必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lagoa dos Gatos

省份(region): Pernambuco

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.225.150.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.225.150.138.			IN	A

;; AUTHORITY SECTION:
.			112	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041801 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 19 05:06:53 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
138.150.225.45.in-addr.arpa domain name pointer 138-150-225-45.netgame.net.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.150.225.45.in-addr.arpa	name = 138-150-225-45.netgame.net.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.232.84.211 attack
Chat Spam
2019-09-16 01:38:17
37.191.232.6 attackbots
MYH,DEF GET /shell?busybox
2019-09-16 01:30:56
91.106.193.72 attack
Sep 15 17:03:10 srv206 sshd[25173]: Invalid user clouduser from 91.106.193.72
...
2019-09-16 01:47:33
198.108.66.85 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-16 01:32:34
222.186.15.217 attackbots
Sep 15 19:29:25 eventyay sshd[3456]: Failed password for root from 222.186.15.217 port 14398 ssh2
Sep 15 19:29:34 eventyay sshd[3458]: Failed password for root from 222.186.15.217 port 12925 ssh2
...
2019-09-16 01:37:39
157.230.172.28 attack
Sep 15 19:19:50 core sshd[18445]: Invalid user wt from 157.230.172.28 port 38892
Sep 15 19:19:52 core sshd[18445]: Failed password for invalid user wt from 157.230.172.28 port 38892 ssh2
...
2019-09-16 01:22:20
119.162.213.83 attackspambots
2019-09-15T15:20:39.148310  sshd[19699]: Invalid user pi from 119.162.213.83 port 59294
2019-09-15T15:20:39.223721  sshd[19701]: Invalid user pi from 119.162.213.83 port 59296
2019-09-15T15:20:39.529295  sshd[19699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.162.213.83
2019-09-15T15:20:39.148310  sshd[19699]: Invalid user pi from 119.162.213.83 port 59294
2019-09-15T15:20:41.184842  sshd[19699]: Failed password for invalid user pi from 119.162.213.83 port 59294 ssh2
2019-09-15T15:20:39.590101  sshd[19701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.162.213.83
2019-09-15T15:20:39.223721  sshd[19701]: Invalid user pi from 119.162.213.83 port 59296
2019-09-15T15:20:41.245466  sshd[19701]: Failed password for invalid user pi from 119.162.213.83 port 59296 ssh2
...
2019-09-16 01:51:27
188.254.0.112 attackspambots
Sep 15 07:35:57 tdfoods sshd\[25562\]: Invalid user server from 188.254.0.112
Sep 15 07:35:57 tdfoods sshd\[25562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.112
Sep 15 07:35:59 tdfoods sshd\[25562\]: Failed password for invalid user server from 188.254.0.112 port 33422 ssh2
Sep 15 07:41:12 tdfoods sshd\[26068\]: Invalid user disk from 188.254.0.112
Sep 15 07:41:12 tdfoods sshd\[26068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.112
2019-09-16 01:52:41
51.140.25.59 attackspam
Sep 15 18:38:45 eventyay sshd[2580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.140.25.59
Sep 15 18:38:46 eventyay sshd[2580]: Failed password for invalid user jenkins from 51.140.25.59 port 36456 ssh2
Sep 15 18:43:54 eventyay sshd[2706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.140.25.59
...
2019-09-16 01:25:02
167.71.37.232 attackspambots
web-1 [ssh] SSH Attack
2019-09-16 01:21:33
168.194.251.78 attackspambots
Sep 15 15:05:45 vps sshd[2923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.251.78 
Sep 15 15:05:47 vps sshd[2923]: Failed password for invalid user my from 168.194.251.78 port 38497 ssh2
Sep 15 15:19:50 vps sshd[3580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.251.78 
...
2019-09-16 02:01:02
209.97.169.136 attack
2019-09-15T16:28:46.935887abusebot-3.cloudsearch.cf sshd\[20178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.169.136  user=sshd
2019-09-16 01:12:57
104.131.84.59 attackspambots
Automated report - ssh fail2ban:
Sep 15 19:36:25 authentication failure 
Sep 15 19:36:26 wrong password, user=rochester, port=41054, ssh2
Sep 15 19:40:41 authentication failure
2019-09-16 02:04:21
181.39.37.101 attackspambots
Automatic report - Banned IP Access
2019-09-16 01:48:38
85.206.108.197 attackbotsspam
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-16 01:43:34

最近上报的IP列表

239.218.244.138 100.172.92.111 224.126.150.129 20.149.184.254
137.197.38.102 58.204.168.136 233.127.241.238 118.125.79.128
170.244.248.248 135.244.168.206 164.110.167.112 171.252.27.244
152.235.123.60 137.198.36.128 63.117.241.250 80.240.130.192
164.247.169.195 185.239.155.171 181.101.165.15 242.32.226.113