必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.229.82.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.229.82.45.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:46:42 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 45.82.229.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.82.229.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.219.112.48 attackbotsspam
Aug  9 23:27:01 vpn01 sshd[3575]: Failed password for root from 103.219.112.48 port 39362 ssh2
...
2020-08-10 05:41:40
177.23.227.136 attackbots
Dovecot Invalid User Login Attempt.
2020-08-10 05:49:49
41.65.68.227 attackspambots
*Port Scan* detected from 41.65.68.227 (EG/Egypt/Cairo/Cairo/HOST-227-68.65.41.nile-online.net). 4 hits in the last 235 seconds
2020-08-10 05:53:15
112.30.136.31 attack
Lines containing failures of 112.30.136.31
Aug  4 13:37:50 new sshd[27101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.136.31  user=r.r
Aug  4 13:37:52 new sshd[27101]: Failed password for r.r from 112.30.136.31 port 36992 ssh2
Aug  4 13:37:53 new sshd[27101]: Received disconnect from 112.30.136.31 port 36992:11: Bye Bye [preauth]
Aug  4 13:37:53 new sshd[27101]: Disconnected from authenticating user r.r 112.30.136.31 port 36992 [preauth]
Aug  4 13:59:00 new sshd[1229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.136.31  user=r.r
Aug  4 13:59:01 new sshd[1229]: Failed password for r.r from 112.30.136.31 port 39270 ssh2
Aug  4 13:59:02 new sshd[1229]: Received disconnect from 112.30.136.31 port 39270:11: Bye Bye [preauth]
Aug  4 13:59:02 new sshd[1229]: Disconnected from authenticating user r.r 112.30.136.31 port 39270 [preauth]
Aug  4 14:03:59 new sshd[2813]: pam_unix(s........
------------------------------
2020-08-10 05:32:30
116.99.11.85 attackspambots
dovecot email abuse
2020-08-10 05:30:58
212.83.181.201 attack
SIP Server BruteForce Attack
2020-08-10 05:30:40
218.92.0.133 attackbotsspam
Aug  9 23:22:12 server sshd[53648]: Failed none for root from 218.92.0.133 port 8208 ssh2
Aug  9 23:22:15 server sshd[53648]: Failed password for root from 218.92.0.133 port 8208 ssh2
Aug  9 23:22:20 server sshd[53648]: Failed password for root from 218.92.0.133 port 8208 ssh2
2020-08-10 05:23:32
188.165.42.223 attack
Aug  9 18:22:54 vps46666688 sshd[24698]: Failed password for root from 188.165.42.223 port 52062 ssh2
...
2020-08-10 05:43:28
177.1.214.84 attack
Aug  9 22:35:59 abendstille sshd\[32591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84  user=root
Aug  9 22:36:02 abendstille sshd\[32591\]: Failed password for root from 177.1.214.84 port 38934 ssh2
Aug  9 22:38:48 abendstille sshd\[3094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84  user=root
Aug  9 22:38:49 abendstille sshd\[3094\]: Failed password for root from 177.1.214.84 port 52022 ssh2
Aug  9 22:44:03 abendstille sshd\[8032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.214.84  user=root
...
2020-08-10 05:17:01
101.87.95.64 attack
Port probing on unauthorized port 1433
2020-08-10 05:45:05
213.59.135.87 attackspambots
Aug  9 22:16:10 Ubuntu-1404-trusty-64-minimal sshd\[8830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.135.87  user=root
Aug  9 22:16:12 Ubuntu-1404-trusty-64-minimal sshd\[8830\]: Failed password for root from 213.59.135.87 port 54751 ssh2
Aug  9 22:23:52 Ubuntu-1404-trusty-64-minimal sshd\[13695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.135.87  user=root
Aug  9 22:23:54 Ubuntu-1404-trusty-64-minimal sshd\[13695\]: Failed password for root from 213.59.135.87 port 52475 ssh2
Aug  9 22:27:28 Ubuntu-1404-trusty-64-minimal sshd\[15321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.59.135.87  user=root
2020-08-10 05:41:02
103.92.31.32 attackbots
SSH brutforce
2020-08-10 05:22:10
64.31.14.194 attackbotsspam
SIPVicious Scanner Detection
2020-08-10 05:49:25
175.139.3.41 attackspambots
Aug  9 21:35:38 ajax sshd[19223]: Failed password for root from 175.139.3.41 port 29734 ssh2
2020-08-10 05:43:52
46.26.133.184 attackspambots
20 attempts against mh-ssh on sonic
2020-08-10 05:23:09

最近上报的IP列表

30.246.216.246 122.86.10.253 230.15.129.149 72.44.188.165
53.103.203.69 229.139.35.154 67.151.208.72 163.172.107.70
142.227.89.112 44.8.205.25 217.110.18.125 247.105.191.75
65.114.3.98 228.233.86.75 127.113.105.67 166.172.177.109
131.48.75.1 253.196.117.54 65.108.47.245 214.145.245.18