必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.107.97.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.107.97.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:42:24 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 145.97.107.161.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 161.107.97.145.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.110.10.230 attackbotsspam
Unauthorised access (Feb 23) SRC=116.110.10.230 LEN=52 TTL=108 ID=208 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-23 13:04:33
210.209.72.232 attackbotsspam
Feb 23 01:44:53 silence02 sshd[14057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.72.232
Feb 23 01:44:55 silence02 sshd[14057]: Failed password for invalid user Michelle from 210.209.72.232 port 50559 ssh2
Feb 23 01:48:38 silence02 sshd[14356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.72.232
2020-02-23 09:24:05
88.243.239.112 attackbotsspam
1582418918 - 02/23/2020 07:48:38 Host: 88.243.239.112.dynamic.ttnet.com.tr/88.243.239.112 Port: 23 TCP Blocked
...
2020-02-23 09:22:58
119.137.53.5 attack
Feb 22 20:04:17 plusreed sshd[30458]: Invalid user us from 119.137.53.5
...
2020-02-23 09:15:19
137.74.44.162 attackbots
Feb 23 01:55:50 firewall sshd[21775]: Invalid user gerrit from 137.74.44.162
Feb 23 01:55:52 firewall sshd[21775]: Failed password for invalid user gerrit from 137.74.44.162 port 42390 ssh2
Feb 23 01:58:50 firewall sshd[21843]: Invalid user ec2-user from 137.74.44.162
...
2020-02-23 13:00:06
179.184.27.160 attackspambots
Feb 23 01:42:30 vserver sshd\[2783\]: Invalid user sekhar from 179.184.27.160Feb 23 01:42:32 vserver sshd\[2783\]: Failed password for invalid user sekhar from 179.184.27.160 port 58723 ssh2Feb 23 01:45:51 vserver sshd\[2806\]: Failed password for root from 179.184.27.160 port 42380 ssh2Feb 23 01:48:47 vserver sshd\[2816\]: Invalid user air from 179.184.27.160
...
2020-02-23 09:17:14
140.143.30.191 attackbots
Feb 23 01:31:25 ns382633 sshd\[14595\]: Invalid user appserver from 140.143.30.191 port 40812
Feb 23 01:31:25 ns382633 sshd\[14595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.30.191
Feb 23 01:31:27 ns382633 sshd\[14595\]: Failed password for invalid user appserver from 140.143.30.191 port 40812 ssh2
Feb 23 01:48:20 ns382633 sshd\[17250\]: Invalid user yangzishuang from 140.143.30.191 port 38228
Feb 23 01:48:20 ns382633 sshd\[17250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.30.191
2020-02-23 09:33:12
63.245.45.135 attackspambots
Feb 23 01:42:27 h1745522 sshd[24277]: Invalid user appuser from 63.245.45.135 port 54488
Feb 23 01:42:27 h1745522 sshd[24277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.245.45.135
Feb 23 01:42:27 h1745522 sshd[24277]: Invalid user appuser from 63.245.45.135 port 54488
Feb 23 01:42:29 h1745522 sshd[24277]: Failed password for invalid user appuser from 63.245.45.135 port 54488 ssh2
Feb 23 01:45:34 h1745522 sshd[24349]: Invalid user tinkerware from 63.245.45.135 port 49833
Feb 23 01:45:34 h1745522 sshd[24349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.245.45.135
Feb 23 01:45:34 h1745522 sshd[24349]: Invalid user tinkerware from 63.245.45.135 port 49833
Feb 23 01:45:36 h1745522 sshd[24349]: Failed password for invalid user tinkerware from 63.245.45.135 port 49833 ssh2
Feb 23 01:48:39 h1745522 sshd[24431]: Invalid user ts3 from 63.245.45.135 port 57916
...
2020-02-23 09:23:28
222.186.180.9 attack
Feb 23 02:19:34 h2177944 sshd\[22959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Feb 23 02:19:36 h2177944 sshd\[22959\]: Failed password for root from 222.186.180.9 port 28550 ssh2
Feb 23 02:19:39 h2177944 sshd\[22959\]: Failed password for root from 222.186.180.9 port 28550 ssh2
Feb 23 02:19:43 h2177944 sshd\[22959\]: Failed password for root from 222.186.180.9 port 28550 ssh2
...
2020-02-23 09:22:10
112.85.42.188 attackbotsspam
02/22/2020-20:34:21.269489 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-02-23 09:37:16
121.155.176.81 attackspambots
port scan and connect, tcp 23 (telnet)
2020-02-23 09:28:09
139.59.17.118 attack
Feb 23 01:13:06 web8 sshd\[20887\]: Invalid user 12345 from 139.59.17.118
Feb 23 01:13:06 web8 sshd\[20887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.17.118
Feb 23 01:13:08 web8 sshd\[20887\]: Failed password for invalid user 12345 from 139.59.17.118 port 56818 ssh2
Feb 23 01:15:58 web8 sshd\[22401\]: Invalid user ts4 from 139.59.17.118
Feb 23 01:15:58 web8 sshd\[22401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.17.118
2020-02-23 09:26:53
139.59.80.65 attackbots
Feb 23 01:00:52 web8 sshd\[14415\]: Invalid user es from 139.59.80.65
Feb 23 01:00:52 web8 sshd\[14415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.65
Feb 23 01:00:53 web8 sshd\[14415\]: Failed password for invalid user es from 139.59.80.65 port 42042 ssh2
Feb 23 01:03:59 web8 sshd\[16091\]: Invalid user freeswitch from 139.59.80.65
Feb 23 01:03:59 web8 sshd\[16091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.65
2020-02-23 09:12:50
51.77.202.172 attackspam
Feb 23 02:12:13 silence02 sshd[16500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.202.172
Feb 23 02:12:15 silence02 sshd[16500]: Failed password for invalid user ubuntu4 from 51.77.202.172 port 41900 ssh2
Feb 23 02:15:04 silence02 sshd[16727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.202.172
2020-02-23 09:24:35
106.13.233.186 attack
Feb 23 02:11:58 localhost sshd\[19114\]: Invalid user sinusbot from 106.13.233.186
Feb 23 02:11:58 localhost sshd\[19114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.186
Feb 23 02:12:00 localhost sshd\[19114\]: Failed password for invalid user sinusbot from 106.13.233.186 port 45639 ssh2
Feb 23 02:13:20 localhost sshd\[19161\]: Invalid user svnuser from 106.13.233.186
Feb 23 02:13:20 localhost sshd\[19161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.233.186
...
2020-02-23 09:26:37

最近上报的IP列表

34.191.228.225 180.49.131.32 233.181.131.91 142.51.33.144
123.90.165.224 213.143.22.78 103.238.181.46 199.30.76.152
28.212.132.167 131.50.88.132 154.136.35.149 209.168.22.186
239.253.91.37 115.188.52.82 62.131.30.160 219.205.175.248
156.32.56.189 163.72.191.172 75.148.105.111 207.93.55.106