必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hong Kong

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.139.136.0 - 45.150.51.255
CIDR:           45.140.0.0/14, 45.139.160.0/19, 45.150.48.0/22, 45.150.32.0/20, 45.144.0.0/14, 45.139.136.0/21, 45.148.0.0/15, 45.139.144.0/20, 45.139.192.0/18, 45.150.0.0/19
NetName:        RIPE
NetHandle:      NET-45-139-136-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2014-05-22
Updated:        2025-04-14
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/45.139.136.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.142.154.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.142.154.60.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030701 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 08:00:07 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 60.154.142.45.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 60.154.142.45.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
186.47.86.75 attackspam
23/tcp
[2019-08-09]1pkt
2019-08-09 20:01:47
46.3.96.66 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-09 19:51:10
89.46.196.34 attack
Aug  9 17:16:54 vibhu-HP-Z238-Microtower-Workstation sshd\[19767\]: Invalid user admin from 89.46.196.34
Aug  9 17:16:54 vibhu-HP-Z238-Microtower-Workstation sshd\[19767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.46.196.34
Aug  9 17:16:56 vibhu-HP-Z238-Microtower-Workstation sshd\[19767\]: Failed password for invalid user admin from 89.46.196.34 port 57634 ssh2
Aug  9 17:21:14 vibhu-HP-Z238-Microtower-Workstation sshd\[19889\]: Invalid user chu from 89.46.196.34
Aug  9 17:21:14 vibhu-HP-Z238-Microtower-Workstation sshd\[19889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.46.196.34
...
2019-08-09 20:05:35
58.213.198.77 attack
Aug  9 07:30:18 TORMINT sshd\[18093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.77  user=root
Aug  9 07:30:19 TORMINT sshd\[18093\]: Failed password for root from 58.213.198.77 port 41032 ssh2
Aug  9 07:33:05 TORMINT sshd\[18201\]: Invalid user django from 58.213.198.77
Aug  9 07:33:05 TORMINT sshd\[18201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.198.77
...
2019-08-09 19:57:03
66.240.205.34 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-09 19:41:38
162.247.74.202 attackbotsspam
Aug  9 12:56:12 cvbmail sshd\[26506\]: Invalid user eurek from 162.247.74.202
Aug  9 12:56:12 cvbmail sshd\[26506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.202
Aug  9 12:56:14 cvbmail sshd\[26506\]: Failed password for invalid user eurek from 162.247.74.202 port 52184 ssh2
2019-08-09 19:35:59
89.238.225.78 attackspambots
SpamReport
2019-08-09 19:29:38
2002:42d4:1fc6::42d4:1fc6 attackbotsspam
MYH,DEF POST /wp-content/plugins/asset-manager/upload.php
GET /wp-content/uploads/assets/temp/sherror.php
2019-08-09 19:44:53
192.228.100.247 attack
Time:     Fri Aug  9 05:41:12 2019 -0500
IP:       192.228.100.247 (US/United States/-)
Failures: 10 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_TRIGGER]

Log entries:

Aug  9 05:40:57 dx0 sshd[26110]: refused connect from 192.228.100.247 (192.228.100.247)
Aug  9 05:40:57 dx0 sshd[26113]: refused connect from 192.228.100.247 (192.228.100.247)
Aug  9 05:40:57 dx0 sshd[26111]: refused connect from 192.228.100.247 (192.228.100.247)
Aug  9 05:40:57 dx0 sshd[26122]: refused connect from 192.228.100.247 (192.228.100.247)
Aug  9 05:40:57 dx0 sshd[26120]: refused connect from 192.228.100.247 (192.228.100.247)
2019-08-09 20:11:52
180.183.69.86 attackbots
445/tcp
[2019-08-09]1pkt
2019-08-09 20:06:59
160.153.147.136 attackbotsspam
xmlrpc attack
2019-08-09 20:07:18
151.225.207.19 attackspambots
23/tcp
[2019-08-09]1pkt
2019-08-09 20:02:38
103.129.222.132 attackbots
Aug  9 11:46:02 debian sshd\[13840\]: Invalid user ts from 103.129.222.132 port 39078
Aug  9 11:46:02 debian sshd\[13840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.132
...
2019-08-09 19:44:05
162.252.58.148 attack
Unauthorised access (Aug  9) SRC=162.252.58.148 LEN=40 TTL=241 ID=62076 TCP DPT=445 WINDOW=1024 SYN
2019-08-09 20:10:03
213.227.154.95 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-08-09 19:54:47

最近上报的IP列表

14.213.49.134 152.32.192.241 13.244.113.217 2606:4700:10::6814:6553
2606:4700:10::6814:6012 2606:4700:10::6814:6046 2606:4700:10::6814:9872 2606:4700:10::6814:9351
2606:4700:10::6814:8282 2606:4700:10::6816:2160 2606:4700:10::6814:5065 2606:4700:10::6814:8271
2606:4700:10::6814:7618 2606:4700:10::6814:5463 164.155.74.151 20.64.105.126
89.169.55.117 121.234.219.184 2606:4700:10::6814:5647 2606:4700:10::6814:6329