必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.224.145.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.224.145.52.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:27:46 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 52.145.224.219.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.145.224.219.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.68.200.101 attackbotsspam
(sshd) Failed SSH login from 50.68.200.101 (CA/Canada/S0106c04a00f33a35.vn.shawcable.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 26 20:20:23 amsweb01 sshd[19956]: Invalid user kanishk from 50.68.200.101 port 44616
Jul 26 20:20:25 amsweb01 sshd[19956]: Failed password for invalid user kanishk from 50.68.200.101 port 44616 ssh2
Jul 26 20:27:25 amsweb01 sshd[21038]: Invalid user ap from 50.68.200.101 port 40658
Jul 26 20:27:27 amsweb01 sshd[21038]: Failed password for invalid user ap from 50.68.200.101 port 40658 ssh2
Jul 26 20:33:43 amsweb01 sshd[22040]: Invalid user fa from 50.68.200.101 port 54030
2020-07-27 02:42:38
111.21.99.227 attack
Jul 26 19:24:25 sip sshd[1088208]: Invalid user steph from 111.21.99.227 port 58342
Jul 26 19:24:27 sip sshd[1088208]: Failed password for invalid user steph from 111.21.99.227 port 58342 ssh2
Jul 26 19:28:42 sip sshd[1088224]: Invalid user minecraft from 111.21.99.227 port 54184
...
2020-07-27 02:17:28
128.106.248.162 attackspam
SSH/22 MH Probe, BF, Hack -
2020-07-27 02:23:32
66.68.201.200 attackspam
SSH/22 MH Probe, BF, Hack -
2020-07-27 02:03:45
49.88.112.76 attackbots
Jul 26 14:58:49 dns1 sshd[580]: Failed password for root from 49.88.112.76 port 52580 ssh2
Jul 26 14:58:54 dns1 sshd[580]: Failed password for root from 49.88.112.76 port 52580 ssh2
Jul 26 14:58:57 dns1 sshd[580]: Failed password for root from 49.88.112.76 port 52580 ssh2
2020-07-27 02:22:13
112.85.42.174 attack
Jul 26 20:26:08 pve1 sshd[20042]: Failed password for root from 112.85.42.174 port 65399 ssh2
Jul 26 20:26:12 pve1 sshd[20042]: Failed password for root from 112.85.42.174 port 65399 ssh2
...
2020-07-27 02:29:04
115.238.186.104 attackbots
Jul 26 15:27:51 piServer sshd[18722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.186.104 
Jul 26 15:27:54 piServer sshd[18722]: Failed password for invalid user jay from 115.238.186.104 port 34273 ssh2
Jul 26 15:37:40 piServer sshd[19490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.186.104 
...
2020-07-27 02:39:26
138.197.95.2 attackbots
138.197.95.2 - - [26/Jul/2020:15:52:09 +0100] "POST /wp-login.php HTTP/1.1" 200 1949 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.95.2 - - [26/Jul/2020:15:52:10 +0100] "POST /wp-login.php HTTP/1.1" 200 1923 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.95.2 - - [26/Jul/2020:15:52:11 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-27 02:28:49
211.23.125.95 attackbotsspam
Jul 26 19:37:22 PorscheCustomer sshd[17398]: Failed password for ubuntu from 211.23.125.95 port 55338 ssh2
Jul 26 19:41:38 PorscheCustomer sshd[17490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.125.95
Jul 26 19:41:39 PorscheCustomer sshd[17490]: Failed password for invalid user connect from 211.23.125.95 port 39074 ssh2
...
2020-07-27 02:19:22
219.140.198.51 attackbots
2020-07-25 05:04:32 server sshd[57094]: Failed password for invalid user afc from 219.140.198.51 port 49804 ssh2
2020-07-27 02:04:46
60.251.146.67 attackbots
Unauthorized connection attempt from IP address 60.251.146.67 on Port 445(SMB)
2020-07-27 02:07:53
104.131.13.199 attack
Port scan: Attack repeated for 24 hours
2020-07-27 02:08:07
125.165.6.104 attack
Unauthorized connection attempt from IP address 125.165.6.104 on Port 445(SMB)
2020-07-27 02:09:12
220.135.2.237 attackspam
[H1.VM2] Blocked by UFW
2020-07-27 02:36:20
106.1.94.78 attack
(sshd) Failed SSH login from 106.1.94.78 (TW/Taiwan/-): 5 in the last 3600 secs
2020-07-27 02:20:54

最近上报的IP列表

141.140.51.164 119.250.157.106 216.164.244.162 229.9.24.134
232.181.17.69 29.229.84.243 71.231.76.193 38.152.179.131
250.20.167.220 174.115.8.123 60.24.255.230 158.101.217.117
226.104.112.255 153.23.107.220 170.190.207.42 201.127.233.93
134.111.61.56 186.22.104.25 117.175.80.209 94.49.121.242