必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.48.45.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;252.48.45.18.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 01:49:49 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 18.45.48.252.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.45.48.252.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.112.95.72 attack
Unauthorized connection attempt from IP address 42.112.95.72 on Port 445(SMB)
2020-09-24 18:04:24
13.127.10.64 attackspam
Invalid user ali from 13.127.10.64 port 57076
2020-09-24 18:17:14
23.97.107.242 attackbots
Sep 23 18:40:57 roki-contabo sshd\[4122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.107.242  user=root
Sep 23 18:41:00 roki-contabo sshd\[4122\]: Failed password for root from 23.97.107.242 port 43078 ssh2
Sep 23 18:52:42 roki-contabo sshd\[4865\]: Invalid user admin from 23.97.107.242
Sep 23 18:52:42 roki-contabo sshd\[4865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.107.242
Sep 23 18:52:45 roki-contabo sshd\[4865\]: Failed password for invalid user admin from 23.97.107.242 port 40870 ssh2
Sep 23 18:40:57 roki-contabo sshd\[4122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.97.107.242  user=root
Sep 23 18:41:00 roki-contabo sshd\[4122\]: Failed password for root from 23.97.107.242 port 43078 ssh2
Sep 23 18:52:42 roki-contabo sshd\[4865\]: Invalid user admin from 23.97.107.242
Sep 23 18:52:42 roki-contabo sshd\[4865\]: pam_un
...
2020-09-24 17:49:27
163.172.49.56 attack
Sep 24 07:09:35 vps333114 sshd[18800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.49.56
Sep 24 07:09:37 vps333114 sshd[18800]: Failed password for invalid user git from 163.172.49.56 port 33622 ssh2
...
2020-09-24 18:10:31
81.18.140.211 attack
Unauthorized connection attempt from IP address 81.18.140.211 on Port 445(SMB)
2020-09-24 17:50:54
168.90.89.35 attackbots
2020-09-24T05:53:53.506379centos sshd[31029]: Invalid user jared from 168.90.89.35 port 46138
2020-09-24T05:53:55.438975centos sshd[31029]: Failed password for invalid user jared from 168.90.89.35 port 46138 ssh2
2020-09-24T05:58:29.118610centos sshd[31275]: Invalid user tuxedo from 168.90.89.35 port 50327
...
2020-09-24 17:56:15
189.110.233.61 attackspam
IP 189.110.233.61 attacked honeypot on port: 22 at 9/24/2020 2:00:32 AM
2020-09-24 18:02:42
222.186.30.112 attackbotsspam
Sep 24 06:36:10 vm1 sshd[20233]: Failed password for root from 222.186.30.112 port 24929 ssh2
Sep 24 11:42:12 vm1 sshd[23837]: Failed password for root from 222.186.30.112 port 60766 ssh2
...
2020-09-24 17:45:26
157.245.245.159 attackspam
157.245.245.159 - - [24/Sep/2020:06:28:16 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.245.159 - - [24/Sep/2020:06:28:16 +0200] "POST /wp-login.php HTTP/1.1" 200 2104 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.245.159 - - [24/Sep/2020:06:28:17 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.245.159 - - [24/Sep/2020:06:28:17 +0200] "POST /wp-login.php HTTP/1.1" 200 2090 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.245.159 - - [24/Sep/2020:06:28:18 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.245.159 - - [24/Sep/2020:06:28:19 +0200] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/
...
2020-09-24 17:46:18
65.39.198.100 attackspambots
Sep 24 11:27:40 ip106 sshd[29701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.39.198.100 
Sep 24 11:27:42 ip106 sshd[29701]: Failed password for invalid user username from 65.39.198.100 port 59170 ssh2
...
2020-09-24 17:40:39
167.114.115.33 attackbots
Sep 24 10:16:51 ws26vmsma01 sshd[65301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.115.33
Sep 24 10:16:53 ws26vmsma01 sshd[65301]: Failed password for invalid user user5 from 167.114.115.33 port 34836 ssh2
...
2020-09-24 18:21:14
189.1.163.207 attackbots
Unauthorized connection attempt from IP address 189.1.163.207 on Port 445(SMB)
2020-09-24 18:12:34
178.128.248.121 attackbotsspam
Sep 24 11:45:36 cho sshd[3575468]: Invalid user tommy from 178.128.248.121 port 41248
Sep 24 11:45:36 cho sshd[3575468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.248.121 
Sep 24 11:45:36 cho sshd[3575468]: Invalid user tommy from 178.128.248.121 port 41248
Sep 24 11:45:37 cho sshd[3575468]: Failed password for invalid user tommy from 178.128.248.121 port 41248 ssh2
Sep 24 11:49:05 cho sshd[3575608]: Invalid user leonard from 178.128.248.121 port 50492
...
2020-09-24 17:53:42
82.102.126.20 attackspam
Sep 24 06:07:02 logopedia-1vcpu-1gb-nyc1-01 sshd[141447]: Failed password for root from 82.102.126.20 port 40224 ssh2
...
2020-09-24 18:09:43
113.190.128.74 attack
(eximsyntax) Exim syntax errors from 113.190.128.74 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-23 20:31:01 SMTP call from [113.190.128.74] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-09-24 17:54:40

最近上报的IP列表

239.240.132.32 146.60.50.74 16.214.185.7 15.102.172.127
233.254.77.118 253.73.126.40 33.9.192.241 115.181.237.161
97.116.22.246 242.67.238.123 181.165.143.39 16.133.218.106
59.28.25.90 32.138.8.182 94.27.244.19 164.236.198.168
144.60.248.176 190.162.234.8 36.71.68.177 228.229.199.168