必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Colombia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 186.145.139.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26678
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;186.145.139.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:18:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
53.139.145.186.in-addr.arpa domain name pointer dynamic-ip-18614513953.cable.net.co.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.139.145.186.in-addr.arpa	name = dynamic-ip-18614513953.cable.net.co.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.38.53.251 attackspambots
invalid user
2020-02-11 02:42:47
121.151.214.102 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-11 03:00:36
223.205.247.177 attack
1581341919 - 02/10/2020 14:38:39 Host: 223.205.247.177/223.205.247.177 Port: 445 TCP Blocked
2020-02-11 02:37:05
140.143.204.209 attackbots
$f2bV_matches
2020-02-11 03:15:34
36.68.32.229 attack
1581341897 - 02/10/2020 14:38:17 Host: 36.68.32.229/36.68.32.229 Port: 445 TCP Blocked
2020-02-11 03:09:42
202.59.166.148 attackspambots
$f2bV_matches
2020-02-11 02:40:31
50.70.229.239 attack
$f2bV_matches
2020-02-11 02:45:53
103.230.107.229 attackspam
$lgm
2020-02-11 02:57:14
200.193.166.148 attackspambots
smb 445
2020-02-11 02:51:15
123.113.180.25 attackspam
Feb 10 05:04:30 web9 sshd\[9894\]: Invalid user sof from 123.113.180.25
Feb 10 05:04:30 web9 sshd\[9894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.113.180.25
Feb 10 05:04:32 web9 sshd\[9894\]: Failed password for invalid user sof from 123.113.180.25 port 15268 ssh2
Feb 10 05:08:30 web9 sshd\[10476\]: Invalid user zcx from 123.113.180.25
Feb 10 05:08:30 web9 sshd\[10476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.113.180.25
2020-02-11 02:53:52
80.75.14.77 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 02:42:18
106.13.140.52 attackbots
Feb 10 17:16:07 sd-53420 sshd\[25063\]: Invalid user qzb from 106.13.140.52
Feb 10 17:16:07 sd-53420 sshd\[25063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.52
Feb 10 17:16:09 sd-53420 sshd\[25063\]: Failed password for invalid user qzb from 106.13.140.52 port 51928 ssh2
Feb 10 17:20:41 sd-53420 sshd\[25517\]: Invalid user ebk from 106.13.140.52
Feb 10 17:20:41 sd-53420 sshd\[25517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.52
...
2020-02-11 02:38:29
104.129.204.80 attackproxy
appears to ipv6 to ipv4 redirect ssl with dns cache poisoning
2020-02-11 02:35:32
202.29.39.1 attackbotsspam
$f2bV_matches
2020-02-11 03:05:46
80.67.223.41 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 02:57:32

最近上报的IP列表

129.2.178.195 189.174.229.31 17.70.188.194 127.118.38.9
32.69.32.155 80.205.175.87 89.209.249.218 230.94.220.191
160.73.14.120 198.17.159.11 164.91.143.148 19.70.196.170
173.119.216.121 147.143.97.160 30.113.166.7 36.1.102.165
97.90.47.183 123.107.118.39 205.241.48.154 70.189.121.252