必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.121.137.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19683
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.121.137.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011301 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 06:18:31 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 145.137.121.252.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.137.121.252.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
165.22.76.96 attack
Automatic report - Banned IP Access
2020-08-04 20:34:31
104.131.91.148 attackbots
SSH brute force attempt
2020-08-04 20:04:05
176.31.255.223 attackbots
Aug  4 11:14:41 hell sshd[30999]: Failed password for root from 176.31.255.223 port 53500 ssh2
...
2020-08-04 20:06:55
190.113.157.155 attackspambots
Aug  4 12:21:53 vps647732 sshd[12421]: Failed password for root from 190.113.157.155 port 43762 ssh2
...
2020-08-04 20:29:01
118.25.1.48 attackbotsspam
Aug  4 07:36:40 host sshd\[9900\]: Failed password for root from 118.25.1.48 port 43786 ssh2
Aug  4 07:40:11 host sshd\[10721\]: Failed password for root from 118.25.1.48 port 52710 ssh2
Aug  4 07:43:45 host sshd\[10958\]: Failed password for root from 118.25.1.48 port 33406 ssh2
...
2020-08-04 20:03:48
51.105.52.182 attackspambots
Aug  4 08:16:19 mx sshd[29375]: Failed password for root from 51.105.52.182 port 41808 ssh2
2020-08-04 20:30:10
51.15.204.27 attack
2020-08-04T06:28:53.2572931495-001 sshd[15840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.27  user=root
2020-08-04T06:28:55.1318081495-001 sshd[15840]: Failed password for root from 51.15.204.27 port 50226 ssh2
2020-08-04T06:32:46.7898341495-001 sshd[16082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.27  user=root
2020-08-04T06:32:48.6537751495-001 sshd[16082]: Failed password for root from 51.15.204.27 port 60960 ssh2
2020-08-04T06:36:34.8692001495-001 sshd[16241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.27  user=root
2020-08-04T06:36:37.0345551495-001 sshd[16241]: Failed password for root from 51.15.204.27 port 43478 ssh2
...
2020-08-04 20:00:47
87.248.33.176 attack
87.248.33.176 - - [04/Aug/2020:11:22:32 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
87.248.33.176 - - [04/Aug/2020:11:25:27 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-04 20:22:45
210.99.216.205 attackbots
2020-08-04T12:27:27.525188vps751288.ovh.net sshd\[17556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.99.216.205  user=root
2020-08-04T12:27:30.262573vps751288.ovh.net sshd\[17556\]: Failed password for root from 210.99.216.205 port 39166 ssh2
2020-08-04T12:31:53.879818vps751288.ovh.net sshd\[17622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.99.216.205  user=root
2020-08-04T12:31:56.135250vps751288.ovh.net sshd\[17622\]: Failed password for root from 210.99.216.205 port 50424 ssh2
2020-08-04T12:36:21.698541vps751288.ovh.net sshd\[17701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.99.216.205  user=root
2020-08-04 20:20:09
181.40.122.2 attackbots
prod6
...
2020-08-04 20:01:52
154.28.188.38 attack
Tries to attack my QNAP admin
2020-08-04 20:08:40
181.174.84.69 attackspam
(sshd) Failed SSH login from 181.174.84.69 (GT/Guatemala/admisionep.politecnica.edu.gt): 5 in the last 3600 secs
2020-08-04 20:31:01
122.227.159.84 attackspam
Aug  4 13:41:24 ns381471 sshd[3117]: Failed password for root from 122.227.159.84 port 59447 ssh2
2020-08-04 20:10:13
152.32.145.45 attackspam
2020-08-04T05:23:05.865172devel sshd[10847]: Failed password for root from 152.32.145.45 port 50402 ssh2
2020-08-04T05:25:29.082084devel sshd[11620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.145.45  user=root
2020-08-04T05:25:30.737290devel sshd[11620]: Failed password for root from 152.32.145.45 port 59524 ssh2
2020-08-04 20:18:24
103.84.4.191 attackbots
Telnet Server BruteForce Attack
2020-08-04 20:22:13

最近上报的IP列表

72.146.122.143 151.185.245.182 193.14.18.137 63.28.176.68
131.33.35.78 134.31.221.246 35.57.125.55 244.233.145.44
168.85.200.156 84.102.232.95 118.241.78.204 181.53.91.5
159.32.87.206 237.183.186.61 19.194.108.66 175.15.5.244
39.210.172.28 42.62.79.250 f102:b299:f4b4:d20d:e2ad:b70b:906e:be99 87.97.113.235