必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Greece

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
45.139.212.217 attackspam
[24/Jun/2020 x@x
[24/Jun/2020 x@x
[24/Jun/2020 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.139.212.217
2020-06-25 02:17:04
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.139.212.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25796
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.139.212.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 15:47:28 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
149.212.139.45.in-addr.arpa domain name pointer 45-139-212-149.cgn.thes.cosmote.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.212.139.45.in-addr.arpa	name = 45-139-212-149.cgn.thes.cosmote.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.211.189.181 attack
$f2bV_matches
2019-11-30 22:44:02
94.191.56.144 attackspam
Nov 30 21:39:05 webhost01 sshd[1104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.56.144
Nov 30 21:39:07 webhost01 sshd[1104]: Failed password for invalid user shenoy from 94.191.56.144 port 41534 ssh2
...
2019-11-30 22:45:17
51.83.42.138 attack
Nov 30 15:32:34 ns3042688 sshd\[5728\]: Invalid user sato from 51.83.42.138
Nov 30 15:32:36 ns3042688 sshd\[5728\]: Failed password for invalid user sato from 51.83.42.138 port 34362 ssh2
Nov 30 15:35:31 ns3042688 sshd\[6889\]: Invalid user selmark from 51.83.42.138
Nov 30 15:35:33 ns3042688 sshd\[6889\]: Failed password for invalid user selmark from 51.83.42.138 port 41250 ssh2
Nov 30 15:38:36 ns3042688 sshd\[8035\]: Invalid user vcsa from 51.83.42.138
...
2019-11-30 22:53:16
124.113.219.251 attackspam
$f2bV_matches
2019-11-30 22:43:17
200.175.5.163 attackspambots
Unauthorised access (Nov 30) SRC=200.175.5.163 LEN=48 TOS=0x10 PREC=0x40 TTL=114 ID=14851 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 30) SRC=200.175.5.163 LEN=48 TOS=0x10 PREC=0x40 TTL=114 ID=11038 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 22:31:39
106.12.93.160 attackspam
Nov 30 13:10:24 ncomp sshd[25462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.160  user=root
Nov 30 13:10:26 ncomp sshd[25462]: Failed password for root from 106.12.93.160 port 43314 ssh2
Nov 30 13:30:52 ncomp sshd[25772]: Invalid user karly from 106.12.93.160
2019-11-30 22:27:46
143.208.181.32 attackspambots
2019-11-30T07:21:38.181777abusebot-6.cloudsearch.cf sshd\[17194\]: Invalid user test from 143.208.181.32 port 49488
2019-11-30 22:38:51
129.204.46.170 attackbots
SSH Bruteforce attempt
2019-11-30 22:32:02
185.176.27.170 attack
11/30/2019-14:28:01.523628 185.176.27.170 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-30 22:30:01
125.214.52.123 attack
Unauthorised access (Nov 30) SRC=125.214.52.123 LEN=52 TTL=108 ID=11221 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 22:52:02
51.91.122.140 attackbots
Nov 30 15:59:08 site1 sshd\[40125\]: Invalid user yazmine from 51.91.122.140Nov 30 15:59:09 site1 sshd\[40125\]: Failed password for invalid user yazmine from 51.91.122.140 port 38016 ssh2Nov 30 16:02:12 site1 sshd\[40206\]: Failed password for root from 51.91.122.140 port 46036 ssh2Nov 30 16:05:19 site1 sshd\[40294\]: Invalid user idalia from 51.91.122.140Nov 30 16:05:21 site1 sshd\[40294\]: Failed password for invalid user idalia from 51.91.122.140 port 54052 ssh2Nov 30 16:08:30 site1 sshd\[40460\]: Invalid user test from 51.91.122.140
...
2019-11-30 22:24:41
193.77.216.143 attackbotsspam
Nov 30 14:34:42 localhost sshd\[105992\]: Invalid user bertille from 193.77.216.143 port 57704
Nov 30 14:34:42 localhost sshd\[105992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.216.143
Nov 30 14:34:44 localhost sshd\[105992\]: Failed password for invalid user bertille from 193.77.216.143 port 57704 ssh2
Nov 30 14:38:27 localhost sshd\[106036\]: Invalid user mofcom from 193.77.216.143 port 36676
Nov 30 14:38:27 localhost sshd\[106036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.216.143
...
2019-11-30 22:57:53
119.29.242.48 attackspambots
Nov 30 03:47:46 sachi sshd\[25343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.242.48  user=root
Nov 30 03:47:49 sachi sshd\[25343\]: Failed password for root from 119.29.242.48 port 51746 ssh2
Nov 30 03:52:58 sachi sshd\[25687\]: Invalid user fansler from 119.29.242.48
Nov 30 03:52:58 sachi sshd\[25687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.242.48
Nov 30 03:53:00 sachi sshd\[25687\]: Failed password for invalid user fansler from 119.29.242.48 port 58574 ssh2
2019-11-30 22:15:56
218.92.0.154 attack
Nov 30 16:54:13 server sshd\[31582\]: User root from 218.92.0.154 not allowed because listed in DenyUsers
Nov 30 16:54:14 server sshd\[31582\]: Failed none for invalid user root from 218.92.0.154 port 52641 ssh2
Nov 30 16:54:14 server sshd\[31582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154  user=root
Nov 30 16:54:16 server sshd\[31582\]: Failed password for invalid user root from 218.92.0.154 port 52641 ssh2
Nov 30 16:54:22 server sshd\[31582\]: Failed password for invalid user root from 218.92.0.154 port 52641 ssh2
2019-11-30 22:55:10
122.3.88.147 attack
Oct 25 03:00:47 microserver sshd[44808]: Invalid user vc12345678 from 122.3.88.147 port 10096
Oct 25 03:00:47 microserver sshd[44808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.3.88.147
Oct 25 03:00:49 microserver sshd[44808]: Failed password for invalid user vc12345678 from 122.3.88.147 port 10096 ssh2
Oct 25 03:07:00 microserver sshd[45531]: Invalid user 123456 from 122.3.88.147 port 43218
Oct 25 03:07:00 microserver sshd[45531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.3.88.147
Nov 30 16:17:31 microserver sshd[58568]: Invalid user wwwadmin from 122.3.88.147 port 3808
Nov 30 16:17:31 microserver sshd[58568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.3.88.147
Nov 30 16:17:33 microserver sshd[58568]: Failed password for invalid user wwwadmin from 122.3.88.147 port 3808 ssh2
Nov 30 16:24:16 microserver sshd[59332]: pam_unix(sshd:auth): authentication failure; lo
2019-11-30 22:43:43

最近上报的IP列表

125.204.41.134 201.163.108.74 229.33.111.249 230.216.173.23
33.158.20.184 48.145.135.122 164.100.173.200 247.182.0.72
228.213.83.61 142.59.127.40 164.78.61.2 39.167.26.36
252.159.99.57 78.135.82.51 155.11.4.251 35.159.110.95
44.106.207.225 249.204.222.6 148.23.18.50 242.91.139.194