必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Valencia

省份(region): Carabobo

国家(country): Venezuela

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.181.80.0 - 45.182.187.255
CIDR:           45.181.96.0/19, 45.182.160.0/20, 45.182.184.0/22, 45.182.0.0/17, 45.182.128.0/19, 45.181.80.0/20, 45.182.176.0/21, 45.181.128.0/17
NetName:        NET-45-181-80-0-1
NetHandle:      NET-45-181-80-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Transferred to LACNIC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2014-09-10
Updated:        2023-07-06
Ref:            https://rdap.arin.net/registry/ip/45.181.80.0



OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.182.140.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57056
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.182.140.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 19:01:06 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 135.140.182.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.140.182.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.197.255.242 attackbotsspam
[portscan] Port scan
2019-08-08 19:54:59
60.184.124.161 attackspambots
firewall-block, port(s): 2222/tcp
2019-08-08 20:39:58
175.211.116.230 attackspambots
SSH invalid-user multiple login try
2019-08-08 20:47:10
62.173.147.93 attack
Port scan on 3 port(s): 81 84 87
2019-08-08 20:43:45
185.220.102.8 attack
B: zzZZzz blocked content access
2019-08-08 20:05:51
187.162.56.212 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-08 20:14:47
207.46.13.6 attack
Automatic report - Banned IP Access
2019-08-08 20:15:54
185.222.211.114 attackbots
firewall-block, port(s): 5001/tcp, 33012/tcp, 33058/tcp
2019-08-08 20:18:03
106.12.30.229 attackspam
Aug  8 13:10:33 debian sshd\[24810\]: Invalid user dasusr from 106.12.30.229 port 50874
Aug  8 13:10:33 debian sshd\[24810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.229
...
2019-08-08 20:21:13
185.211.245.198 attackspambots
Aug  8 13:59:12 relay postfix/smtpd\[7762\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 14:09:08 relay postfix/smtpd\[22599\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 14:09:23 relay postfix/smtpd\[7762\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 14:09:51 relay postfix/smtpd\[22599\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 14:10:04 relay postfix/smtpd\[22636\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-08 20:44:32
143.0.52.117 attackspam
SSH Brute Force
2019-08-08 20:45:29
51.77.157.78 attack
Automatic report - Banned IP Access
2019-08-08 20:05:22
73.219.180.188 attackspambots
Aug  8 09:54:40 master sshd[31446]: Failed password for invalid user support from 73.219.180.188 port 52070 ssh2
Aug  8 09:54:45 master sshd[31448]: Failed password for invalid user NetLinx from 73.219.180.188 port 57490 ssh2
Aug  8 09:54:50 master sshd[31450]: Failed password for invalid user netscreen from 73.219.180.188 port 36338 ssh2
Aug  8 09:54:53 master sshd[31452]: Failed password for invalid user nexthink from 73.219.180.188 port 42934 ssh2
Aug  8 09:54:57 master sshd[31454]: Failed password for invalid user misp from 73.219.180.188 port 47036 ssh2
Aug  8 09:55:00 master sshd[31456]: Failed password for invalid user osbash from 73.219.180.188 port 52400 ssh2
Aug  8 09:55:03 master sshd[31458]: Failed password for invalid user pi from 73.219.180.188 port 56520 ssh2
Aug  8 09:55:08 master sshd[31460]: Failed password for invalid user pi from 73.219.180.188 port 32806 ssh2
Aug  8 09:55:12 master sshd[31462]: Failed password for invalid user pi from 73.219.180.188 port 40356 ssh2
Aug  8 09:55:16 master
2019-08-08 20:35:38
27.74.175.52 attackbots
Automatic report - Port Scan Attack
2019-08-08 20:16:15
167.99.126.218 attack
firewall-block, port(s): 22/tcp
2019-08-08 20:32:18

最近上报的IP列表

110.78.156.84 2606:4700:10::ac43:1015 2606:4700:10::6814:6159 2606:4700:10::6816:3967
2606:4700:10::6814:6385 2606:4700:10::6816:1748 2606:4700:10::6816:2267 2606:4700:10::ac43:706
52.84.50.0 202.160.86.191 4.232.188.102 221.238.131.250
34.96.52.79 185.241.32.124 2606:4700:10::ac43:1957 2606:4700:10::6814:8076
2606:4700:10::6814:4991 110.78.154.190 2606:4700:10::6816:3338 2606:4700:10::6814:9420