必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.245.36.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.245.36.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 02:05:57 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 149.36.245.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.36.245.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.97.213.249 attackbots
2019-06-23T12:10:19.888439hub.schaetter.us sshd\[14309\]: Invalid user admin from 118.97.213.249
2019-06-23T12:10:19.928102hub.schaetter.us sshd\[14309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.213.249
2019-06-23T12:10:21.837009hub.schaetter.us sshd\[14309\]: Failed password for invalid user admin from 118.97.213.249 port 42722 ssh2
2019-06-23T12:15:57.543623hub.schaetter.us sshd\[14330\]: Invalid user caleb from 118.97.213.249
2019-06-23T12:15:57.576638hub.schaetter.us sshd\[14330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.213.249
...
2019-06-23 21:01:02
115.178.119.110 attack
445/tcp 445/tcp 445/tcp...
[2019-05-23/06-23]7pkt,1pt.(tcp)
2019-06-23 21:46:40
35.233.219.114 attack
RDP Brute-Force (Grieskirchen RZ1)
2019-06-23 21:37:58
115.146.126.168 attackbots
Jun 23 14:40:06 yabzik sshd[8581]: Failed password for root from 115.146.126.168 port 55852 ssh2
Jun 23 14:40:08 yabzik sshd[8581]: Failed password for root from 115.146.126.168 port 55852 ssh2
Jun 23 14:40:11 yabzik sshd[8581]: Failed password for root from 115.146.126.168 port 55852 ssh2
Jun 23 14:40:13 yabzik sshd[8581]: Failed password for root from 115.146.126.168 port 55852 ssh2
2019-06-23 21:53:45
162.243.144.145 attack
¯\_(ツ)_/¯
2019-06-23 21:52:58
179.108.106.81 attackbotsspam
Jun 23 11:52:31 raspberrypi sshd\[7773\]: Invalid user ts3server from 179.108.106.81 port 48006
Jun 23 11:52:31 raspberrypi sshd\[7773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.106.81
Jun 23 11:52:33 raspberrypi sshd\[7773\]: Failed password for invalid user ts3server from 179.108.106.81 port 48006 ssh2
Jun 23 11:58:38 raspberrypi sshd\[7785\]: Invalid user postgres from 179.108.106.81 port 52756
Jun 23 11:58:39 raspberrypi sshd\[7785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.106.81
...
2019-06-23 21:20:38
104.244.76.13 attackbots
Automatic report - Web App Attack
2019-06-23 21:06:35
190.1.203.180 attack
Automatic report - Web App Attack
2019-06-23 21:28:22
123.30.168.119 attackspambots
Jun 22 04:53:04 finn sshd[22596]: Invalid user admin from 123.30.168.119 port 40804
Jun 22 04:53:04 finn sshd[22596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.168.119 
Jun 22 04:53:05 finn sshd[22596]: Failed password for invalid user admin from 123.30.168.119 port 40804 ssh2
Jun 22 04:53:08 finn sshd[22596]: Failed password for invalid user admin from 123.30.168.119 port 40804 ssh2
Jun 22 04:53:10 finn sshd[22596]: Failed password for invalid user admin from 123.30.168.119 port 40804 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.30.168.119
2019-06-23 20:51:08
78.107.239.234 attackbots
category: Fake ED Pharmacy (Viagra & Cialis)
owner: "Yambo Financials"
recent IP address:
  * Use one of the following IP addresses and change frequently.
 13) 38.135.122.164 _ USA         _ Foxcloud Llp / Psinet, Inc
 12) 80.233.134.142 _ Latvia      _ Telia Latvija SIA
 11) 185.225.16.xxx _ Romania     _ MivoCloud Solutions SRL
 10) 94.176.188.242 _ Lithuania   _ Uab Esnet
  9) 95.216.17.21   _ Finland     _ Hetzner Online Ag
  8) 95.110.232.65  _ Italy       _ Aruba S.p.a
  7) 185.128.43.19  _ Swiss       _ Grupo Panaglobal 15 S.a
  6) 185.38.15.114  _ Netherlands _ YISP B.V
  5) 185.36.81.231  _ Lithuania   _ UAB Host Baltic
  4) 185.24.232.154 _ Ireland     _ Servebyte Dedicated Servers
  3) 212.34.158.133 _ Spain       _ RAN Networks S.L.
  2) 78.107.239.234 _ Russia      _ Corbina Telecom
  1) 95.31.22.193   _ Russia      _ Corbina Telecom
recent domain:
  2019/06/23 smartherbstore.su
  2019/06/23 healingherbsmart.ru
  2019/06/21 fastnaturaleshop.ru
   :
   :
2019-06-23 21:18:03
177.8.255.160 attackspam
SMTP-sasl brute force
...
2019-06-23 20:55:20
139.59.74.143 attackspam
Jun 23 14:04:05 rpi sshd\[14001\]: Invalid user glassfish from 139.59.74.143 port 55186
Jun 23 14:04:05 rpi sshd\[14001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.74.143
Jun 23 14:04:06 rpi sshd\[14001\]: Failed password for invalid user glassfish from 139.59.74.143 port 55186 ssh2
2019-06-23 21:25:46
45.125.65.91 attackbots
Jun 23 12:20:41  postfix/smtpd: warning: unknown[45.125.65.91]: SASL LOGIN authentication failed
2019-06-23 21:09:20
193.188.22.56 attackbotsspam
Port Scan 3389
2019-06-23 21:13:11
114.221.102.212 attack
Jun 23 11:59:07 mail kernel: \[329492.723946\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=114.221.102.212 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=5457 DF PROTO=TCP SPT=62696 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Jun 23 11:59:10 mail kernel: \[329495.778483\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=114.221.102.212 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=17673 DF PROTO=TCP SPT=62696 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Jun 23 11:59:16 mail kernel: \[329501.778308\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=114.221.102.212 DST=91.205.173.180 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=28442 DF PROTO=TCP SPT=62696 DPT=65530 WINDOW=65535 RES=0x00 SYN URGP=0
2019-06-23 21:06:05

最近上报的IP列表

243.171.161.194 230.6.15.171 108.151.53.34 119.127.4.198
7.203.158.163 251.149.112.138 131.32.8.45 123.65.208.18
236.205.125.221 73.94.215.216 202.169.33.97 33.89.160.116
44.226.75.124 122.200.118.97 91.127.222.226 35.1.237.85
252.100.93.64 153.63.211.67 201.217.172.132 217.151.205.208