必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.132.180.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3274
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.132.180.145.		IN	A

;; AUTHORITY SECTION:
.			353	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061801 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 19 07:28:13 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
145.180.132.221.in-addr.arpa domain name pointer 221-132-180-145.jcomnet.j-cnet.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.180.132.221.in-addr.arpa	name = 221-132-180-145.jcomnet.j-cnet.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.117.185.232 attackbots
$f2bV_matches_ltvn
2019-08-28 18:17:24
179.191.96.166 attack
Aug 28 12:32:16 MK-Soft-Root1 sshd\[27491\]: Invalid user ti from 179.191.96.166 port 56338
Aug 28 12:32:16 MK-Soft-Root1 sshd\[27491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.96.166
Aug 28 12:32:18 MK-Soft-Root1 sshd\[27491\]: Failed password for invalid user ti from 179.191.96.166 port 56338 ssh2
...
2019-08-28 19:23:14
168.61.165.178 attackspambots
Aug 28 10:35:49 srv-4 sshd\[837\]: Invalid user cui from 168.61.165.178
Aug 28 10:35:49 srv-4 sshd\[837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.165.178
Aug 28 10:35:51 srv-4 sshd\[837\]: Failed password for invalid user cui from 168.61.165.178 port 36244 ssh2
...
2019-08-28 17:24:29
94.191.122.49 attackbots
Aug 27 18:33:30 friendsofhawaii sshd\[15935\]: Invalid user jboss from 94.191.122.49
Aug 27 18:33:30 friendsofhawaii sshd\[15935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.122.49
Aug 27 18:33:32 friendsofhawaii sshd\[15935\]: Failed password for invalid user jboss from 94.191.122.49 port 36394 ssh2
Aug 27 18:38:48 friendsofhawaii sshd\[16360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.122.49  user=root
Aug 27 18:38:50 friendsofhawaii sshd\[16360\]: Failed password for root from 94.191.122.49 port 53372 ssh2
2019-08-28 18:11:03
165.22.249.96 attackbots
Aug 28 02:35:58 vtv3 sshd\[28063\]: Invalid user uk from 165.22.249.96 port 37684
Aug 28 02:35:58 vtv3 sshd\[28063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.249.96
Aug 28 02:36:00 vtv3 sshd\[28063\]: Failed password for invalid user uk from 165.22.249.96 port 37684 ssh2
Aug 28 02:41:16 vtv3 sshd\[30816\]: Invalid user kelvin from 165.22.249.96 port 60218
Aug 28 02:41:16 vtv3 sshd\[30816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.249.96
Aug 28 02:54:48 vtv3 sshd\[5050\]: Invalid user ubuntu from 165.22.249.96 port 54826
Aug 28 02:54:48 vtv3 sshd\[5050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.249.96
Aug 28 02:54:51 vtv3 sshd\[5050\]: Failed password for invalid user ubuntu from 165.22.249.96 port 54826 ssh2
Aug 28 02:59:27 vtv3 sshd\[7367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22
2019-08-28 18:13:32
77.81.109.45 attackspambots
Aug 28 11:29:16 eventyay sshd[6999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.109.45
Aug 28 11:29:17 eventyay sshd[6999]: Failed password for invalid user susane from 77.81.109.45 port 57790 ssh2
Aug 28 11:37:22 eventyay sshd[9053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.109.45
...
2019-08-28 17:50:33
31.14.135.117 attackbots
$f2bV_matches
2019-08-28 18:51:41
189.6.242.60 attack
Aug 28 06:18:19 mxgate1 postfix/postscreen[29119]: CONNECT from [189.6.242.60]:4402 to [176.31.12.44]:25
Aug 28 06:18:19 mxgate1 postfix/dnsblog[29123]: addr 189.6.242.60 listed by domain zen.spamhaus.org as 127.0.0.4
Aug 28 06:18:19 mxgate1 postfix/dnsblog[29123]: addr 189.6.242.60 listed by domain zen.spamhaus.org as 127.0.0.11
Aug 28 06:18:19 mxgate1 postfix/dnsblog[29122]: addr 189.6.242.60 listed by domain cbl.abuseat.org as 127.0.0.2
Aug 28 06:18:19 mxgate1 postfix/dnsblog[29120]: addr 189.6.242.60 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Aug 28 06:18:19 mxgate1 postfix/dnsblog[29124]: addr 189.6.242.60 listed by domain b.barracudacentral.org as 127.0.0.2
Aug 28 06:18:20 mxgate1 postfix/dnsblog[29121]: addr 189.6.242.60 listed by domain bl.spamcop.net as 127.0.0.2
Aug 28 06:18:25 mxgate1 postfix/postscreen[29119]: DNSBL rank 6 for [189.6.242.60]:4402
Aug x@x
Aug 28 06:18:26 mxgate1 postfix/postscreen[29119]: HANGUP after 1.1 from [189.6.242.60]:4402 in te........
-------------------------------
2019-08-28 17:36:52
222.188.66.75 attackbots
SSHScan
2019-08-28 17:35:44
169.62.84.6 attackspambots
$f2bV_matches_ltvn
2019-08-28 17:57:10
51.38.178.74 attackbotsspam
Aug 28 12:54:12 SilenceServices sshd[25302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.178.74
Aug 28 12:54:14 SilenceServices sshd[25302]: Failed password for invalid user dkpal from 51.38.178.74 port 38744 ssh2
Aug 28 12:58:45 SilenceServices sshd[26987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.178.74
2019-08-28 19:03:11
103.94.120.66 attackspambots
103.94.120.66 - - [28/Aug/2019:05:20:55 +0100] "POST /xmlrpc.php HTTP/1.1" 200 370 "-" "Mozilla/5.0 (Linux; U; Android 8.1.0; zh-cn; BLA-AL00 Build/HUAWEIBLA-AL00) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/57.0.2987.132 MQQBrowser/8.9 Mobile Safari/537.36"
2019-08-28 19:33:39
94.191.93.34 attackbots
Aug 27 22:12:08 kapalua sshd\[32052\]: Invalid user andrew from 94.191.93.34
Aug 27 22:12:08 kapalua sshd\[32052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.93.34
Aug 27 22:12:10 kapalua sshd\[32052\]: Failed password for invalid user andrew from 94.191.93.34 port 60786 ssh2
Aug 27 22:18:17 kapalua sshd\[32543\]: Invalid user admln from 94.191.93.34
Aug 27 22:18:17 kapalua sshd\[32543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.93.34
2019-08-28 18:10:12
172.108.154.2 attack
Automatic report - Banned IP Access
2019-08-28 18:32:17
119.9.75.165 attackspambots
Aug 28 13:21:43 our-server-hostname postfix/smtpd[20979]: connect from unknown[119.9.75.165]
Aug x@x
Aug 28 13:21:43 our-server-hostname postfix/smtpd[20979]: disconnect from unknown[119.9.75.165]
Aug 28 13:24:48 our-server-hostname postfix/smtpd[21899]: connect from unknown[119.9.75.165]
Aug x@x
Aug 28 13:24:49 our-server-hostname postfix/smtpd[21899]: disconnect from unknown[119.9.75.165]
Aug 28 13:25:03 our-server-hostname postfix/smtpd[2782]: connect from unknown[119.9.75.165]
Aug x@x
Aug 28 13:25:04 our-server-hostname postfix/smtpd[2782]: disconnect from unknown[119.9.75.165]
Aug 28 13:25:59 our-server-hostname postfix/smtpd[3243]: connect from unknown[119.9.75.165]
Aug x@x
Aug 28 13:26:00 our-server-hostname postfix/smtpd[3243]: disconnect from unknown[119.9.75.165]
Aug 28 13:31:12 our-server-hostname postfix/smtpd[22048]: connect from unknown[119.9.75.165]
Aug x@x
Aug 28 13:31:12 our-server-hostname postfix/smtpd[22048]: disconnect from unknown[119.9.75.165]
Aug........
-------------------------------
2019-08-28 17:30:03

最近上报的IP列表

121.12.199.64 119.0.182.195 124.74.69.216 213.121.19.89
145.191.155.200 21.204.213.27 85.63.27.205 75.123.238.221
41.159.203.93 55.148.81.250 126.114.50.152 96.7.244.193
129.102.206.140 231.12.190.39 34.121.16.255 232.11.144.179
187.0.255.137 208.92.100.78 181.66.181.184 140.229.5.142