必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Colombia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.145.112.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49297
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;190.145.112.94.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060500 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 05 14:26:29 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 94.112.145.190.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 94.112.145.190.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.93.201.198 attack
Automatic report - Banned IP Access
2020-10-10 04:07:29
37.59.47.61 attack
37.59.47.61 - - [09/Oct/2020:20:21:30 +0100] "POST /wp-login.php HTTP/1.1" 200 7649 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.47.61 - - [09/Oct/2020:20:24:18 +0100] "POST /wp-login.php HTTP/1.1" 200 7699 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.47.61 - - [09/Oct/2020:20:27:00 +0100] "POST /wp-login.php HTTP/1.1" 200 7558 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-10-10 03:34:37
123.59.195.159 attackspambots
2020-10-08T21:32:20.5781081495-001 sshd[36579]: Failed password for invalid user admin from 123.59.195.159 port 47151 ssh2
2020-10-08T21:36:35.2959901495-001 sshd[36759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.195.159  user=root
2020-10-08T21:36:37.1777631495-001 sshd[36759]: Failed password for root from 123.59.195.159 port 42958 ssh2
2020-10-08T21:40:54.6466661495-001 sshd[36974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.195.159  user=root
2020-10-08T21:40:56.4180001495-001 sshd[36974]: Failed password for root from 123.59.195.159 port 38763 ssh2
2020-10-08T21:45:26.0191941495-001 sshd[37258]: Invalid user system from 123.59.195.159 port 34565
...
2020-10-10 03:45:44
91.132.103.85 attackbotsspam
Oct  9 15:09:03 scw-focused-cartwright sshd[28098]: Failed password for root from 91.132.103.85 port 40920 ssh2
Oct  9 15:15:54 scw-focused-cartwright sshd[28252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.132.103.85
2020-10-10 04:01:42
54.154.186.217 attackspam
(sshd) Failed SSH login from 54.154.186.217 (IE/Ireland/ec2-54-154-186-217.eu-west-1.compute.amazonaws.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  9 07:01:41 optimus sshd[30825]: Failed password for root from 54.154.186.217 port 60980 ssh2
Oct  9 07:01:44 optimus sshd[30924]: Failed password for root from 54.154.186.217 port 34112 ssh2
Oct  9 07:01:48 optimus sshd[30938]: Failed password for root from 54.154.186.217 port 35082 ssh2
Oct  9 07:01:51 optimus sshd[30955]: Failed password for root from 54.154.186.217 port 36358 ssh2
Oct  9 07:01:54 optimus sshd[30970]: Failed password for root from 54.154.186.217 port 37508 ssh2
2020-10-10 03:53:49
88.157.229.58 attackbots
Oct  9 21:47:16 pve1 sshd[21873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.157.229.58 
Oct  9 21:47:18 pve1 sshd[21873]: Failed password for invalid user oscar from 88.157.229.58 port 47472 ssh2
...
2020-10-10 03:52:47
212.70.149.36 attackspambots
2020-10-09 22:46:49 auth_plain authenticator failed for (User) [212.70.149.36]: 535 Incorrect authentication data (set_id=mtb@lavrinenko.info)
2020-10-09 22:47:09 auth_plain authenticator failed for (User) [212.70.149.36]: 535 Incorrect authentication data (set_id=aw@lavrinenko.info)
...
2020-10-10 03:51:49
91.135.60.15 attack
Automatic report - Port Scan Attack
2020-10-10 03:51:27
202.115.30.5 attack
Oct  9 20:31:21 h2779839 sshd[23028]: Invalid user testing from 202.115.30.5 port 28373
Oct  9 20:31:21 h2779839 sshd[23028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.115.30.5
Oct  9 20:31:21 h2779839 sshd[23028]: Invalid user testing from 202.115.30.5 port 28373
Oct  9 20:31:24 h2779839 sshd[23028]: Failed password for invalid user testing from 202.115.30.5 port 28373 ssh2
Oct  9 20:36:07 h2779839 sshd[23129]: Invalid user wwwdata from 202.115.30.5 port 47091
Oct  9 20:36:07 h2779839 sshd[23129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.115.30.5
Oct  9 20:36:07 h2779839 sshd[23129]: Invalid user wwwdata from 202.115.30.5 port 47091
Oct  9 20:36:09 h2779839 sshd[23129]: Failed password for invalid user wwwdata from 202.115.30.5 port 47091 ssh2
Oct  9 20:41:02 h2779839 sshd[23256]: Invalid user tomcat from 202.115.30.5 port 33052
...
2020-10-10 03:38:05
62.234.6.147 attack
2020-10-09T14:59:27.245175cyberdyne sshd[1724490]: Invalid user job from 62.234.6.147 port 55008
2020-10-09T14:59:27.250935cyberdyne sshd[1724490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.6.147
2020-10-09T14:59:27.245175cyberdyne sshd[1724490]: Invalid user job from 62.234.6.147 port 55008
2020-10-09T14:59:29.208263cyberdyne sshd[1724490]: Failed password for invalid user job from 62.234.6.147 port 55008 ssh2
...
2020-10-10 03:55:26
46.174.191.31 attack
 TCP (SYN) 46.174.191.31:28471 -> port 8080, len 48
2020-10-10 03:54:39
80.11.61.235 attack
2020-10-09T14:03:09.622365abusebot-6.cloudsearch.cf sshd[2144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=lmontsouris-655-1-68-235.w80-11.abo.wanadoo.fr  user=root
2020-10-09T14:03:11.275666abusebot-6.cloudsearch.cf sshd[2144]: Failed password for root from 80.11.61.235 port 49466 ssh2
2020-10-09T14:06:54.135703abusebot-6.cloudsearch.cf sshd[2193]: Invalid user ralph from 80.11.61.235 port 55322
2020-10-09T14:06:54.141788abusebot-6.cloudsearch.cf sshd[2193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=lmontsouris-655-1-68-235.w80-11.abo.wanadoo.fr
2020-10-09T14:06:54.135703abusebot-6.cloudsearch.cf sshd[2193]: Invalid user ralph from 80.11.61.235 port 55322
2020-10-09T14:06:56.350563abusebot-6.cloudsearch.cf sshd[2193]: Failed password for invalid user ralph from 80.11.61.235 port 55322 ssh2
2020-10-09T14:10:29.958515abusebot-6.cloudsearch.cf sshd[2261]: Invalid user teste from 80.11.61.235 port 3
...
2020-10-10 03:40:57
139.155.86.130 attackspam
Oct  9 19:57:07 scw-gallant-ride sshd[16847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.86.130
2020-10-10 04:04:14
178.128.243.225 attackbots
Invalid user user from 178.128.243.225 port 38820
2020-10-10 04:03:30
159.89.151.199 attackbots
Port scan denied
2020-10-10 03:58:04

最近上报的IP列表

103.83.173.234 5.135.165.32 84.245.71.117 78.172.231.107
18.115.84.243 42.231.162.204 78.85.40.202 62.23.240.146
113.160.186.18 45.13.39.118 111.230.135.96 36.39.22.246
113.190.255.114 221.223.35.118 79.155.251.18 23.129.64.185
170.254.151.214 115.78.13.62 192.179.211.188 71.6.233.44