必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Spain

运营商(isp): Vodafone Espana S.A.U.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attack
Invalid user odroid from 212.145.231.149 port 59137
2019-10-27 03:03:10
attackbots
Oct 24 12:44:04 XXX sshd[31373]: Invalid user user from 212.145.231.149 port 38259
2019-10-24 21:09:10
attack
$f2bV_matches
2019-10-24 05:07:31
attackbots
0""0
2019-10-24 04:05:00
attackbots
Invalid user admin from 212.145.231.149 port 35070
2019-10-17 01:34:42
attackspam
Invalid user pi from 212.145.231.149 port 53377
2019-10-12 09:29:22
attackspam
$f2bV_matches
2019-10-11 22:48:46
attackspambots
Invalid user temp from 212.145.231.149 port 40506
2019-10-10 21:02:57
attack
Oct  6 13:14:38 [host] sshd[21444]: Invalid user wubao from 212.145.231.149
Oct  6 13:14:38 [host] sshd[21444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.231.149
Oct  6 13:14:40 [host] sshd[21444]: Failed password for invalid user wubao from 212.145.231.149 port 41919 ssh2
2019-10-06 19:42:01
attackspambots
Oct  5 04:06:50 thevastnessof sshd[32725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.231.149
...
2019-10-05 12:12:59
attackbots
SSH invalid-user multiple login try
2019-10-04 21:30:54
attackspam
Oct  3 06:47:19 MK-Soft-VM6 sshd[31921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.145.231.149 
Oct  3 06:47:21 MK-Soft-VM6 sshd[31921]: Failed password for invalid user tech from 212.145.231.149 port 50601 ssh2
...
2019-10-03 13:15:20
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.145.231.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1944
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.145.231.149.		IN	A

;; AUTHORITY SECTION:
.			191	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100203 1800 900 604800 86400

;; Query time: 504 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 03 13:15:17 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
149.231.145.212.in-addr.arpa domain name pointer pooladsl-b-8-149.ipcom.comunitel.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.231.145.212.in-addr.arpa	name = pooladsl-b-8-149.ipcom.comunitel.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.59.247.114 attackbots
Jan  1 19:30:34 woltan sshd[10244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.247.114
2020-01-02 04:59:02
193.188.22.188 attack
Invalid user admin from 193.188.22.188 port 28370
2020-01-02 04:57:16
183.83.74.213 attackspambots
1577889796 - 01/01/2020 15:43:16 Host: 183.83.74.213/183.83.74.213 Port: 445 TCP Blocked
2020-01-02 05:23:16
182.61.15.251 attack
Jan  1 14:43:50 zx01vmsma01 sshd[206143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.15.251
Jan  1 14:43:52 zx01vmsma01 sshd[206143]: Failed password for invalid user stanley from 182.61.15.251 port 57360 ssh2
...
2020-01-02 05:06:25
148.70.113.96 attackspambots
Jan  1 19:22:57 vpn01 sshd[31262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.113.96
Jan  1 19:23:00 vpn01 sshd[31262]: Failed password for invalid user !@#$%^&* from 148.70.113.96 port 57984 ssh2
...
2020-01-02 05:25:02
51.75.19.175 attackspambots
Invalid user ching from 51.75.19.175 port 40222
2020-01-02 05:13:42
80.82.64.127 attackbotsspam
01/01/2020-16:15:50.231564 80.82.64.127 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-02 05:20:13
177.139.245.92 attackbotsspam
3389BruteforceFW23
2020-01-02 04:44:44
68.183.191.149 attackspambots
Automatic report - XMLRPC Attack
2020-01-02 05:19:54
62.94.206.44 attackbots
$f2bV_matches
2020-01-02 04:58:22
159.89.16.121 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-02 05:15:49
165.227.189.234 attackspam
POST /wp-config.php.php
POST /wp-cron.php
POST /wp-guide.php
POST /wp-index.php
2020-01-02 05:09:51
222.186.31.144 attack
Unauthorized connection attempt detected from IP address 222.186.31.144 to port 22
2020-01-02 04:53:26
218.89.55.163 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-01-02 04:52:12
5.188.206.138 attack
RDP brute forcing (r)
2020-01-02 05:20:45

最近上报的IP列表

205.109.242.243 71.39.126.85 167.192.15.5 58.222.56.221
172.174.46.220 162.142.251.176 79.205.228.159 151.146.139.208
178.46.209.168 125.165.105.137 115.61.34.71 208.186.112.102
27.72.100.197 180.127.79.30 179.95.1.104 14.214.117.56
179.108.49.226 211.2.98.25 42.202.88.128 14.47.194.210