必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.145.42.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33927
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;165.145.42.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 20:39:54 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
130.42.145.165.in-addr.arpa domain name pointer dsl-165-145-42-130.telkomadsl.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.42.145.165.in-addr.arpa	name = dsl-165-145-42-130.telkomadsl.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.188.242.129 attackspambots
IP blocked
2020-04-10 13:44:38
222.186.169.192 attack
$f2bV_matches
2020-04-10 13:59:03
189.42.110.107 attackspambots
trying to access non-authorized port
2020-04-10 13:41:13
181.63.248.149 attackbotsspam
Apr 10 08:05:46 vps647732 sshd[13814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.248.149
Apr 10 08:05:48 vps647732 sshd[13814]: Failed password for invalid user uftp from 181.63.248.149 port 47966 ssh2
...
2020-04-10 14:15:44
141.98.80.33 attackbotsspam
Apr 10 06:51:11 mail postfix/smtpd\[13992\]: warning: unknown\[141.98.80.33\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Apr 10 06:51:29 mail postfix/smtpd\[13993\]: warning: unknown\[141.98.80.33\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Apr 10 07:14:19 mail postfix/smtpd\[14251\]: warning: unknown\[141.98.80.33\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Apr 10 07:14:19 mail postfix/smtpd\[14384\]: warning: unknown\[141.98.80.33\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-04-10 13:55:45
182.61.33.145 attackspambots
(sshd) Failed SSH login from 182.61.33.145 (CN/China/-): 5 in the last 3600 secs
2020-04-10 13:50:39
45.254.26.90 attack
Unauthorized connection attempt detected from IP address 45.254.26.90 to port 5900
2020-04-10 13:51:54
139.59.85.120 attackbotsspam
Apr 10 06:59:18 markkoudstaal sshd[26152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.85.120
Apr 10 06:59:20 markkoudstaal sshd[26152]: Failed password for invalid user wwwdata from 139.59.85.120 port 45017 ssh2
Apr 10 07:07:11 markkoudstaal sshd[27208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.85.120
2020-04-10 13:52:23
162.241.175.211 attackspambots
2020-04-10T03:47:34.648418abusebot-2.cloudsearch.cf sshd[13139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.175.211  user=root
2020-04-10T03:47:36.599910abusebot-2.cloudsearch.cf sshd[13139]: Failed password for root from 162.241.175.211 port 40196 ssh2
2020-04-10T03:53:17.242881abusebot-2.cloudsearch.cf sshd[13493]: Invalid user steam from 162.241.175.211 port 47384
2020-04-10T03:53:17.251275abusebot-2.cloudsearch.cf sshd[13493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.175.211
2020-04-10T03:53:17.242881abusebot-2.cloudsearch.cf sshd[13493]: Invalid user steam from 162.241.175.211 port 47384
2020-04-10T03:53:19.624177abusebot-2.cloudsearch.cf sshd[13493]: Failed password for invalid user steam from 162.241.175.211 port 47384 ssh2
2020-04-10T03:56:50.091573abusebot-2.cloudsearch.cf sshd[13805]: Invalid user test from 162.241.175.211 port 56740
...
2020-04-10 14:13:41
119.29.10.25 attackbotsspam
2020-04-10T03:42:54.940768ionos.janbro.de sshd[90943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.10.25
2020-04-10T03:42:54.653631ionos.janbro.de sshd[90943]: Invalid user deploy from 119.29.10.25 port 59058
2020-04-10T03:42:56.795116ionos.janbro.de sshd[90943]: Failed password for invalid user deploy from 119.29.10.25 port 59058 ssh2
2020-04-10T03:50:12.343225ionos.janbro.de sshd[91015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.10.25  user=root
2020-04-10T03:50:14.321709ionos.janbro.de sshd[91015]: Failed password for root from 119.29.10.25 port 44954 ssh2
2020-04-10T03:53:39.542507ionos.janbro.de sshd[91035]: Invalid user amosdev from 119.29.10.25 port 37902
2020-04-10T03:53:39.711690ionos.janbro.de sshd[91035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.10.25
2020-04-10T03:53:39.542507ionos.janbro.de sshd[91035]: Invalid user a
...
2020-04-10 13:59:53
153.231.244.84 attackspambots
Apr 10 01:23:49 server sshd\[25699\]: Invalid user ubuntu from 153.231.244.84
Apr 10 01:23:49 server sshd\[25699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pc4.takami-unet.ocn.ne.jp 
Apr 10 01:23:51 server sshd\[25699\]: Failed password for invalid user ubuntu from 153.231.244.84 port 50216 ssh2
Apr 10 08:23:42 server sshd\[7922\]: Invalid user testing from 153.231.244.84
Apr 10 08:23:42 server sshd\[7922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pc4.takami-unet.ocn.ne.jp 
...
2020-04-10 13:57:07
37.59.61.13 attackbots
Apr 10 06:33:20 mout sshd[6118]: Invalid user iryanto from 37.59.61.13 port 51538
2020-04-10 13:51:26
49.114.143.90 attack
SSH bruteforce
2020-04-10 14:08:57
157.245.235.244 attackspambots
2020-04-10T06:57:40.965082librenms sshd[6077]: Invalid user hduser from 157.245.235.244 port 56574
2020-04-10T06:57:42.998245librenms sshd[6077]: Failed password for invalid user hduser from 157.245.235.244 port 56574 ssh2
2020-04-10T07:12:39.328877librenms sshd[8090]: Invalid user user02 from 157.245.235.244 port 50858
...
2020-04-10 13:33:57
218.92.0.201 attackspam
Apr 10 07:52:15 legacy sshd[19546]: Failed password for root from 218.92.0.201 port 47077 ssh2
Apr 10 07:52:17 legacy sshd[19546]: Failed password for root from 218.92.0.201 port 47077 ssh2
Apr 10 07:52:19 legacy sshd[19546]: Failed password for root from 218.92.0.201 port 47077 ssh2
...
2020-04-10 14:06:07

最近上报的IP列表

253.127.89.60 222.19.238.231 138.252.200.226 145.141.138.238
202.217.60.101 156.11.29.82 230.45.180.224 255.186.213.35
206.185.245.38 100.23.252.14 253.237.215.221 92.109.53.209
169.142.28.76 4.246.213.38 81.35.41.125 140.163.145.138
218.236.101.192 22.197.110.208 138.162.174.16 78.0.197.226