必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.131.197.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56889
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.131.197.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:44:56 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
45.197.131.203.in-addr.arpa domain name pointer 5a-q03-d3.data-hotel.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.197.131.203.in-addr.arpa	name = 5a-q03-d3.data-hotel.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.49.117.166 attackspam
F2B jail: sshd. Time: 2019-11-07 23:44:51, Reported by: VKReport
2019-11-08 06:54:20
46.38.144.146 attackspambots
2019-11-08T00:20:54.303676mail01 postfix/smtpd[30213]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08T00:21:00.418572mail01 postfix/smtpd[5903]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08T00:21:06.317997mail01 postfix/smtpd[11854]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08 07:27:18
45.117.53.141 attack
Nov  7 23:35:00 mxgate1 postfix/postscreen[18656]: CONNECT from [45.117.53.141]:46469 to [176.31.12.44]:25
Nov  7 23:35:00 mxgate1 postfix/dnsblog[18659]: addr 45.117.53.141 listed by domain zen.spamhaus.org as 127.0.0.3
Nov  7 23:35:00 mxgate1 postfix/dnsblog[18659]: addr 45.117.53.141 listed by domain zen.spamhaus.org as 127.0.0.2
Nov  7 23:35:00 mxgate1 postfix/dnsblog[18659]: addr 45.117.53.141 listed by domain zen.spamhaus.org as 127.0.0.9
Nov  7 23:35:06 mxgate1 postfix/postscreen[18656]: DNSBL rank 2 for [45.117.53.141]:46469
Nov x@x
Nov  7 23:35:06 mxgate1 postfix/postscreen[18656]: DISCONNECT [45.117.53.141]:46469


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.117.53.141
2019-11-08 07:23:46
78.128.113.121 attackspambots
2019-11-07T23:39:15.851280MailD postfix/smtpd[20164]: warning: unknown[78.128.113.121]: SASL PLAIN authentication failed: authentication failure
2019-11-07T23:39:17.104319MailD postfix/smtpd[20164]: warning: unknown[78.128.113.121]: SASL PLAIN authentication failed: authentication failure
2019-11-08T00:18:14.096540MailD postfix/smtpd[22800]: warning: unknown[78.128.113.121]: SASL PLAIN authentication failed: authentication failure
2019-11-08 07:24:33
222.186.173.142 attackbots
Nov  7 17:56:15 TORMINT sshd\[28841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Nov  7 17:56:17 TORMINT sshd\[28841\]: Failed password for root from 222.186.173.142 port 38746 ssh2
Nov  7 17:56:22 TORMINT sshd\[28841\]: Failed password for root from 222.186.173.142 port 38746 ssh2
...
2019-11-08 06:58:13
83.15.183.137 attackbotsspam
Nov  7 17:59:30 plusreed sshd[21361]: Invalid user doker from 83.15.183.137
...
2019-11-08 07:19:13
202.5.17.107 attackbots
Nov  7 12:36:32 eddieflores sshd\[416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.5.17.107  user=root
Nov  7 12:36:34 eddieflores sshd\[416\]: Failed password for root from 202.5.17.107 port 42018 ssh2
Nov  7 12:40:11 eddieflores sshd\[826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.5.17.107  user=root
Nov  7 12:40:13 eddieflores sshd\[826\]: Failed password for root from 202.5.17.107 port 27371 ssh2
Nov  7 12:43:47 eddieflores sshd\[1142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.5.17.107  user=root
2019-11-08 07:11:58
197.155.111.134 attackbots
2019-11-07T23:43:30.103037stark.klein-stark.info sshd\[16207\]: Invalid user pi from 197.155.111.134 port 33038
2019-11-07T23:43:30.103038stark.klein-stark.info sshd\[16205\]: Invalid user pi from 197.155.111.134 port 33024
2019-11-07T23:43:30.373874stark.klein-stark.info sshd\[16205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.111.134
2019-11-07T23:43:30.376712stark.klein-stark.info sshd\[16207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.111.134
...
2019-11-08 07:28:03
195.76.107.105 attackspambots
Received: from mx12.diba.cat (mx12.diba.cat [195.76.107.105])
	by m0116956.mta.everyone.net (EON-INBOUND) with ESMTP id m0116956.5dc217d3.1de73c
	for <@antihotmail.com>; Thu, 7 Nov 2019 14:33:27 -0800
2019-11-08 07:27:45
222.186.175.154 attackbots
Nov  7 12:54:12 auw2 sshd\[16541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Nov  7 12:54:14 auw2 sshd\[16541\]: Failed password for root from 222.186.175.154 port 23406 ssh2
Nov  7 12:54:38 auw2 sshd\[16587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Nov  7 12:54:40 auw2 sshd\[16587\]: Failed password for root from 222.186.175.154 port 10840 ssh2
Nov  7 12:54:52 auw2 sshd\[16587\]: Failed password for root from 222.186.175.154 port 10840 ssh2
2019-11-08 06:57:05
13.77.142.89 attack
Nov  7 23:51:18 master sshd[9240]: Failed password for root from 13.77.142.89 port 45430 ssh2
Nov  8 00:14:36 master sshd[9546]: Failed password for invalid user instrume from 13.77.142.89 port 50012 ssh2
Nov  8 00:18:02 master sshd[9560]: Failed password for invalid user n from 13.77.142.89 port 60990 ssh2
Nov  8 00:21:57 master sshd[9562]: Failed password for root from 13.77.142.89 port 43900 ssh2
Nov  8 00:26:24 master sshd[9564]: Failed password for root from 13.77.142.89 port 55210 ssh2
Nov  8 00:33:20 master sshd[9872]: Failed password for root from 13.77.142.89 port 39198 ssh2
Nov  8 00:37:21 master sshd[9876]: Failed password for root from 13.77.142.89 port 50362 ssh2
Nov  8 00:41:25 master sshd[9884]: Failed password for root from 13.77.142.89 port 33312 ssh2
Nov  8 00:45:33 master sshd[9901]: Failed password for root from 13.77.142.89 port 44500 ssh2
2019-11-08 06:51:34
62.234.23.78 attack
SSH Brute Force, server-1 sshd[29937]: Failed password for invalid user temp from 62.234.23.78 port 29916 ssh2
2019-11-08 07:10:59
188.143.124.213 attackbots
Automatic report - Port Scan Attack
2019-11-08 06:52:07
106.51.80.198 attackspambots
Nov  7 12:51:46 wbs sshd\[5799\]: Invalid user anakunyada from 106.51.80.198
Nov  7 12:51:46 wbs sshd\[5799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198
Nov  7 12:51:48 wbs sshd\[5799\]: Failed password for invalid user anakunyada from 106.51.80.198 port 42162 ssh2
Nov  7 12:55:42 wbs sshd\[6118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198  user=root
Nov  7 12:55:44 wbs sshd\[6118\]: Failed password for root from 106.51.80.198 port 50440 ssh2
2019-11-08 07:04:50
222.186.169.194 attack
Nov  7 23:57:03 mail sshd[15066]: Failed password for root from 222.186.169.194 port 41780 ssh2
Nov  7 23:57:07 mail sshd[15066]: Failed password for root from 222.186.169.194 port 41780 ssh2
Nov  7 23:57:11 mail sshd[15066]: Failed password for root from 222.186.169.194 port 41780 ssh2
Nov  7 23:57:15 mail sshd[15066]: Failed password for root from 222.186.169.194 port 41780 ssh2
2019-11-08 06:58:42

最近上报的IP列表

248.180.142.14 224.70.209.30 191.10.25.243 49.247.43.34
159.69.248.61 70.199.7.58 57.203.184.5 147.221.127.51
62.8.228.190 181.77.27.201 19.54.77.97 147.33.199.200
123.113.134.86 214.32.115.129 152.124.209.104 182.143.246.210
156.1.159.61 22.98.226.104 14.46.56.198 231.116.141.177