必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.117.145.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33849
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.117.145.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:20:38 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
106.145.117.2.in-addr.arpa domain name pointer host-2-117-145-106.business.telecomitalia.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.145.117.2.in-addr.arpa	name = host-2-117-145-106.business.telecomitalia.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.54.124.250 attackbotsspam
Unauthorized connection attempt detected from IP address 106.54.124.250 to port 2220 [J]
2020-01-14 02:52:44
202.166.164.126 attackspam
Honeypot attack, port: 445, PTR: 202-166-164-126.connectel.com.pk.
2020-01-14 02:47:26
220.135.209.78 attack
Honeypot attack, port: 81, PTR: 220-135-209-78.HINET-IP.hinet.net.
2020-01-14 02:45:24
114.119.139.225 attack
badbot
2020-01-14 02:43:49
114.119.149.0 attackbotsspam
badbot
2020-01-14 02:38:38
178.128.247.219 attack
Unauthorized connection attempt detected from IP address 178.128.247.219 to port 2220 [J]
2020-01-14 02:23:13
114.119.132.161 attack
badbot
2020-01-14 02:41:19
218.146.168.239 attackbots
Jan 13 19:05:10 MK-Soft-VM8 sshd[2685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.146.168.239 
Jan 13 19:05:12 MK-Soft-VM8 sshd[2685]: Failed password for invalid user cron from 218.146.168.239 port 56512 ssh2
...
2020-01-14 02:33:03
18.162.225.45 attackspambots
Unauthorized connection attempt detected from IP address 18.162.225.45 to port 2220 [J]
2020-01-14 02:39:44
62.31.126.210 attack
Honeypot attack, port: 5555, PTR: 210.126-31-62.static.virginmediabusiness.co.uk.
2020-01-14 02:46:26
70.37.49.155 attackspambots
Unauthorized connection attempt detected from IP address 70.37.49.155 to port 2220 [J]
2020-01-14 02:24:00
173.219.87.131 attack
Unauthorized connection attempt detected from IP address 173.219.87.131 to port 2220 [J]
2020-01-14 02:28:26
43.241.59.26 attackbots
Attempted WordPress login: "GET /wp-login.php"
2020-01-14 02:39:15
125.161.130.7 attack
Honeypot attack, port: 81, PTR: 7.subnet125-161-130.speedy.telkom.net.id.
2020-01-14 02:22:02
41.77.146.98 attackbotsspam
Invalid user bbb from 41.77.146.98 port 46312
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98
Failed password for invalid user bbb from 41.77.146.98 port 46312 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98  user=root
Failed password for root from 41.77.146.98 port 49438 ssh2
2020-01-14 02:46:57

最近上报的IP列表

62.112.149.196 42.12.108.31 164.120.189.134 66.108.60.47
100.46.229.66 81.57.137.88 122.92.201.14 56.118.56.39
23.175.220.246 21.193.231.137 172.131.141.57 187.243.32.196
137.245.193.112 19.254.51.152 72.38.161.122 79.223.7.191
201.245.129.46 178.249.200.33 60.112.159.128 70.204.33.204