必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.222.231.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.222.231.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 16:20:28 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 145.231.222.164.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.231.222.164.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.33.216.187 attack
Nov 29 21:15:21 hanapaa sshd\[12185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=onion2.hosting.ovh.web-et-solutions.com  user=backup
Nov 29 21:15:22 hanapaa sshd\[12185\]: Failed password for backup from 178.33.216.187 port 45725 ssh2
Nov 29 21:18:20 hanapaa sshd\[12395\]: Invalid user montoyo from 178.33.216.187
Nov 29 21:18:20 hanapaa sshd\[12395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=onion2.hosting.ovh.web-et-solutions.com
Nov 29 21:18:22 hanapaa sshd\[12395\]: Failed password for invalid user montoyo from 178.33.216.187 port 35246 ssh2
2019-11-30 15:30:52
42.157.129.158 attackbotsspam
Nov 29 21:17:31 php1 sshd\[29750\]: Invalid user guhl from 42.157.129.158
Nov 29 21:17:31 php1 sshd\[29750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.129.158
Nov 29 21:17:33 php1 sshd\[29750\]: Failed password for invalid user guhl from 42.157.129.158 port 52992 ssh2
Nov 29 21:22:01 php1 sshd\[30202\]: Invalid user yoyo from 42.157.129.158
Nov 29 21:22:01 php1 sshd\[30202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.129.158
2019-11-30 15:39:22
222.186.180.9 attack
Nov 30 09:50:47 dri sshd[29867]: error: PAM: Authentication failure for root from 222.186.180.9
Nov 30 09:50:52 dri sshd[29867]: error: PAM: Authentication failure for root from 222.186.180.9
Nov 30 0
...
2019-11-30 15:53:29
45.119.215.68 attackspam
2019-11-30T07:21:27.055694  sshd[26602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68  user=root
2019-11-30T07:21:28.466660  sshd[26602]: Failed password for root from 45.119.215.68 port 57740 ssh2
2019-11-30T07:25:24.873471  sshd[26672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68  user=root
2019-11-30T07:25:27.152692  sshd[26672]: Failed password for root from 45.119.215.68 port 36974 ssh2
2019-11-30T07:29:30.402754  sshd[26715]: Invalid user server from 45.119.215.68 port 44432
...
2019-11-30 15:32:23
159.192.253.16 attackspambots
Nov 30 07:29:13 vmd17057 sshd\[6256\]: Invalid user admin from 159.192.253.16 port 50885
Nov 30 07:29:13 vmd17057 sshd\[6256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.253.16
Nov 30 07:29:15 vmd17057 sshd\[6256\]: Failed password for invalid user admin from 159.192.253.16 port 50885 ssh2
...
2019-11-30 15:43:10
182.61.176.53 attackspambots
Nov 30 08:17:43 markkoudstaal sshd[23589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.176.53
Nov 30 08:17:46 markkoudstaal sshd[23589]: Failed password for invalid user cn from 182.61.176.53 port 51206 ssh2
Nov 30 08:21:02 markkoudstaal sshd[23915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.176.53
2019-11-30 15:29:30
61.180.39.72 attackbotsspam
port scanning
2019-11-30 15:24:04
61.177.172.128 attackbotsspam
F2B jail: sshd. Time: 2019-11-30 07:52:54, Reported by: VKReport
2019-11-30 15:22:00
51.89.148.180 attackspam
$f2bV_matches
2019-11-30 15:48:05
45.95.55.12 attackbots
Nov 30 06:53:58 venus sshd\[1373\]: Invalid user chaales from 45.95.55.12 port 45416
Nov 30 06:53:58 venus sshd\[1373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.95.55.12
Nov 30 06:54:00 venus sshd\[1373\]: Failed password for invalid user chaales from 45.95.55.12 port 45416 ssh2
...
2019-11-30 15:52:48
222.186.173.142 attack
Nov 30 02:00:24 TORMINT sshd\[23302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Nov 30 02:00:26 TORMINT sshd\[23302\]: Failed password for root from 222.186.173.142 port 41840 ssh2
Nov 30 02:00:44 TORMINT sshd\[23304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
...
2019-11-30 15:18:25
14.247.135.25 attack
Unauthorised access (Nov 30) SRC=14.247.135.25 LEN=52 TTL=118 ID=1759 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 15:48:34
117.50.11.205 attackspambots
2019-11-30T01:25:18.481436ns547587 sshd\[30187\]: Invalid user grasman from 117.50.11.205 port 59832
2019-11-30T01:25:18.488006ns547587 sshd\[30187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.11.205
2019-11-30T01:25:20.275245ns547587 sshd\[30187\]: Failed password for invalid user grasman from 117.50.11.205 port 59832 ssh2
2019-11-30T01:29:56.740503ns547587 sshd\[31838\]: Invalid user backup from 117.50.11.205 port 33390
...
2019-11-30 15:21:11
185.163.47.188 spam
Spam emails sent from this ip
2019-11-30 15:18:30
210.242.144.34 attackbots
Nov 30 08:16:35 dedicated sshd[10279]: Invalid user fastowl from 210.242.144.34 port 58294
2019-11-30 15:34:36

最近上报的IP列表

128.78.194.159 93.254.186.39 254.97.89.89 241.59.78.26
198.81.239.184 244.54.55.121 4.7.197.16 198.227.242.60
12.5.196.249 251.71.233.3 16.236.72.220 76.165.19.115
138.172.68.54 198.26.187.149 253.85.100.10 101.174.16.164
160.149.92.77 173.185.134.235 51.156.251.134 242.41.24.6