必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.137.45.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.137.45.161.			IN	A

;; AUTHORITY SECTION:
.			347	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032701 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 28 12:14:25 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 161.45.137.149.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 161.45.137.149.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.110.75.102 attack
TCP port 8080 (HTTP) attempt blocked by firewall. [2019-07-03 15:28:05]
2019-07-03 21:43:43
142.93.22.180 attackbotsspam
2019-07-03T15:41:31.543532cavecanem sshd[19320]: Invalid user shi from 142.93.22.180 port 58966
2019-07-03T15:41:31.570746cavecanem sshd[19320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.22.180
2019-07-03T15:41:31.543532cavecanem sshd[19320]: Invalid user shi from 142.93.22.180 port 58966
2019-07-03T15:41:33.176526cavecanem sshd[19320]: Failed password for invalid user shi from 142.93.22.180 port 58966 ssh2
2019-07-03T15:45:00.832061cavecanem sshd[20265]: Invalid user zookeeper from 142.93.22.180 port 59994
2019-07-03T15:45:00.834456cavecanem sshd[20265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.22.180
2019-07-03T15:45:00.832061cavecanem sshd[20265]: Invalid user zookeeper from 142.93.22.180 port 59994
2019-07-03T15:45:03.132607cavecanem sshd[20265]: Failed password for invalid user zookeeper from 142.93.22.180 port 59994 ssh2
2019-07-03T15:48:22.331717cavecanem sshd[21238]: Inval
...
2019-07-03 22:25:15
54.38.226.197 attack
blogonese.net 54.38.226.197 \[03/Jul/2019:15:28:13 +0200\] "POST /wp-login.php HTTP/1.1" 200 5772 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 54.38.226.197 \[03/Jul/2019:15:28:13 +0200\] "POST /wp-login.php HTTP/1.1" 200 5732 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-03 22:21:49
181.40.122.2 attackbotsspam
Jul  3 16:01:44 lnxweb62 sshd[12707]: Failed password for root from 181.40.122.2 port 22257 ssh2
Jul  3 16:01:44 lnxweb62 sshd[12707]: Failed password for root from 181.40.122.2 port 22257 ssh2
2019-07-03 22:08:14
185.53.88.45 attackspam
\[2019-07-03 09:41:20\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-03T09:41:20.030-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441217900519",SessionID="0x7f02f810d948",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.45/55850",ACLName="no_extension_match"
\[2019-07-03 09:43:46\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-03T09:43:46.859-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441217900519",SessionID="0x7f02f81ae088",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.45/49602",ACLName="no_extension_match"
\[2019-07-03 09:46:07\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-03T09:46:07.518-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441217900519",SessionID="0x7f02f81ae088",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.45/61709",ACLName="no_ex
2019-07-03 21:52:08
77.40.53.137 attackspambots
SMTP
2019-07-03 21:38:29
94.196.251.58 attack
wanderers inside for a reason/or in empty property due to a tampered build/which is a legal case/need reworking -rewiring/etc/only one builder involved/makes it easy/wild campers on cctv/risky wandering/locals wandering/not tourists/f.will -kara.ns.cloudflare.com dog owner of kara/f.will
2019-07-03 22:27:15
118.81.52.236 attackbotsspam
Unauthorised access (Jul  3) SRC=118.81.52.236 LEN=40 TTL=49 ID=1395 TCP DPT=23 WINDOW=227 SYN
2019-07-03 22:33:00
179.43.144.130 attack
GET /web.tar.gz HTTP/1.0
2019-07-03 22:10:23
223.100.164.221 attack
Jul  2 20:14:40 josie sshd[4416]: Invalid user oracle from 223.100.164.221
Jul  2 20:14:40 josie sshd[4416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.100.164.221 
Jul  2 20:14:42 josie sshd[4416]: Failed password for invalid user oracle from 223.100.164.221 port 56301 ssh2
Jul  2 20:14:42 josie sshd[4419]: Received disconnect from 223.100.164.221: 11: Bye Bye
Jul  2 20:25:57 josie sshd[12169]: Invalid user css from 223.100.164.221
Jul  2 20:25:57 josie sshd[12169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.100.164.221 
Jul  2 20:25:59 josie sshd[12169]: Failed password for invalid user css from 223.100.164.221 port 45862 ssh2
Jul  2 20:25:59 josie sshd[12176]: Received disconnect from 223.100.164.221: 11: Bye Bye
Jul  2 20:27:53 josie sshd[13271]: Invalid user oracle from 223.100.164.221
Jul  2 20:27:53 josie sshd[13271]: pam_unix(sshd:auth): authentication failure; logn........
-------------------------------
2019-07-03 22:28:11
45.227.253.212 attackbots
2019-07-03 22:24:38
186.1.216.13 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 03:29:42,488 INFO [shellcode_manager] (186.1.216.13) no match, writing hexdump (f60a73b7904b07466f2c915864fa1239 :1844938) - MS17010 (EternalBlue)
2019-07-03 21:29:41
185.216.32.212 attackspambots
/posting.php?mode=post&f=3
2019-07-03 22:01:22
142.11.209.120 attackbotsspam
Trying to send email FROM @ TO a single gmail address. Presumably testing for open relay.
2019-07-03 22:03:04
185.100.86.100 attackbotsspam
Input Traffic from this IP, but critial abuseconfidencescore
2019-07-03 22:04:52

最近上报的IP列表

3.190.18.191 101.195.3.242 22.227.228.204 61.252.247.28
202.32.18.222 254.80.113.29 202.163.47.10 137.95.230.73
245.46.77.107 198.30.108.217 14.241.244.178 142.130.14.50
22.178.64.70 10.10.242.100 40.122.167.18 237.151.40.215
127.58.145.185 56.219.33.24 27.70.170.154 57.215.28.71