必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): Optus

主机名(hostname): unknown

机构(organization): OPTUS CUSTOMER NETWORK

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.132.145.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40478
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;168.132.145.24.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 12:43:00 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 24.145.132.168.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 24.145.132.168.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.82.208.71 attack
 TCP (SYN) 92.82.208.71:36756 -> port 8080, len 40
2020-10-09 02:11:21
1.192.192.4 attackbots
26/tcp 111/tcp 999/tcp...
[2020-08-26/10-07]10pkt,10pt.(tcp)
2020-10-09 02:24:07
61.216.61.175 attackbots
20/10/8@01:49:39: FAIL: Alarm-Network address from=61.216.61.175
20/10/8@01:49:39: FAIL: Alarm-Network address from=61.216.61.175
...
2020-10-09 02:30:37
36.110.27.122 attack
Oct  8 02:03:28 web1 sshd\[6604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.27.122  user=root
Oct  8 02:03:30 web1 sshd\[6604\]: Failed password for root from 36.110.27.122 port 36848 ssh2
Oct  8 02:08:19 web1 sshd\[7107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.27.122  user=root
Oct  8 02:08:21 web1 sshd\[7107\]: Failed password for root from 36.110.27.122 port 38576 ssh2
Oct  8 02:13:02 web1 sshd\[7606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.27.122  user=root
2020-10-09 02:12:49
220.186.159.148 attack
Oct  8 19:14:36 host2 sshd[1942472]: Failed password for root from 220.186.159.148 port 51504 ssh2
Oct  8 19:14:34 host2 sshd[1942472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.186.159.148  user=root
Oct  8 19:14:36 host2 sshd[1942472]: Failed password for root from 220.186.159.148 port 51504 ssh2
Oct  8 19:18:32 host2 sshd[1943078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.186.159.148  user=root
Oct  8 19:18:34 host2 sshd[1943078]: Failed password for root from 220.186.159.148 port 48882 ssh2
...
2020-10-09 02:18:39
113.53.243.219 attackspam
Icarus honeypot on github
2020-10-09 02:05:55
5.188.84.228 attackbots
fell into ViewStateTrap:harare01
2020-10-09 02:32:03
62.210.151.21 attack
[2020-10-08 10:31:51] NOTICE[1182][C-00001f73] chan_sip.c: Call from '' (62.210.151.21:57041) to extension '9002441665529305' rejected because extension not found in context 'public'.
[2020-10-08 10:31:51] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-08T10:31:51.845-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9002441665529305",SessionID="0x7f22f8572958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.151.21/57041",ACLName="no_extension_match"
[2020-10-08 10:31:58] NOTICE[1182][C-00001f75] chan_sip.c: Call from '' (62.210.151.21:51598) to extension '9005441665529305' rejected because extension not found in context 'public'.
[2020-10-08 10:31:58] SECURITY[1204] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-10-08T10:31:58.004-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9005441665529305",SessionID="0x7f22f8418138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/
...
2020-10-09 02:30:52
167.248.133.19 attackspam
 UDP 167.248.133.19:33490 -> port 161, len 71
2020-10-09 02:12:10
201.75.53.218 attackbotsspam
2020-10-08T08:28:23.105335morrigan.ad5gb.com sshd[2793202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.75.53.218  user=root
2020-10-08T08:28:25.168284morrigan.ad5gb.com sshd[2793202]: Failed password for root from 201.75.53.218 port 34917 ssh2
2020-10-09 02:13:58
167.248.133.23 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-09 02:14:25
139.59.42.174 attackbotsspam
non-SMTP command used
...
2020-10-09 02:13:07
45.129.33.120 attackbotsspam
404 NOT FOUND
2020-10-09 02:19:02
119.45.191.168 attackbots
Oct  8 18:16:58 www sshd\[1971\]: Failed password for root from 119.45.191.168 port 54984 ssh2Oct  8 18:20:48 www sshd\[1985\]: Failed password for root from 119.45.191.168 port 42528 ssh2Oct  8 18:24:42 www sshd\[1999\]: Failed password for root from 119.45.191.168 port 58308 ssh2
...
2020-10-09 02:19:34
162.142.125.22 attack
 TCP (SYN) 162.142.125.22:22445 -> port 445, len 44
2020-10-09 02:07:56

最近上报的IP列表

213.91.164.126 206.19.152.18 207.15.251.75 207.164.89.187
27.7.172.160 216.172.63.59 44.98.53.96 173.118.16.182
223.111.150.40 142.250.122.130 67.108.0.101 126.83.197.110
105.72.37.196 8.133.105.37 41.89.180.23 63.46.228.57
204.47.219.52 115.199.62.38 206.194.66.102 116.249.189.143