必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 240.92.145.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;240.92.145.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 02:56:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 80.145.92.240.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.145.92.240.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.37.150.194 attack
Oct 11 20:46:40 main sshd[1636382]: Invalid user trash from 54.37.150.194 port 45082
Oct 11 20:46:42 main sshd[1636382]: Failed password for invalid user trash from 54.37.150.194 port 45082 ssh2
Oct 11 20:46:44 main sshd[1636487]: Invalid user tianadi from 54.37.150.194 port 46104
Oct 11 20:46:46 main sshd[1636487]: Failed password for invalid user tianadi from 54.37.150.194 port 46104 ssh2
Oct 11 20:46:48 main sshd[1636588]: Invalid user diablo from 54.37.150.194 port 50894
2020-10-12 16:11:51
114.67.168.0 attackspambots
[portscan] tcp/25 [smtp]
[scan/connect: 6 time(s)]
in blocklist.de:'listed [sasl]'
*(RWIN=28200)(10120855)
2020-10-12 16:15:53
172.104.242.173 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-12 15:40:14
158.69.197.113 attackspam
Oct 12 09:45:56 vm1 sshd[15347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.197.113
Oct 12 09:45:58 vm1 sshd[15347]: Failed password for invalid user qmaild from 158.69.197.113 port 54784 ssh2
...
2020-10-12 16:27:02
103.45.179.163 attack
SSH brute force attempt
2020-10-12 15:48:59
133.130.89.23 attackbots
Oct 12 08:39:40 web-main sshd[3270971]: Failed password for root from 133.130.89.23 port 34524 ssh2
Oct 12 08:41:55 web-main sshd[3271259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.23  user=root
Oct 12 08:41:57 web-main sshd[3271259]: Failed password for root from 133.130.89.23 port 40886 ssh2
2020-10-12 15:43:25
83.97.20.30 attackbotsspam
Unauthorized connection attempt detected from IP address 83.97.20.30 to port 5432
2020-10-12 15:52:05
114.67.123.3 attackspam
Oct 12 10:46:53 ift sshd\[9014\]: Invalid user free from 114.67.123.3Oct 12 10:46:54 ift sshd\[9014\]: Failed password for invalid user free from 114.67.123.3 port 4725 ssh2Oct 12 10:50:11 ift sshd\[9470\]: Invalid user master from 114.67.123.3Oct 12 10:50:14 ift sshd\[9470\]: Failed password for invalid user master from 114.67.123.3 port 4726 ssh2Oct 12 10:53:40 ift sshd\[9847\]: Failed password for root from 114.67.123.3 port 4727 ssh2
...
2020-10-12 16:27:28
177.18.22.215 attackspam
2020-10-12T08:00:01.491761shield sshd\[18494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.18.22.215.dynamic.adsl.gvt.net.br  user=root
2020-10-12T08:00:03.343910shield sshd\[18494\]: Failed password for root from 177.18.22.215 port 24899 ssh2
2020-10-12T08:05:23.833057shield sshd\[19034\]: Invalid user f4 from 177.18.22.215 port 28015
2020-10-12T08:05:23.846887shield sshd\[19034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.18.22.215.dynamic.adsl.gvt.net.br
2020-10-12T08:05:26.244904shield sshd\[19034\]: Failed password for invalid user f4 from 177.18.22.215 port 28015 ssh2
2020-10-12 16:09:50
147.135.211.127 attackspambots
147.135.211.127 - - [12/Oct/2020:08:30:10 +0100] "POST /wp-login.php HTTP/1.1" 200 4427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
147.135.211.127 - - [12/Oct/2020:08:30:11 +0100] "POST /wp-login.php HTTP/1.1" 200 4427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
147.135.211.127 - - [12/Oct/2020:08:30:12 +0100] "POST /wp-login.php HTTP/1.1" 200 4427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 16:03:58
92.222.92.237 attackspam
92.222.92.237 - - [12/Oct/2020:06:35:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2243 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
92.222.92.237 - - [12/Oct/2020:06:35:55 +0100] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
92.222.92.237 - - [12/Oct/2020:06:35:56 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 16:26:12
106.12.132.224 attackspam
Oct 12 10:14:25 abendstille sshd\[30630\]: Invalid user yoneyama from 106.12.132.224
Oct 12 10:14:25 abendstille sshd\[30630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.224
Oct 12 10:14:27 abendstille sshd\[30630\]: Failed password for invalid user yoneyama from 106.12.132.224 port 39144 ssh2
Oct 12 10:18:24 abendstille sshd\[3001\]: Invalid user briacheslav from 106.12.132.224
Oct 12 10:18:24 abendstille sshd\[3001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.224
...
2020-10-12 16:21:33
129.204.121.113 attack
Bruteforce detected by fail2ban
2020-10-12 16:00:44
190.64.141.18 attack
SSH brute-force attack detected from [190.64.141.18]
2020-10-12 16:02:05
41.72.61.67 attackspam
 TCP (SYN) 41.72.61.67:50481 -> port 1433, len 40
2020-10-12 16:13:59

最近上报的IP列表

173.234.58.78 99.191.144.85 215.223.215.18 133.222.142.112
38.137.40.190 57.109.32.164 53.84.67.8 127.218.217.128
203.177.70.173 19.87.65.232 93.76.220.163 62.8.166.83
202.182.47.203 86.245.13.55 70.212.65.102 47.157.145.212
4.251.120.45 122.80.56.38 155.96.234.6 199.47.164.130