必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.221.94.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.221.94.163.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 02:14:50 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
163.94.221.45.in-addr.arpa domain name pointer 45-221-94-163.clearaccess.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
163.94.221.45.in-addr.arpa	name = 45-221-94-163.clearaccess.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.210.6.223 attackbotsspam
Aug  4 06:28:49 ip106 sshd[24547]: Failed password for root from 62.210.6.223 port 58600 ssh2
...
2020-08-04 12:59:20
168.215.61.210 attackbots
Icarus honeypot on github
2020-08-04 13:16:54
106.75.141.160 attackbots
2020-08-04T03:49:58.299650shield sshd\[25415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160  user=root
2020-08-04T03:50:00.317525shield sshd\[25415\]: Failed password for root from 106.75.141.160 port 42666 ssh2
2020-08-04T03:54:24.294129shield sshd\[25799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160  user=root
2020-08-04T03:54:26.161615shield sshd\[25799\]: Failed password for root from 106.75.141.160 port 50432 ssh2
2020-08-04T03:58:46.868476shield sshd\[26157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160  user=root
2020-08-04 12:40:53
212.45.5.162 attackbotsspam
20/8/4@00:53:35: FAIL: Alarm-Network address from=212.45.5.162
20/8/4@00:53:35: FAIL: Alarm-Network address from=212.45.5.162
...
2020-08-04 13:17:20
167.172.50.28 attackbotsspam
167.172.50.28 - - [04/Aug/2020:06:25:09 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.50.28 - - [04/Aug/2020:06:25:11 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.50.28 - - [04/Aug/2020:06:25:17 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 12:46:32
103.254.209.201 attackspambots
Aug  4 06:38:21 server sshd[23249]: Failed password for root from 103.254.209.201 port 35362 ssh2
Aug  4 06:41:15 server sshd[27338]: Failed password for root from 103.254.209.201 port 58943 ssh2
Aug  4 06:44:12 server sshd[31804]: Failed password for root from 103.254.209.201 port 54296 ssh2
2020-08-04 12:46:47
198.211.102.110 attackbotsspam
198.211.102.110 - - [04/Aug/2020:05:31:04 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.211.102.110 - - [04/Aug/2020:05:58:11 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-04 13:03:40
167.99.86.148 attackbots
Aug  4 06:31:32 [host] sshd[29013]: pam_unix(sshd:
Aug  4 06:31:34 [host] sshd[29013]: Failed passwor
Aug  4 06:35:42 [host] sshd[29154]: pam_unix(sshd:
2020-08-04 12:56:49
2607:f298:6:a077::8f1:8dcb attackspambots
2607:f298:6:a077::8f1:8dcb - - [04/Aug/2020:04:58:38 +0100] "POST /wp-login.php HTTP/1.1" 200 2435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2607:f298:6:a077::8f1:8dcb - - [04/Aug/2020:04:58:40 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2607:f298:6:a077::8f1:8dcb - - [04/Aug/2020:04:58:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-04 12:45:00
176.92.112.95 attackbotsspam
Telnet Server BruteForce Attack
2020-08-04 13:13:15
194.26.29.13 attack
[H1.VM7] Blocked by UFW
2020-08-04 12:48:30
61.164.213.198 attack
Aug  4 06:03:44 vps333114 sshd[6721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.213.198  user=root
Aug  4 06:03:46 vps333114 sshd[6721]: Failed password for root from 61.164.213.198 port 57331 ssh2
...
2020-08-04 13:00:07
218.92.0.192 attackspam
Aug  4 06:15:39 srv-ubuntu-dev3 sshd[50892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.192  user=root
Aug  4 06:15:41 srv-ubuntu-dev3 sshd[50892]: Failed password for root from 218.92.0.192 port 25826 ssh2
Aug  4 06:15:39 srv-ubuntu-dev3 sshd[50892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.192  user=root
Aug  4 06:15:41 srv-ubuntu-dev3 sshd[50892]: Failed password for root from 218.92.0.192 port 25826 ssh2
Aug  4 06:15:43 srv-ubuntu-dev3 sshd[50892]: Failed password for root from 218.92.0.192 port 25826 ssh2
...
2020-08-04 13:11:18
78.128.113.42 attackbotsspam
firewall-block, port(s): 1199/tcp, 3133/tcp, 4844/tcp, 5151/tcp, 6622/tcp, 7277/tcp
2020-08-04 13:02:57
101.89.63.136 attackspam
Aug  4 00:11:02 ny01 sshd[11579]: Failed password for root from 101.89.63.136 port 56134 ssh2
Aug  4 00:14:54 ny01 sshd[12094]: Failed password for root from 101.89.63.136 port 50868 ssh2
2020-08-04 12:37:44

最近上报的IP列表

13.25.85.217 210.24.231.158 193.132.157.38 188.225.181.223
95.176.241.90 157.59.172.255 89.183.64.102 88.157.145.248
162.48.209.189 173.124.89.156 147.51.223.59 249.104.162.22
187.119.207.95 71.205.83.138 13.166.203.115 205.169.74.250
175.35.99.69 25.59.220.243 199.163.219.107 141.249.51.226