必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): Vanta Telecommunications Limited

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbotsspam
Unauthorized connection attempt detected from IP address 45.122.138.7 to port 1433 [J]
2020-01-29 05:23:52
attackbots
SIP/5060 Probe, BF, Hack -
2019-12-30 21:25:00
相同子网IP讨论:
IP 类型 评论内容 时间
45.122.138.67 attackbots
Unauthorized connection attempt detected from IP address 45.122.138.67 to port 1433 [J]
2020-01-29 10:12:16
45.122.138.22 attack
Dec 29 18:12:37 ws22vmsma01 sshd[222802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.138.22
Dec 29 18:12:39 ws22vmsma01 sshd[222802]: Failed password for invalid user ubnt from 45.122.138.22 port 48709 ssh2
...
2019-12-30 06:28:14
45.122.138.22 attack
2019-12-27T23:51:12.745531shield sshd\[5830\]: Invalid user ervin from 45.122.138.22 port 59069
2019-12-27T23:51:12.748817shield sshd\[5830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.138.22
2019-12-27T23:51:15.045338shield sshd\[5830\]: Failed password for invalid user ervin from 45.122.138.22 port 59069 ssh2
2019-12-27T23:54:04.214561shield sshd\[6635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.138.22  user=root
2019-12-27T23:54:06.791896shield sshd\[6635\]: Failed password for root from 45.122.138.22 port 41868 ssh2
2019-12-28 07:58:59
45.122.138.22 attackbotsspam
Dec 10 14:03:43 vibhu-HP-Z238-Microtower-Workstation sshd\[28411\]: Invalid user 1qaz@WSX from 45.122.138.22
Dec 10 14:03:43 vibhu-HP-Z238-Microtower-Workstation sshd\[28411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.138.22
Dec 10 14:03:45 vibhu-HP-Z238-Microtower-Workstation sshd\[28411\]: Failed password for invalid user 1qaz@WSX from 45.122.138.22 port 55968 ssh2
Dec 10 14:10:11 vibhu-HP-Z238-Microtower-Workstation sshd\[29473\]: Invalid user pluto from 45.122.138.22
Dec 10 14:10:11 vibhu-HP-Z238-Microtower-Workstation sshd\[29473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.138.22
...
2019-12-10 18:47:08
45.122.138.22 attackspambots
Dec  4 16:58:18 plusreed sshd[11157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.122.138.22  user=root
Dec  4 16:58:20 plusreed sshd[11157]: Failed password for root from 45.122.138.22 port 57114 ssh2
...
2019-12-05 06:05:19
45.122.138.22 attackbotsspam
$f2bV_matches
2019-12-02 19:57:29
45.122.138.22 attack
Nov 23 18:47:07 hosting sshd[16063]: Invalid user dorotea from 45.122.138.22 port 47184
...
2019-11-24 00:43:46
45.122.138.22 attackspambots
Automatic report - SSH Brute-Force Attack
2019-11-19 06:42:29
45.122.138.81 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.122.138.81/ 
 HK - 1H : (18)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : HK 
 NAME ASN : ASN132742 
 
 IP : 45.122.138.81 
 
 CIDR : 45.122.138.0/24 
 
 PREFIX COUNT : 79 
 
 UNIQUE IP COUNT : 37888 
 
 
 WYKRYTE ATAKI Z ASN132742 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-17 20:52:50 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-18 04:30:42
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.122.138.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.122.138.7.			IN	A

;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019123000 1800 900 604800 86400

;; Query time: 438 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 30 21:24:54 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
Host 7.138.122.45.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 7.138.122.45.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
156.195.84.173 attackspam
Unauthorized connection attempt detected from IP address 156.195.84.173 to port 23 [J]
2020-01-29 09:18:05
116.49.181.105 attackbotsspam
Unauthorized connection attempt detected from IP address 116.49.181.105 to port 5555 [J]
2020-01-29 09:46:35
218.78.29.16 attack
Unauthorized connection attempt detected from IP address 218.78.29.16 to port 2220 [J]
2020-01-29 09:32:18
109.13.110.107 attackbotsspam
Unauthorized connection attempt detected from IP address 109.13.110.107 to port 5555 [J]
2020-01-29 09:21:42
179.126.206.72 attackbotsspam
Unauthorized connection attempt detected from IP address 179.126.206.72 to port 81 [J]
2020-01-29 09:38:40
180.150.177.120 attackspambots
Unauthorized connection attempt detected from IP address 180.150.177.120 to port 2220 [J]
2020-01-29 09:15:32
219.79.103.41 attack
Unauthorized connection attempt detected from IP address 219.79.103.41 to port 5555 [J]
2020-01-29 09:11:19
40.73.32.209 attackspambots
Invalid user cacti from 40.73.32.209 port 36236
2020-01-29 09:30:13
221.0.17.254 attack
Unauthorized connection attempt detected from IP address 221.0.17.254 to port 8888 [J]
2020-01-29 09:32:02
120.84.141.134 attack
Unauthorized connection attempt detected from IP address 120.84.141.134 to port 1433 [J]
2020-01-29 09:44:27
196.52.43.105 attackspambots
Unauthorized connection attempt detected from IP address 196.52.43.105 to port 5908 [J]
2020-01-29 09:33:21
80.104.117.78 attackbots
Honeypot attack, port: 81, PTR: host78-117-dynamic.104-80-r.retail.telecomitalia.it.
2020-01-29 09:26:24
117.173.67.119 attackspam
Invalid user school from 117.173.67.119 port 2560
2020-01-29 09:45:14
115.77.140.32 attack
Unauthorized connection attempt detected from IP address 115.77.140.32 to port 4873 [J]
2020-01-29 09:47:04
119.29.94.177 attackspam
Unauthorized connection attempt detected from IP address 119.29.94.177 to port 80 [J]
2020-01-29 09:44:48

最近上报的IP列表

77.104.245.12 47.92.50.135 110.93.247.171 95.219.134.157
88.250.196.146 85.209.0.250 80.74.75.133 14.174.23.167
59.33.84.234 42.116.68.34 213.6.227.10 109.134.12.28
113.254.72.151 27.116.21.82 222.134.38.158 160.136.125.45
222.239.143.35 141.104.243.124 142.68.238.112 176.109.185.87