必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.48.45.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.48.45.18.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 01:49:49 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 18.45.48.252.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.45.48.252.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.86.22.36 attack
/lotteryV3/lottery.do
2020-10-11 15:55:09
112.85.42.13 attackbotsspam
Oct 11 10:01:06 sso sshd[13545]: Failed password for root from 112.85.42.13 port 50540 ssh2
Oct 11 10:01:09 sso sshd[13545]: Failed password for root from 112.85.42.13 port 50540 ssh2
...
2020-10-11 16:04:01
35.235.96.109 attackspambots
Attempts to probe web pages for vulnerable PHP or other applications
2020-10-11 15:32:03
103.88.247.212 attackbotsspam
(sshd) Failed SSH login from 103.88.247.212 (ID/Indonesia/-): 5 in the last 3600 secs
2020-10-11 15:48:49
188.166.211.91 attackspam
Unauthorised access (Oct 10) SRC=188.166.211.91 LEN=40 TTL=245 ID=19616 TCP DPT=443 WINDOW=5840
2020-10-11 16:03:34
61.216.161.223 attack
Unauthorised access (Oct 10) SRC=61.216.161.223 LEN=40 TTL=45 ID=55733 TCP DPT=23 WINDOW=50122 SYN
2020-10-11 15:30:40
49.234.126.35 attackspambots
$f2bV_matches
2020-10-11 16:02:54
81.68.239.140 attackspambots
Lines containing failures of 81.68.239.140
Oct  6 17:24:45 mellenthin sshd[30324]: User r.r from 81.68.239.140 not allowed because not listed in AllowUsers
Oct  6 17:24:45 mellenthin sshd[30324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.239.140  user=r.r
Oct  6 17:24:47 mellenthin sshd[30324]: Failed password for invalid user r.r from 81.68.239.140 port 40446 ssh2
Oct  6 17:24:47 mellenthin sshd[30324]: Received disconnect from 81.68.239.140 port 40446:11: Bye Bye [preauth]
Oct  6 17:24:47 mellenthin sshd[30324]: Disconnected from invalid user r.r 81.68.239.140 port 40446 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.68.239.140
2020-10-11 16:10:42
175.201.126.48 attack
(sshd) Failed SSH login from 175.201.126.48 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 10 18:27:07 server sshd[7203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.201.126.48  user=root
Oct 10 18:27:09 server sshd[7203]: Failed password for root from 175.201.126.48 port 48760 ssh2
Oct 10 18:27:11 server sshd[7221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.201.126.48  user=root
Oct 10 18:27:13 server sshd[7221]: Failed password for root from 175.201.126.48 port 49249 ssh2
Oct 10 18:27:16 server sshd[7231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.201.126.48  user=root
2020-10-11 15:43:52
220.250.51.208 attackspambots
Oct 11 09:36:54 rancher-0 sshd[595278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.250.51.208  user=root
Oct 11 09:36:55 rancher-0 sshd[595278]: Failed password for root from 220.250.51.208 port 35642 ssh2
...
2020-10-11 15:50:33
190.207.249.177 attack
Brute forcing RDP port 3389
2020-10-11 16:11:06
218.92.0.172 attackbots
SSH brute-force attempt
2020-10-11 15:50:14
122.52.112.252 attackspambots
Automatic report - Banned IP Access
2020-10-11 16:01:30
106.13.42.140 attackbots
leo_www
2020-10-11 15:40:49
184.105.247.244 attack
Tried our host z.
2020-10-11 15:53:42

最近上报的IP列表

239.240.132.32 146.60.50.74 16.214.185.7 15.102.172.127
233.254.77.118 253.73.126.40 33.9.192.241 115.181.237.161
97.116.22.246 242.67.238.123 181.165.143.39 16.133.218.106
59.28.25.90 32.138.8.182 94.27.244.19 164.236.198.168
144.60.248.176 190.162.234.8 36.71.68.177 228.229.199.168