必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Itapoã

省份(region): Distrito Federal

国家(country): Brazil

运营商(isp): Conecta

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
45.185.226.158 attack
Attempted connection to port 5555.
2020-08-14 05:17:37
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.183.8.0 - 45.191.163.255
CIDR:           45.190.0.0/16, 45.191.160.0/22, 45.191.0.0/17, 45.191.128.0/19, 45.183.8.0/21, 45.183.128.0/17, 45.183.16.0/20, 45.188.0.0/15, 45.183.64.0/18, 45.184.0.0/14, 45.183.32.0/19
NetName:        LACNIC
NetHandle:      NET-45-183-8-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Transferred to LACNIC
OriginAS:       
Organization:   Latin American and Caribbean IP address Regional Registry (LACNIC)
RegDate:        2014-09-10
Updated:        2023-03-28
Ref:            https://rdap.arin.net/registry/ip/45.183.8.0

ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois
ResourceLink:  whois.lacnic.net


OrgName:        Latin American and Caribbean IP address Regional Registry
OrgId:          LACNIC
Address:        Rambla Republica de Mexico 6125
City:           Montevideo
StateProv:      
PostalCode:     11400
Country:        UY
RegDate:        2002-07-27
Updated:        2018-03-15
Ref:            https://rdap.arin.net/registry/entity/LACNIC

ReferralServer:  whois://whois.lacnic.net
ResourceLink:  http://lacnic.net/cgi-bin/lacnic/whois

OrgTechHandle: LACNIC-ARIN
OrgTechName:   LACNIC Whois Info
OrgTechPhone:  +598-2604-2222 
OrgTechEmail:  whois-contact@lacnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/LACNIC-ARIN

OrgAbuseHandle: LWI100-ARIN
OrgAbuseName:   LACNIC Whois Info
OrgAbusePhone:  +598-2604-2222 
OrgAbuseEmail:  abuse@lacnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/LWI100-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.lacnic.net.

% IP Client: 124.223.158.242
 % Copyright (c) Nic.br - Use of this data is governed by the Use and
% Privacy Policy at https://registro.br/upp . Distribution,
% commercialization, reproduction, and use for advertising or similar
% purposes are expressly prohibited.
% 2026-02-23T13:02:12-03:00 - 124.223.158.242

inetnum:     45.185.224.0/22
aut-num:     AS269405
abuse-c:     WESIL713
owner:       CONECT TEC TELECOMUNICACOES LTDA
ownerid:     29.788.733/0001-14
responsible: JOSE FAGNER SERAFIM DE QUEIROZ
owner-c:     DAFMA229
tech-c:      WESIL713
inetrev:     45.185.224.0/22
nserver:     ns1.conecttec.net.br [lame - not published]
nsstat:      20260221 TIMEOUT
nslastaa:    20250909
nserver:     ns2.conecttec.net.br [lame - not published]
nsstat:      20260221 TIMEOUT
nslastaa:    20250909
created:     20191004
changed:     20250408

nic-hdl-br:  DAFMA229
person:      DANIELA FLAVIA MANZOLI
created:     20190813
changed:     20230705

nic-hdl-br:  WESIL713
person:      Welinton da Silva
created:     20210618
changed:     20251119

% Security and mail abuse issues should also be addressed to cert.br,
% respectivelly to cert@cert.br and mail-abuse@cert.br
%
% whois.registro.br only accepts exact match queries for domains,
% registrants, contacts, tickets, providers, IPs, and ASNs.
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.185.226.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.185.226.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022300 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 24 00:02:12 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 168.226.185.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.226.185.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.66.254.69 attack
Automatic report - Port Scan Attack
2020-02-17 13:53:09
138.197.5.191 attack
SSH login attempts.
2020-02-17 13:34:39
200.160.111.124 attackbots
port scan and connect, tcp 23 (telnet)
2020-02-17 14:00:25
213.6.172.134 attack
Feb 17 05:54:30 server sshd[260285]: Failed password for invalid user warez from 213.6.172.134 port 47839 ssh2
Feb 17 05:58:17 server sshd[260442]: Failed password for invalid user ftpuser from 213.6.172.134 port 36002 ssh2
Feb 17 06:01:22 server sshd[260600]: Failed password for invalid user joerg from 213.6.172.134 port 50814 ssh2
2020-02-17 13:58:51
185.214.164.58 attackbotsspam
MYH,DEF POST /downloader/meyerbroeken.nl/downloader/
2020-02-17 13:43:36
183.80.60.98 attackbots
Unauthorized connection attempt detected from IP address 183.80.60.98 to port 445
2020-02-17 13:37:16
129.28.149.86 attackspambots
[ 🇳🇱 ] REQUEST: /l.php
2020-02-17 13:18:38
42.57.61.116 attack
Portscan detected
2020-02-17 13:38:34
211.20.188.210 attackbots
SSH login attempts.
2020-02-17 13:17:30
103.44.161.194 attackspambots
SSH login attempts.
2020-02-17 13:30:25
186.249.234.10 attackbotsspam
ssh brute force
2020-02-17 13:32:52
196.219.184.244 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 13:29:56
218.92.0.191 attack
Feb 17 11:09:08 areeb-Workstation sshd[8435]: Failed password for root from 218.92.0.191 port 31200 ssh2
Feb 17 11:09:12 areeb-Workstation sshd[8435]: Failed password for root from 218.92.0.191 port 31200 ssh2
...
2020-02-17 13:48:56
104.218.63.74 attackbots
Automatic report - Banned IP Access
2020-02-17 13:25:24
89.236.112.100 attackspambots
02/17/2020-05:59:21.864580 89.236.112.100 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 85
2020-02-17 13:56:22

最近上报的IP列表

154.28.229.215 104.252.191.112 240e:391:cd2:a920:c89b:3a4b:b43b:a6ce 107.172.195.183
104.164.173.211 103.196.9.169 216.73.216.13 74.7.244.34
74.7.227.58 113.215.188.136 148.98.143.205 123.14.121.63
163.177.3.238 91.196.33.183 223.123.43.3 114.130.69.241
1.80.184.182 18.97.26.1 93.158.90.12 3.93.60.88