必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Kyrgyzstan

运营商(isp): OJSC Kyrgyztelecom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
proto=tcp  .  spt=37619  .  dpt=25  .     (listed on Blocklist de  Jul 23)     (1026)
2019-07-24 09:22:43
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.145.149.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30254
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.145.149.226.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 10 15:35:23 CST 2019
;; MSG SIZE  rcvd: 119

HOST信息:
226.149.145.213.in-addr.arpa domain name pointer 213-145-149-226.static.ktnet.kg.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
226.149.145.213.in-addr.arpa	name = 213-145-149-226.static.ktnet.kg.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.88.196.135 attackspam
SSH/22 MH Probe, BF, Hack -
2019-12-26 06:02:10
89.252.131.23 attackbots
Dec 25 19:56:32 DAAP sshd[26903]: Invalid user vanessa from 89.252.131.23 port 39552
Dec 25 19:56:32 DAAP sshd[26903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.252.131.23
Dec 25 19:56:32 DAAP sshd[26903]: Invalid user vanessa from 89.252.131.23 port 39552
Dec 25 19:56:34 DAAP sshd[26903]: Failed password for invalid user vanessa from 89.252.131.23 port 39552 ssh2
Dec 25 19:59:59 DAAP sshd[26940]: Invalid user soifer from 89.252.131.23 port 33588
...
2019-12-26 05:53:53
117.5.241.203 attack
Dec 25 15:46:50 grey postfix/smtpd\[32109\]: NOQUEUE: reject: RCPT from unknown\[117.5.241.203\]: 554 5.7.1 Service unavailable\; Client host \[117.5.241.203\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?117.5.241.203\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-26 06:15:33
91.120.101.226 attackspam
SSH/22 MH Probe, BF, Hack -
2019-12-26 05:40:16
77.60.37.105 attackspambots
Dec 25 15:50:55 zeus sshd[21087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.60.37.105 
Dec 25 15:50:57 zeus sshd[21087]: Failed password for invalid user arjunasa from 77.60.37.105 port 57545 ssh2
Dec 25 15:54:14 zeus sshd[21176]: Failed password for root from 77.60.37.105 port 56299 ssh2
Dec 25 15:57:18 zeus sshd[21283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.60.37.105
2019-12-26 06:16:04
91.59.153.193 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 05:57:55
123.16.157.66 attackbotsspam
Dec 25 15:35:29 mxgate1 postfix/postscreen[3991]: CONNECT from [123.16.157.66]:50008 to [176.31.12.44]:25
Dec 25 15:35:29 mxgate1 postfix/dnsblog[3995]: addr 123.16.157.66 listed by domain zen.spamhaus.org as 127.0.0.11
Dec 25 15:35:29 mxgate1 postfix/dnsblog[3995]: addr 123.16.157.66 listed by domain zen.spamhaus.org as 127.0.0.4
Dec 25 15:35:29 mxgate1 postfix/dnsblog[3995]: addr 123.16.157.66 listed by domain zen.spamhaus.org as 127.0.0.3
Dec 25 15:35:29 mxgate1 postfix/dnsblog[3996]: addr 123.16.157.66 listed by domain cbl.abuseat.org as 127.0.0.2
Dec 25 15:35:30 mxgate1 postfix/dnsblog[3994]: addr 123.16.157.66 listed by domain bl.spamcop.net as 127.0.0.2
Dec 25 15:35:30 mxgate1 postfix/dnsblog[3993]: addr 123.16.157.66 listed by domain b.barracudacentral.org as 127.0.0.2
Dec 25 15:35:35 mxgate1 postfix/postscreen[3991]: DNSBL rank 5 for [123.16.157.66]:50008
Dec 25 15:35:35 mxgate1 postfix/tlsproxy[3997]: CONNECT from [123.16.157.66]:50008
Dec x@x


........
---------------------------------------------
2019-12-26 06:08:02
103.143.173.25 attack
LAMP,DEF GET /site/wp-login.php
2019-12-26 05:49:10
188.162.43.14 attackspambots
Brute force attempt
2019-12-26 06:13:16
89.154.4.249 attack
SSH Login Bruteforce
2019-12-26 05:59:56
202.131.126.142 attackbotsspam
Dec 25 21:09:08 XXX sshd[60074]: Invalid user lz from 202.131.126.142 port 33442
2019-12-26 06:04:50
89.184.82.35 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 06:00:17
81.92.149.60 attackbotsspam
Invalid user uucp from 81.92.149.60 port 36523
2019-12-26 06:09:22
101.132.131.185 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 05:50:37
62.182.124.202 attackbotsspam
HTTP/80/443 Probe, BF, WP, Hack -
2019-12-26 06:11:12

最近上报的IP列表

216.163.170.61 204.42.253.139 230.4.213.205 207.23.77.100
203.124.42.222 202.239.38.215 44.105.124.127 34.246.136.136
172.170.122.202 242.17.120.128 68.183.191.218 201.149.59.134
125.123.142.77 45.221.79.134 112.149.1.106 45.229.50.244
51.38.34.203 40.14.135.157 37.131.196.63 52.19.3.62