必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.57.135.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.57.135.128.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:01:20 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 128.135.57.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 128.135.57.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.198.5.79 attackbotsspam
Automatic report BANNED IP
2020-07-26 21:00:19
89.7.187.108 attackbots
Jul 26 15:21:35 journals sshd\[82553\]: Invalid user bart from 89.7.187.108
Jul 26 15:21:35 journals sshd\[82553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.7.187.108
Jul 26 15:21:37 journals sshd\[82553\]: Failed password for invalid user bart from 89.7.187.108 port 37927 ssh2
Jul 26 15:26:11 journals sshd\[82989\]: Invalid user jiwoong from 89.7.187.108
Jul 26 15:26:11 journals sshd\[82989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.7.187.108
...
2020-07-26 20:45:15
180.76.162.19 attackbots
2020-07-26T07:52:19.7011931495-001 sshd[17425]: Invalid user eugene from 180.76.162.19 port 37268
2020-07-26T07:52:22.2198051495-001 sshd[17425]: Failed password for invalid user eugene from 180.76.162.19 port 37268 ssh2
2020-07-26T07:55:21.6211081495-001 sshd[17615]: Invalid user bk from 180.76.162.19 port 46176
2020-07-26T07:55:21.6241671495-001 sshd[17615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.162.19
2020-07-26T07:55:21.6211081495-001 sshd[17615]: Invalid user bk from 180.76.162.19 port 46176
2020-07-26T07:55:24.1197451495-001 sshd[17615]: Failed password for invalid user bk from 180.76.162.19 port 46176 ssh2
...
2020-07-26 20:55:39
14.166.217.159 attackspambots
Unauthorised access (Jul 26) SRC=14.166.217.159 LEN=52 TTL=48 ID=22709 DF TCP DPT=445 WINDOW=8192 SYN
2020-07-26 21:05:43
203.236.51.35 attack
Jul 26 14:07:10 sso sshd[14470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.236.51.35
Jul 26 14:07:13 sso sshd[14470]: Failed password for invalid user user5 from 203.236.51.35 port 59410 ssh2
...
2020-07-26 21:03:01
202.175.46.170 attack
Jul 26 19:07:18 itv-usvr-01 sshd[11437]: Invalid user sinus from 202.175.46.170
2020-07-26 20:58:58
66.70.130.155 attackspambots
Jul 26 08:39:55 ny01 sshd[1831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.155
Jul 26 08:39:57 ny01 sshd[1831]: Failed password for invalid user mumbleserver from 66.70.130.155 port 51276 ssh2
Jul 26 08:43:58 ny01 sshd[2525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.155
2020-07-26 20:49:44
117.4.241.135 attack
Jul 26 14:11:05 myvps sshd[9110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.4.241.135 
Jul 26 14:11:06 myvps sshd[9110]: Failed password for invalid user gmodserver from 117.4.241.135 port 56522 ssh2
Jul 26 14:22:37 myvps sshd[16494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.4.241.135 
...
2020-07-26 21:01:32
167.71.210.7 attackspambots
2020-07-26T12:03:20.162216abusebot-2.cloudsearch.cf sshd[29274]: Invalid user cafe from 167.71.210.7 port 46340
2020-07-26T12:03:20.169475abusebot-2.cloudsearch.cf sshd[29274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.7
2020-07-26T12:03:20.162216abusebot-2.cloudsearch.cf sshd[29274]: Invalid user cafe from 167.71.210.7 port 46340
2020-07-26T12:03:22.424108abusebot-2.cloudsearch.cf sshd[29274]: Failed password for invalid user cafe from 167.71.210.7 port 46340 ssh2
2020-07-26T12:10:42.592593abusebot-2.cloudsearch.cf sshd[29295]: Invalid user test from 167.71.210.7 port 35832
2020-07-26T12:10:42.598800abusebot-2.cloudsearch.cf sshd[29295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.7
2020-07-26T12:10:42.592593abusebot-2.cloudsearch.cf sshd[29295]: Invalid user test from 167.71.210.7 port 35832
2020-07-26T12:10:44.532143abusebot-2.cloudsearch.cf sshd[29295]: Failed password fo
...
2020-07-26 20:55:59
115.99.45.77 attack
115.99.45.77 - - [26/Jul/2020:13:06:23 +0100] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
115.99.45.77 - - [26/Jul/2020:13:07:30 +0100] "POST /xmlrpc.php HTTP/1.1" 503 18226 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
115.99.45.77 - - [26/Jul/2020:13:07:31 +0100] "POST /wp-login.php HTTP/1.1" 503 18029 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-07-26 20:44:39
104.198.228.2 attack
Jul 26 14:42:03 home sshd[800919]: Invalid user salah from 104.198.228.2 port 56550
Jul 26 14:42:03 home sshd[800919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.198.228.2 
Jul 26 14:42:03 home sshd[800919]: Invalid user salah from 104.198.228.2 port 56550
Jul 26 14:42:05 home sshd[800919]: Failed password for invalid user salah from 104.198.228.2 port 56550 ssh2
Jul 26 14:45:56 home sshd[801247]: Invalid user francesca from 104.198.228.2 port 41128
...
2020-07-26 20:48:18
217.182.141.253 attackbotsspam
SSH bruteforce
2020-07-26 20:38:24
116.111.184.249 attackbotsspam
Automatic report - Port Scan Attack
2020-07-26 20:53:46
138.121.170.194 attackbotsspam
Jul 26 14:15:51 rotator sshd\[4799\]: Invalid user ars from 138.121.170.194Jul 26 14:15:53 rotator sshd\[4799\]: Failed password for invalid user ars from 138.121.170.194 port 39712 ssh2Jul 26 14:19:25 rotator sshd\[4823\]: Invalid user fahad from 138.121.170.194Jul 26 14:19:27 rotator sshd\[4823\]: Failed password for invalid user fahad from 138.121.170.194 port 59530 ssh2Jul 26 14:23:01 rotator sshd\[5588\]: Invalid user zsk from 138.121.170.194Jul 26 14:23:03 rotator sshd\[5588\]: Failed password for invalid user zsk from 138.121.170.194 port 51118 ssh2
...
2020-07-26 20:26:00
159.65.136.141 attack
2020-07-26T12:45:46.494426shield sshd\[24326\]: Invalid user cp from 159.65.136.141 port 47166
2020-07-26T12:45:46.502600shield sshd\[24326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.141
2020-07-26T12:45:48.611601shield sshd\[24326\]: Failed password for invalid user cp from 159.65.136.141 port 47166 ssh2
2020-07-26T12:48:34.868284shield sshd\[24734\]: Invalid user pio from 159.65.136.141 port 59512
2020-07-26T12:48:34.876380shield sshd\[24734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.141
2020-07-26 20:50:52

最近上报的IP列表

144.159.191.52 217.138.20.7 23.161.117.189 194.69.102.91
22.3.198.34 175.153.149.166 164.239.45.201 201.175.255.242
13.11.170.57 91.195.9.94 104.55.69.101 8.197.99.166
169.61.123.36 37.66.168.79 200.119.131.235 7.8.123.252
247.231.13.201 251.20.201.61 134.40.113.245 140.165.5.225