必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.11.4-P2-RedHat-9.11.4-9.P2.el7 <<>> 194.94.145.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54429
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.94.145.154.			IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112000 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 100.100.2.136#53(100.100.2.136)
;; WHEN: Wed Nov 20 19:19:00 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 154.145.94.194.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 154.145.94.194.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.139.132.78 attackspam
Automatic report - SSH Brute-Force Attack
2020-02-16 10:40:02
45.234.220.2 attack
Automatic report - Port Scan Attack
2020-02-16 13:03:39
194.26.29.129 attackbotsspam
Feb 16 00:40:48 h2177944 kernel: \[5007980.775000\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=10502 PROTO=TCP SPT=50000 DPT=3372 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 16 00:40:48 h2177944 kernel: \[5007980.775014\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=10502 PROTO=TCP SPT=50000 DPT=3372 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 16 01:17:10 h2177944 kernel: \[5010162.792091\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=56121 PROTO=TCP SPT=50000 DPT=3341 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 16 01:35:23 h2177944 kernel: \[5011256.010108\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=49677 PROTO=TCP SPT=50000 DPT=3392 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 16 01:35:23 h2177944 kernel: \[5011256.010123\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.129 DST=85.214.117.9
2020-02-16 10:39:34
45.55.86.19 attackspam
Feb 16 01:32:50 legacy sshd[28842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.86.19
Feb 16 01:32:52 legacy sshd[28842]: Failed password for invalid user q1w2e3r4 from 45.55.86.19 port 60617 ssh2
Feb 16 01:35:53 legacy sshd[29019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.86.19
...
2020-02-16 10:24:05
176.126.185.199 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 13:05:10
116.193.68.198 attackspambots
1581804963 - 02/15/2020 23:16:03 Host: 116.193.68.198/116.193.68.198 Port: 445 TCP Blocked
2020-02-16 10:29:21
89.210.62.202 attackspambots
Port probing on unauthorized port 23
2020-02-16 10:25:17
218.92.0.184 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-02-16 13:06:42
143.202.117.18 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 10:27:36
143.202.115.169 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 10:50:11
190.79.197.252 attack
Unauthorized connection attempt from IP address 190.79.197.252 on Port 445(SMB)
2020-02-16 10:17:05
196.52.43.59 attackbotsspam
Unauthorised access (Feb 16) SRC=196.52.43.59 LEN=44 TTL=248 ID=587 TCP DPT=3389 WINDOW=1024 SYN
2020-02-16 10:31:18
111.206.52.81 attackbotsspam
Excessive Port-Scanning
2020-02-16 13:06:06
116.31.124.117 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-02-16 10:41:41
132.232.63.71 attack
Wordpress XMLRPC attack
2020-02-16 10:36:18

最近上报的IP列表

130.105.43.98 61.188.18.251 1.192.177.12 37.8.26.207
218.95.121.177 78.155.60.211 76.127.95.130 27.24.21.11
183.80.202.47 182.101.38.38 154.85.34.155 106.201.95.228
123.134.159.186 176.18.173.131 113.237.100.164 106.56.90.99
125.107.15.205 190.16.163.153 36.47.163.119 182.247.60.171