必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.150.94.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.150.94.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 00:54:23 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 145.94.150.194.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.94.150.194.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.217 attackbots
2020-01-08T23:13:42.400442shield sshd\[11896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
2020-01-08T23:13:43.727047shield sshd\[11896\]: Failed password for root from 222.186.175.217 port 23898 ssh2
2020-01-08T23:13:46.873830shield sshd\[11896\]: Failed password for root from 222.186.175.217 port 23898 ssh2
2020-01-08T23:13:50.238463shield sshd\[11896\]: Failed password for root from 222.186.175.217 port 23898 ssh2
2020-01-08T23:13:53.014000shield sshd\[11896\]: Failed password for root from 222.186.175.217 port 23898 ssh2
2020-01-09 07:20:05
47.96.144.102 attackspam
Jan  8 22:07:15 vps sshd\[30428\]: Invalid user phion from 47.96.144.102
Jan  8 22:09:10 vps sshd\[30434\]: Invalid user firebird from 47.96.144.102
...
2020-01-09 07:21:26
104.199.33.113 attack
Jan  9 00:02:32 vps sshd\[446\]: Invalid user default from 104.199.33.113
Jan  9 00:03:16 vps sshd\[449\]: Invalid user phion from 104.199.33.113
...
2020-01-09 07:33:55
177.126.118.147 attackspam
Automatic report - Port Scan Attack
2020-01-09 07:23:31
106.12.159.235 attackspam
Jan  8 22:13:38 master sshd[4015]: Failed password for invalid user castis from 106.12.159.235 port 49624 ssh2
Jan  8 22:15:37 master sshd[4026]: Failed password for invalid user test from 106.12.159.235 port 41466 ssh2
Jan  8 22:17:47 master sshd[4033]: Failed password for invalid user zabbix from 106.12.159.235 port 33334 ssh2
2020-01-09 07:51:36
162.243.55.188 attack
Jan  8 16:26:06 server sshd\[14022\]: Invalid user demo from 162.243.55.188
Jan  8 16:26:06 server sshd\[14022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.55.188 
Jan  8 16:26:08 server sshd\[14022\]: Failed password for invalid user demo from 162.243.55.188 port 49668 ssh2
Jan  9 00:09:03 server sshd\[28101\]: Invalid user osmc from 162.243.55.188
Jan  9 00:09:03 server sshd\[28101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.55.188 
...
2020-01-09 07:26:31
118.25.189.123 attack
Jan  8 23:08:15 * sshd[649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.189.123
Jan  8 23:08:17 * sshd[649]: Failed password for invalid user gzz from 118.25.189.123 port 49060 ssh2
2020-01-09 07:37:24
92.118.37.83 attackspambots
01/08/2020-17:54:18.075713 92.118.37.83 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-09 07:28:25
80.82.65.74 attackbotsspam
Multiport scan : 6 ports scanned 3309 4001 5000 8080 8291 14153
2020-01-09 07:49:18
110.49.71.247 attack
Jan  8 22:48:36 lnxweb61 sshd[13528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.247
Jan  8 22:48:36 lnxweb61 sshd[13528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.247
Jan  8 22:48:38 lnxweb61 sshd[13528]: Failed password for invalid user soft from 110.49.71.247 port 53512 ssh2
2020-01-09 07:27:51
106.13.179.20 attackspam
2020-01-08T23:10:44.925480scmdmz1 sshd[26132]: Invalid user otx from 106.13.179.20 port 40942
2020-01-08T23:10:44.928423scmdmz1 sshd[26132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.179.20
2020-01-08T23:10:44.925480scmdmz1 sshd[26132]: Invalid user otx from 106.13.179.20 port 40942
2020-01-08T23:10:47.268514scmdmz1 sshd[26132]: Failed password for invalid user otx from 106.13.179.20 port 40942 ssh2
2020-01-08T23:12:52.579569scmdmz1 sshd[26361]: Invalid user ss from 106.13.179.20 port 60382
...
2020-01-09 07:35:33
1.174.168.171 attackspambots
1578517737 - 01/08/2020 22:08:57 Host: 1.174.168.171/1.174.168.171 Port: 445 TCP Blocked
2020-01-09 07:32:30
107.170.121.10 attack
Jan  9 00:11:42 MK-Soft-VM5 sshd[13277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.121.10 
Jan  9 00:11:44 MK-Soft-VM5 sshd[13277]: Failed password for invalid user jimmy from 107.170.121.10 port 47646 ssh2
...
2020-01-09 07:45:41
202.101.190.110 attackbotsspam
Unauthorized connection attempt detected from IP address 202.101.190.110 to port 8088 [T]
2020-01-09 07:29:35
222.186.30.76 attackspambots
08.01.2020 23:47:16 SSH access blocked by firewall
2020-01-09 07:48:30

最近上报的IP列表

59.161.167.219 60.57.154.91 182.218.185.229 129.69.233.143
100.205.65.251 34.51.96.14 127.121.131.125 219.121.78.103
162.231.25.254 127.244.251.79 195.15.69.5 206.53.136.151
184.206.23.193 221.200.60.52 132.170.239.112 6.34.48.80
114.19.38.226 239.87.251.36 59.160.71.252 86.63.138.239