必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.45.144.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28107
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;205.45.144.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 20:25:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.144.45.205.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.144.45.205.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
207.154.227.200 attack
Jul 29 03:43:19 MK-Soft-Root1 sshd\[24911\]: Invalid user 123server123 from 207.154.227.200 port 46368
Jul 29 03:43:19 MK-Soft-Root1 sshd\[24911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.227.200
Jul 29 03:43:20 MK-Soft-Root1 sshd\[24911\]: Failed password for invalid user 123server123 from 207.154.227.200 port 46368 ssh2
...
2019-07-29 10:06:23
138.97.224.220 attackspam
SMTP-sasl brute force
...
2019-07-29 09:36:48
89.36.220.145 attackbotsspam
Jul 29 00:18:25 ns341937 sshd[27115]: Failed password for root from 89.36.220.145 port 57298 ssh2
Jul 29 00:31:38 ns341937 sshd[29821]: Failed password for root from 89.36.220.145 port 36533 ssh2
...
2019-07-29 10:14:45
50.239.140.1 attackspambots
Jul 29 02:50:57 ovpn sshd\[27026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1  user=root
Jul 29 02:50:59 ovpn sshd\[27026\]: Failed password for root from 50.239.140.1 port 46632 ssh2
Jul 29 03:16:03 ovpn sshd\[31527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1  user=root
Jul 29 03:16:05 ovpn sshd\[31527\]: Failed password for root from 50.239.140.1 port 40570 ssh2
Jul 29 03:20:14 ovpn sshd\[32298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1  user=root
2019-07-29 09:46:30
193.213.152.118 attackbots
Invalid user com from 193.213.152.118 port 54820
2019-07-29 09:23:14
77.40.62.86 attackspam
2019-07-29T01:41:16.119349MailD postfix/smtpd[11637]: warning: unknown[77.40.62.86]: SASL LOGIN authentication failed: authentication failure
2019-07-29T02:50:29.966085MailD postfix/smtpd[16630]: warning: unknown[77.40.62.86]: SASL LOGIN authentication failed: authentication failure
2019-07-29T03:31:54.836162MailD postfix/smtpd[19174]: warning: unknown[77.40.62.86]: SASL LOGIN authentication failed: authentication failure
2019-07-29 09:55:00
179.7.192.221 attackbots
postfix-gen jail [ma]
2019-07-29 09:24:59
62.193.130.43 attackspambots
Jul 27 04:49:53 web1 sshd[16252]: Address 62.193.130.43 maps to nxxxxxxx1018.ztomy.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 27 04:49:53 web1 sshd[16252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.193.130.43  user=r.r
Jul 27 04:49:55 web1 sshd[16252]: Failed password for r.r from 62.193.130.43 port 50616 ssh2
Jul 27 04:49:55 web1 sshd[16252]: Received disconnect from 62.193.130.43: 11: Bye Bye [preauth]
Jul 27 05:39:28 web1 sshd[20158]: Address 62.193.130.43 maps to nxxxxxxx1018.ztomy.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 27 05:39:28 web1 sshd[20158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.193.130.43  user=r.r
Jul 27 05:39:30 web1 sshd[20158]: Failed password for r.r from 62.193.130.43 port 44533 ssh2
Jul 27 05:39:31 web1 sshd[20158]: Received disconnect from 62.193.130.43: 11: Bye Bye [preau........
-------------------------------
2019-07-29 10:02:24
54.37.46.151 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-29 10:04:44
112.85.42.195 attackbots
2019-07-29T01:32:08.160164abusebot-3.cloudsearch.cf sshd\[18401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
2019-07-29 09:35:21
202.148.4.100 attackspam
Caught in portsentry honeypot
2019-07-29 09:34:28
171.221.205.133 attackspam
Jul 26 22:25:56 ACSRAD auth.info sshd[28563]: Failed password for r.r from 171.221.205.133 port 27029 ssh2
Jul 26 22:25:57 ACSRAD auth.info sshd[28563]: Received disconnect from 171.221.205.133 port 27029:11: Bye Bye [preauth]
Jul 26 22:25:57 ACSRAD auth.info sshd[28563]: Disconnected from 171.221.205.133 port 27029 [preauth]
Jul 26 22:25:57 ACSRAD auth.notice sshguard[18224]: Attack from "171.221.205.133" on service 100 whostnameh danger 10.
Jul 26 22:25:57 ACSRAD auth.notice sshguard[18224]: Attack from "171.221.205.133" on service 100 whostnameh danger 10.
Jul 26 22:30:09 ACSRAD auth.info sshd[30873]: Failed password for r.r from 171.221.205.133 port 21715 ssh2
Jul 26 22:30:09 ACSRAD auth.notice sshguard[18224]: Attack from "171.221.205.133" on service 100 whostnameh danger 10.
Jul 26 22:30:09 ACSRAD auth.warn sshguard[18224]: Blocking "171.221.205.133/32" forever (3 attacks in 252 secs, after 2 abuses over 771 secs.)
Jul 26 22:30:09 ACSRAD auth.info sshd[30873]: Rece........
------------------------------
2019-07-29 09:26:17
45.4.254.86 attackbots
Jul 29 06:54:25 our-server-hostname postfix/smtpd[22576]: connect from unknown[45.4.254.86]
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul 29 06:54:36 our-server-hostname postfix/smtpd[22576]: lost connection after RCPT from unknown[45.4.254.86]
Jul 29 06:54:36 our-server-hostname postfix/smtpd[22576]: disconnect from unknown[45.4.254.86]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.4.254.86
2019-07-29 09:44:47
95.111.59.210 attack
Jul 27 04:39:06 pl3server sshd[2555911]: Bad protocol version identification '' from 95.111.59.210 port 41134
Jul 27 04:39:12 pl3server sshd[2555912]: reveeclipse mapping checking getaddrinfo for ip-95-111-59-210.home.megalan.bg [95.111.59.210] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 27 04:39:12 pl3server sshd[2555912]: Invalid user nexthink from 95.111.59.210
Jul 27 04:39:12 pl3server sshd[2555912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.59.210


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=95.111.59.210
2019-07-29 09:28:10
206.189.165.94 attackbotsspam
Jul 28 23:56:18 mail sshd\[23958\]: Failed password for root from 206.189.165.94 port 49006 ssh2
Jul 29 00:12:59 mail sshd\[24321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.94  user=root
...
2019-07-29 09:54:14

最近上报的IP列表

48.20.171.62 161.180.215.105 212.197.17.76 149.31.106.2
195.115.162.109 196.63.123.52 201.18.131.41 212.166.69.184
109.131.106.13 204.157.94.131 208.36.81.38 242.7.229.11
217.33.141.187 5.233.103.128 193.24.164.177 155.88.121.184
189.168.191.59 98.196.180.90 237.200.253.62 28.172.231.130