[1829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21  user=root
2020-06-02 00:10:33
attack
May  9 18:33:34 wbs sshd\[23443\]: Invalid user admin from 148.245.13.21
May  9 18:33:35 wbs sshd\[23443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
May  9 18:33:36 wbs sshd\[23443\]: Failed password for invalid user admin from 148.245.13.21 port 56214 ssh2
May  9 18:37:20 wbs sshd\[23815\]: Invalid user ellen from 148.245.13.21
May  9 18:37:20 wbs sshd\[23815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
2020-05-10 16:27:58
attack
2020-03-01T19:41:16.178942  sshd[1739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
2020-03-01T19:41:16.163940  sshd[1739]: Invalid user cpanelrrdtool from 148.245.13.21 port 48440
2020-03-01T19:41:17.890096  sshd[1739]: Failed password for invalid user cpanelrrdtool from 148.245.13.21 port 48440 ssh2
2020-03-01T22:47:01.347257  sshd[5755]: Invalid user mcserv from 148.245.13.21 port 45062
...
2020-03-02 06:04:25
attackbotsspam
Feb 28 06:27:01 Tower sshd[4793]: Connection from 148.245.13.21 port 59916 on 192.168.10.220 port 22 rdomain ""
Feb 28 06:27:02 Tower sshd[4793]: Invalid user svnuser from 148.245.13.21 port 59916
Feb 28 06:27:02 Tower sshd[4793]: error: Could not get shadow information for NOUSER
Feb 28 06:27:02 Tower sshd[4793]: Failed password for invalid user svnuser from 148.245.13.21 port 59916 ssh2
Feb 28 06:27:02 Tower sshd[4793]: Received disconnect from 148.245.13.21 port 59916:11: Bye Bye [preauth]
Feb 28 06:27:02 Tower sshd[4793]: Disconnected from invalid user svnuser 148.245.13.21 port 59916 [preauth]
2020-02-28 20:24:20
attackbotsspam
Automatic report BANNED IP
2020-02-25 10:17:14
attackspambots
2020-02-07T11:19:53.424796-07:00 suse-nuc sshd[20866]: Invalid user hqs from 148.245.13.21 port 46540
...
2020-02-08 05:31:40
attack
Unauthorized connection attempt detected from IP address 148.245.13.21 to port 2220 [J]
2020-02-02 00:05:46
attackbots
Unauthorized connection attempt detected from IP address 148.245.13.21 to port 2220 [J]
2020-01-25 19:02:41
attackspam
Unauthorized connection attempt detected from IP address 148.245.13.21 to port 2220 [J]
2020-01-08 18:10:11
attackspambots
$f2bV_matches
2020-01-06 17:57:29
attackspam
Dec 27 18:09:24 vps46666688 sshd[10218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
Dec 27 18:09:26 vps46666688 sshd[10218]: Failed password for invalid user pvaca from 148.245.13.21 port 42100 ssh2
...
2019-12-28 05:13:30
attack
Dec  9 21:03:54 vps647732 sshd[8835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
Dec  9 21:03:56 vps647732 sshd[8835]: Failed password for invalid user klckll from 148.245.13.21 port 54456 ssh2
...
2019-12-10 07:17:46
attackbots
Dec  1 17:58:28 MK-Soft-VM4 sshd[7308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21 
Dec  1 17:58:30 MK-Soft-VM4 sshd[7308]: Failed password for invalid user tsujimoto from 148.245.13.21 port 35150 ssh2
...
2019-12-02 03:02:02
attack
Nov 17 06:17:40 SilenceServices sshd[31378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
Nov 17 06:17:41 SilenceServices sshd[31378]: Failed password for invalid user perseus from 148.245.13.21 port 45354 ssh2
Nov 17 06:27:36 SilenceServices sshd[1781]: Failed password for root from 148.245.13.21 port 34926 ssh2
2019-11-17 13:38:45
attackspam
Nov 12 10:20:59 ns382633 sshd\[10793\]: Invalid user host from 148.245.13.21 port 45572
Nov 12 10:20:59 ns382633 sshd\[10793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
Nov 12 10:21:01 ns382633 sshd\[10793\]: Failed password for invalid user host from 148.245.13.21 port 45572 ssh2
Nov 12 10:47:29 ns382633 sshd\[15769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21  user=root
Nov 12 10:47:31 ns382633 sshd\[15769\]: Failed password for root from 148.245.13.21 port 40020 ssh2
2019-11-12 19:02:45
attackspam
Oct 29 04:57:37 srv206 sshd[19138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=na-13-21.static.avantel.net.mx  user=root
Oct 29 04:57:40 srv206 sshd[19138]: Failed password for root from 148.245.13.21 port 35614 ssh2
...
2019-10-29 12:55:50
attack
SSH Brute Force, server-1 sshd[10524]: Failed password for root from 148.245.13.21 port 34092 ssh2
2019-10-27 19:36:36
attackbotsspam
Oct 15 15:56:21 vps647732 sshd[10816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
Oct 15 15:56:23 vps647732 sshd[10816]: Failed password for invalid user protegent from 148.245.13.21 port 59312 ssh2
...
2019-10-15 22:23:59
attack
Oct 11 01:55:44 * sshd[7623]: Failed password for root from 148.245.13.21 port 34334 ssh2
2019-10-11 08:12:53
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.245.13.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.245.13.21.			IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101001 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 11 08:12:50 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
21.13.245.148.in-addr.arpa domain name pointer na-13-21.static.avantel.net.mx.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.13.245.148.in-addr.arpa	name = na-13-21.static.avantel.net.mx.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.105.217.170 attack
Invalid user hamada from 183.105.217.170 port 44708
2019-11-20 05:05:38
91.217.194.85 attack
2019-11-19T21:11:14.668816shield sshd\[4473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.217.194.85  user=root
2019-11-19T21:11:16.818695shield sshd\[4473\]: Failed password for root from 91.217.194.85 port 58320 ssh2
2019-11-19T21:14:58.857586shield sshd\[5076\]: Invalid user sevenstars from 91.217.194.85 port 36890
2019-11-19T21:14:58.861751shield sshd\[5076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.217.194.85
2019-11-19T21:15:01.426401shield sshd\[5076\]: Failed password for invalid user sevenstars from 91.217.194.85 port 36890 ssh2
2019-11-20 05:23:16
170.82.199.123 attack
Brute force attempt
2019-11-20 05:34:49
222.186.180.9 attackspambots
2019-11-19T22:29:04.041899scmdmz1 sshd\[14071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2019-11-19T22:29:05.748126scmdmz1 sshd\[14071\]: Failed password for root from 222.186.180.9 port 8536 ssh2
2019-11-19T22:29:08.618054scmdmz1 sshd\[14071\]: Failed password for root from 222.186.180.9 port 8536 ssh2
...
2019-11-20 05:31:29
50.116.101.52 attack
Nov 19 22:21:42 MK-Soft-Root2 sshd[17395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.116.101.52 
Nov 19 22:21:44 MK-Soft-Root2 sshd[17395]: Failed password for invalid user oana from 50.116.101.52 port 59962 ssh2
...
2019-11-20 05:23:45
180.250.140.74 attack
Unauthorized SSH login attempts
2019-11-20 05:19:57
159.192.231.100 attack
Invalid user admin from 159.192.231.100 port 50902
2019-11-20 05:11:15
106.13.83.251 attackspam
Nov 19 11:10:55 web9 sshd\[20941\]: Invalid user ching from 106.13.83.251
Nov 19 11:10:55 web9 sshd\[20941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251
Nov 19 11:10:57 web9 sshd\[20941\]: Failed password for invalid user ching from 106.13.83.251 port 58126 ssh2
Nov 19 11:14:50 web9 sshd\[21451\]: Invalid user nfs from 106.13.83.251
Nov 19 11:14:50 web9 sshd\[21451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251
2019-11-20 05:30:42
23.106.160.164 spam
phishing emails coming from this IP. Leaseweb was alerted. Partial header:
Received: by filter0125p3las1.sendgrid.net with SMTP id filter0125p3las1-640-5DD425A0-15
2019-11-19 17:25:52.693589763 +0000 UTC m=+5639.671822246
Received: from mgrvqh (unknown [23.106.160.160])
     by ismtpd0004p1sjc2.sendgrid.net (SG) with ESMTP id D8pqMZ1ZTwegfCRt1c93dw
     for ; Tue, 19 Nov 2019 17:25:52.164 +0000 (UTC)
2019-11-20 04:59:58
167.114.98.234 attackspam
Invalid user takahito from 167.114.98.234 port 39166
2019-11-20 05:09:44
183.89.237.205 attackspam
Invalid user admin from 183.89.237.205 port 37006
2019-11-20 05:06:07
222.186.169.192 attack
Nov 20 02:48:09 vibhu-HP-Z238-Microtower-Workstation sshd\[15978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Nov 20 02:48:11 vibhu-HP-Z238-Microtower-Workstation sshd\[15978\]: Failed password for root from 222.186.169.192 port 7760 ssh2
Nov 20 02:48:31 vibhu-HP-Z238-Microtower-Workstation sshd\[15993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
Nov 20 02:48:33 vibhu-HP-Z238-Microtower-Workstation sshd\[15993\]: Failed password for root from 222.186.169.192 port 35974 ssh2
Nov 20 02:48:56 vibhu-HP-Z238-Microtower-Workstation sshd\[16012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
...
2019-11-20 05:19:32
178.62.108.111 attack
2019-11-19T21:14:58.759135abusebot-7.cloudsearch.cf sshd\[23067\]: Invalid user aliarez from 178.62.108.111 port 53130
2019-11-20 05:24:44
209.17.96.146 attackbots
209.17.96.146 was recorded 5 times by 5 hosts attempting to connect to the following ports: 9092,5906,502,3389,6443. Incident counter (4h, 24h, all-time): 5, 49, 578
2019-11-20 05:35:23
167.71.159.129 attack
Invalid user kite from 167.71.159.129 port 48894
2019-11-20 05:10:13

最近上报的IP列表

180.176.213.215 1.52.34.14 182.53.148.234 124.165.159.223
114.135.144.212 2.187.79.200 111.39.110.134 162.144.41.232
125.121.166.225 91.228.64.76 60.214.143.110 87.121.133.173
61.231.205.92 175.21.110.213 93.203.180.9 81.128.140.150
77.42.74.143 42.236.222.84 1.174.93.45 83.6.125.182