必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.189.169.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17985
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.189.169.168.			IN	A

;; AUTHORITY SECTION:
.			154	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:47:21 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 168.169.189.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.169.189.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.254.248.128 attackspambots
Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=65019 TCP DPT=8080 WINDOW=48236 SYN 
Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=33846 TCP DPT=8080 WINDOW=48236 SYN 
Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=49242 TCP DPT=8080 WINDOW=48236 SYN 
Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=30575 TCP DPT=8080 WINDOW=48236 SYN 
Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=49689 TCP DPT=8080 WINDOW=39241 SYN 
Unauthorised access (Oct  8) SRC=112.254.248.128 LEN=40 TTL=49 ID=5787 TCP DPT=8080 WINDOW=48236 SYN 
Unauthorised access (Oct  8) SRC=112.254.248.128 LEN=40 TTL=49 ID=2339 TCP DPT=8080 WINDOW=23569 SYN 
Unauthorised access (Oct  7) SRC=112.254.248.128 LEN=40 TTL=49 ID=8072 TCP DPT=8080 WINDOW=48236 SYN
2019-10-11 01:36:03
45.13.231.16 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.13.231.16/ 
 IT - 1H : (71)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IT 
 NAME ASN : ASN204287 
 
 IP : 45.13.231.16 
 
 CIDR : 45.13.228.0/22 
 
 PREFIX COUNT : 29 
 
 UNIQUE IP COUNT : 16640 
 
 
 WYKRYTE ATAKI Z ASN204287 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-10-10 13:50:53 
 
 INFO : Web Crawlers ? Scan Detected and Blocked by ADMIN  - data recovery
2019-10-11 01:50:50
164.132.145.70 attack
2019-10-09 17:40:02 server sshd[67589]: Failed password for invalid user root from 164.132.145.70 port 50510 ssh2
2019-10-11 01:42:35
106.13.221.203 attack
Lines containing failures of 106.13.221.203
Oct  6 17:39:15 shared05 sshd[28756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.221.203  user=r.r
Oct  6 17:39:17 shared05 sshd[28756]: Failed password for r.r from 106.13.221.203 port 37884 ssh2
Oct  6 17:39:18 shared05 sshd[28756]: Received disconnect from 106.13.221.203 port 37884:11: Bye Bye [preauth]
Oct  6 17:39:18 shared05 sshd[28756]: Disconnected from authenticating user r.r 106.13.221.203 port 37884 [preauth]
Oct  6 18:00:47 shared05 sshd[4401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.221.203  user=r.r
Oct  6 18:00:49 shared05 sshd[4401]: Failed password for r.r from 106.13.221.203 port 55688 ssh2
Oct  6 18:00:49 shared05 sshd[4401]: Received disconnect from 106.13.221.203 port 55688:11: Bye Bye [preauth]
Oct  6 18:00:49 shared05 sshd[4401]: Disconnected from authenticating user r.r 106.13.221.203 port 55688 [pr........
------------------------------
2019-10-11 01:57:32
51.254.53.32 attackbots
Oct 10 09:49:47 plusreed sshd[26147]: Invalid user @Wsx!Qaz from 51.254.53.32
...
2019-10-11 01:52:38
106.54.196.110 attack
Oct 10 19:22:16 OPSO sshd\[30766\]: Invalid user Vogue@2017 from 106.54.196.110 port 33728
Oct 10 19:22:16 OPSO sshd\[30766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.196.110
Oct 10 19:22:18 OPSO sshd\[30766\]: Failed password for invalid user Vogue@2017 from 106.54.196.110 port 33728 ssh2
Oct 10 19:26:23 OPSO sshd\[31459\]: Invalid user Vendor@123 from 106.54.196.110 port 40682
Oct 10 19:26:23 OPSO sshd\[31459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.196.110
2019-10-11 01:36:44
134.209.155.167 attackbotsspam
Oct 10 15:47:50 dedicated sshd[5949]: Invalid user Chase@2017 from 134.209.155.167 port 50668
2019-10-11 01:38:07
222.186.180.20 attackspambots
Oct 10 19:40:51 vpn01 sshd[8209]: Failed password for root from 222.186.180.20 port 14190 ssh2
Oct 10 19:41:04 vpn01 sshd[8209]: Failed password for root from 222.186.180.20 port 14190 ssh2
...
2019-10-11 01:54:38
139.217.96.76 attack
Oct 10 16:10:51 localhost sshd\[816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.96.76  user=root
Oct 10 16:10:53 localhost sshd\[816\]: Failed password for root from 139.217.96.76 port 39394 ssh2
Oct 10 16:33:46 localhost sshd\[1114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.96.76  user=root
...
2019-10-11 01:59:54
151.80.254.75 attackbotsspam
$f2bV_matches
2019-10-11 02:16:45
81.247.64.98 attack
Oct 10 15:58:00 vps sshd[27255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.247.64.98 
Oct 10 15:58:01 vps sshd[27255]: Failed password for invalid user it1 from 81.247.64.98 port 62076 ssh2
Oct 10 16:36:03 vps sshd[29101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.247.64.98 
...
2019-10-11 02:02:00
201.95.82.97 attack
Lines containing failures of 201.95.82.97
Oct  7 04:21:26 shared01 sshd[15111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.95.82.97  user=r.r
Oct  7 04:21:29 shared01 sshd[15111]: Failed password for r.r from 201.95.82.97 port 49894 ssh2
Oct  7 04:21:29 shared01 sshd[15111]: Received disconnect from 201.95.82.97 port 49894:11: Bye Bye [preauth]
Oct  7 04:21:29 shared01 sshd[15111]: Disconnected from authenticating user r.r 201.95.82.97 port 49894 [preauth]
Oct  7 04:32:25 shared01 sshd[18157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.95.82.97  user=r.r
Oct  7 04:32:27 shared01 sshd[18157]: Failed password for r.r from 201.95.82.97 port 52888 ssh2
Oct  7 04:32:28 shared01 sshd[18157]: Received disconnect from 201.95.82.97 port 52888:11: Bye Bye [preauth]
Oct  7 04:32:28 shared01 sshd[18157]: Disconnected from authenticating user r.r 201.95.82.97 port 52888 [preauth]
Oct  7 ........
------------------------------
2019-10-11 02:12:31
117.239.219.154 attackspambots
Unauthorised access (Oct 10) SRC=117.239.219.154 LEN=52 TOS=0x08 TTL=116 ID=3928 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-11 02:05:47
2a02:4780:8:a::5 attackbots
xmlrpc attack
2019-10-11 02:05:15
45.136.109.185 attackbotsspam
Multiport scan : 36 ports scanned 10 30 40 103 104 264 400 752 1761 2233 2259 2944 3034 5050 5093 6257 6379 6884 6900 8888 9043 10027 11444 13380 20300 33388 33912 33916 38000 39999 42024 49494 50005 50800 58585 63380
2019-10-11 01:37:38

最近上报的IP列表

45.189.152.55 45.189.207.201 45.190.244.78 45.191.222.82
45.190.159.171 45.190.178.42 45.192.140.162 45.190.158.235
45.189.6.250 45.190.254.68 45.192.140.187 45.192.140.193
45.192.140.53 45.192.140.232 45.192.140.66 45.192.140.54
45.192.143.139 45.192.143.132 45.192.143.111 45.192.143.184