必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.21.146.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.21.146.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 20:46:21 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 45.146.21.172.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.146.21.172.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
172.58.83.4 attackspambots
POST /wp-admin/admin-ajax.php HTTP/1.1 200 126 novostiMozilla/5.0 (Linux; Android 9; SAMSUNG SM-J737T) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/10.1 Chrome/71.0.3578.99 Mobile Safari/537.36
2019-11-29 17:32:59
132.232.113.102 attackbotsspam
Nov 29 08:00:25 vpn01 sshd[27865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.113.102
Nov 29 08:00:28 vpn01 sshd[27865]: Failed password for invalid user hyacinthia from 132.232.113.102 port 56027 ssh2
...
2019-11-29 17:58:48
103.215.80.81 attackbotsspam
Nov 29 07:57:26 [host] sshd[32294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.80.81  user=root
Nov 29 07:57:28 [host] sshd[32294]: Failed password for root from 103.215.80.81 port 42234 ssh2
Nov 29 08:02:40 [host] sshd[32401]: Invalid user bonnefoy from 103.215.80.81
Nov 29 08:02:40 [host] sshd[32401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.215.80.81
2019-11-29 17:57:38
189.211.206.238 attackspambots
*Port Scan* detected from 189.211.206.238 (MX/Mexico/189-211-206-238.static.axtel.net). 4 hits in the last 160 seconds
2019-11-29 17:52:03
149.129.251.152 attackbotsspam
2019-11-29T09:38:18.835066abusebot-5.cloudsearch.cf sshd\[31814\]: Invalid user \$\$\$\$\$\$ from 149.129.251.152 port 46992
2019-11-29 17:43:57
200.216.63.46 attackbots
2019-11-29T06:53:18.620531shield sshd\[23621\]: Invalid user wcec from 200.216.63.46 port 36198
2019-11-29T06:53:18.624828shield sshd\[23621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.216.63.46
2019-11-29T06:53:20.833789shield sshd\[23621\]: Failed password for invalid user wcec from 200.216.63.46 port 36198 ssh2
2019-11-29T06:57:25.211772shield sshd\[24792\]: Invalid user backup from 200.216.63.46 port 44056
2019-11-29T06:57:25.215876shield sshd\[24792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.216.63.46
2019-11-29 17:45:59
77.40.17.68 attack
Nov 29 09:48:00 mail postfix/smtps/smtpd[17226]: warning: unknown[77.40.17.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 29 09:51:12 mail postfix/smtps/smtpd[20295]: warning: unknown[77.40.17.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 29 09:52:10 mail postfix/smtps/smtpd[21054]: warning: unknown[77.40.17.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-29 17:34:31
89.100.21.40 attack
2019-11-29T09:05:40.647662abusebot-6.cloudsearch.cf sshd\[12413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40  user=root
2019-11-29 17:28:11
5.88.221.71 attackspambots
Automatic report - Port Scan Attack
2019-11-29 17:27:27
139.155.69.51 attackbotsspam
Nov 29 08:33:15 vps666546 sshd\[23077\]: Invalid user kigwa from 139.155.69.51 port 52476
Nov 29 08:33:15 vps666546 sshd\[23077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.51
Nov 29 08:33:17 vps666546 sshd\[23077\]: Failed password for invalid user kigwa from 139.155.69.51 port 52476 ssh2
Nov 29 08:37:18 vps666546 sshd\[23210\]: Invalid user saturn from 139.155.69.51 port 57558
Nov 29 08:37:18 vps666546 sshd\[23210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.51
...
2019-11-29 17:41:54
222.169.86.14 attack
(Nov 29)  LEN=40 TTL=50 ID=14568 TCP DPT=8080 WINDOW=13909 SYN 
 (Nov 29)  LEN=40 TTL=50 ID=5881 TCP DPT=8080 WINDOW=21717 SYN 
 (Nov 28)  LEN=40 TTL=50 ID=28828 TCP DPT=8080 WINDOW=12388 SYN 
 (Nov 28)  LEN=40 TTL=50 ID=41250 TCP DPT=8080 WINDOW=21717 SYN 
 (Nov 28)  LEN=40 TTL=50 ID=58904 TCP DPT=8080 WINDOW=14423 SYN 
 (Nov 28)  LEN=40 TTL=50 ID=26515 TCP DPT=8080 WINDOW=13909 SYN 
 (Nov 27)  LEN=40 TTL=50 ID=28651 TCP DPT=8080 WINDOW=13909 SYN 
 (Nov 27)  LEN=40 TTL=50 ID=35651 TCP DPT=8080 WINDOW=13909 SYN 
 (Nov 25)  LEN=40 TTL=50 ID=31782 TCP DPT=8080 WINDOW=21717 SYN 
 (Nov 25)  LEN=40 TTL=50 ID=12359 TCP DPT=8080 WINDOW=21717 SYN 
 (Nov 25)  LEN=40 TTL=50 ID=35723 TCP DPT=8080 WINDOW=13909 SYN
2019-11-29 17:25:40
189.101.236.32 attackspam
Invalid user 123 from 189.101.236.32 port 54884
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.101.236.32
Failed password for invalid user 123 from 189.101.236.32 port 54884 ssh2
Invalid user ginart from 189.101.236.32 port 45375
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.101.236.32
2019-11-29 17:58:22
129.204.23.233 attackbots
Nov 29 06:25:19 ms-srv sshd[34014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.23.233
Nov 29 06:25:21 ms-srv sshd[34014]: Failed password for invalid user ecgap from 129.204.23.233 port 58746 ssh2
2019-11-29 17:42:05
196.52.43.52 attackspam
Connection by 196.52.43.52 on port: 5910 got caught by honeypot at 11/29/2019 8:14:53 AM
2019-11-29 17:41:08
122.51.37.26 attackspambots
Nov 29 09:29:24 MK-Soft-VM6 sshd[3467]: Failed password for root from 122.51.37.26 port 42264 ssh2
Nov 29 09:33:02 MK-Soft-VM6 sshd[3474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.37.26 
...
2019-11-29 17:30:12

最近上报的IP列表

47.28.99.183 222.187.20.236 170.156.149.219 70.36.215.93
13.126.198.150 6.94.182.4 170.124.225.51 203.72.219.41
55.162.119.58 254.26.73.38 168.51.55.10 159.56.121.14
12.86.48.29 20.113.35.33 119.1.132.203 67.114.196.222
223.125.158.201 18.149.237.0 203.165.195.89 168.184.152.105