必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Greece

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
45.139.212.217 attackspam
[24/Jun/2020 x@x
[24/Jun/2020 x@x
[24/Jun/2020 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.139.212.217
2020-06-25 02:17:04
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.139.212.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.139.212.102.			IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072201 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 23 05:27:01 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 102.212.139.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 102.212.139.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.99.231.70 attackbots
(sshd) Failed SSH login from 167.99.231.70 (US/United States/-): 5 in the last 3600 secs
2020-04-16 16:18:05
54.158.221.135 attackbotsspam
(sshd) Failed SSH login from 54.158.221.135 (US/United States/ec2-54-158-221-135.compute-1.amazonaws.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 16 06:27:39 s1 sshd[11475]: Invalid user yy from 54.158.221.135 port 40692
Apr 16 06:27:41 s1 sshd[11475]: Failed password for invalid user yy from 54.158.221.135 port 40692 ssh2
Apr 16 06:48:36 s1 sshd[12194]: Invalid user kafka from 54.158.221.135 port 45300
Apr 16 06:48:39 s1 sshd[12194]: Failed password for invalid user kafka from 54.158.221.135 port 45300 ssh2
Apr 16 06:51:10 s1 sshd[12298]: Invalid user postgres from 54.158.221.135 port 59714
2020-04-16 16:15:12
49.68.145.178 attackspam
Email rejected due to spam filtering
2020-04-16 16:40:53
5.166.28.29 attackbotsspam
Blocked for recurring port scan.
Time: Wed Apr 15. 21:01:47 2020 +0200
IP: 5.166.28.29 (5x166x28x29.dynamic.yar.ertelecom.ru)

Temporary blocks that triggered the permanent block:
Tue Apr 14 23:19:21 2020 *Port Scan* detected from 5.166.28.29 (5x166x28x29.dynamic.yar.ertelecom.ru). 11 hits in the last 267 seconds
Wed Apr 15 12:19:59 2020 *Port Scan* detected from 5.166.28.29 (5x166x28x29.dynamic.yar.ertelecom.ru). 11 hits in the last 181 seconds
Wed Apr 15 18:37:03 2020 *Port Scan* detected from 5.166.28.29 (5x166x28x29.dynamic.yar.ertelecom.ru). 11 hits in the last 260 seconds
Wed Apr 15 19:49:45 2020 *Port Scan* detected from 5.166.28.29 (5x166x28x29.dynamic.yar.ertelecom.ru). 11 hits in the last 96 seconds
Wed Apr 15 21:01:47 2020 *Port Scan* detected from 5.166.28.29 (5x166x28x29.dynamic.yar.ertelecom.ru). 11 hits in the last 96 seconds
2020-04-16 16:07:15
113.87.93.214 attack
Email rejected due to spam filtering
2020-04-16 16:39:54
180.106.83.17 attackbots
Invalid user fp from 180.106.83.17 port 48846
2020-04-16 16:21:43
206.189.132.8 attackbots
$f2bV_matches
2020-04-16 16:14:40
62.210.140.151 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-04-16 16:04:59
185.176.27.246 attack
04/16/2020-04:33:24.422250 185.176.27.246 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-16 16:41:26
77.42.91.228 attack
Automatic report - Port Scan Attack
2020-04-16 16:05:31
77.42.86.62 attackbots
Automatic report - Port Scan Attack
2020-04-16 16:18:26
82.202.247.120 attackbotsspam
Tried to find non-existing directory/file on the server
2020-04-16 16:10:53
114.67.95.188 attackbotsspam
2020-04-16T08:38:32.062862  sshd[11957]: Invalid user dev from 114.67.95.188 port 38725
2020-04-16T08:38:32.076271  sshd[11957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.95.188
2020-04-16T08:38:32.062862  sshd[11957]: Invalid user dev from 114.67.95.188 port 38725
2020-04-16T08:38:34.233729  sshd[11957]: Failed password for invalid user dev from 114.67.95.188 port 38725 ssh2
...
2020-04-16 16:20:25
51.15.152.61 attack
Port scan detected on ports: 7800[UDP], 9999[UDP], 5560[UDP]
2020-04-16 16:19:04
192.241.239.112 attackbots
Unauthorized connection attempt detected from IP address 192.241.239.112 to port 115
2020-04-16 16:26:30

最近上报的IP列表

3.149.71.79 59.153.253.213 59.126.7.78 42.118.218.67
41.39.163.19 36.77.92.201 223.206.247.112 241.172.206.230
220.135.162.228 186.1.141.158 31.6.103.236 200.123.62.3
200.44.222.66 193.108.249.63 190.200.122.170 171.231.34.253
157.49.148.51 152.67.34.205 151.80.109.230 14.162.206.150