必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.71.142.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.71.142.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:10:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
148.142.71.45.in-addr.arpa domain name pointer 45-71-142-148.maripa.net.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.142.71.45.in-addr.arpa	name = 45-71-142-148.maripa.net.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.67.83.42 attackspam
Aug  4 19:51:07 prod4 sshd\[9474\]: Failed password for root from 114.67.83.42 port 47402 ssh2
Aug  4 19:55:58 prod4 sshd\[11719\]: Failed password for root from 114.67.83.42 port 51926 ssh2
Aug  4 20:00:21 prod4 sshd\[14137\]: Failed password for root from 114.67.83.42 port 56436 ssh2
...
2020-08-05 03:09:06
45.129.33.40 attackspambots
Port scan detected on ports: 3400[TCP], 3395[TCP], 3394[TCP]
2020-08-05 03:00:53
176.31.102.37 attackbotsspam
2020-08-04T12:40:39.402089linuxbox-skyline sshd[73209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.102.37  user=root
2020-08-04T12:40:41.604050linuxbox-skyline sshd[73209]: Failed password for root from 176.31.102.37 port 56107 ssh2
...
2020-08-05 02:46:24
123.108.35.186 attack
$f2bV_matches
2020-08-05 02:52:03
168.90.29.54 attackbots
Unauthorized connection attempt from IP address 168.90.29.54 on Port 445(SMB)
2020-08-05 03:12:04
52.188.174.102 attack
Aug  4 20:47:10 ip40 sshd[31722]: Failed password for root from 52.188.174.102 port 53794 ssh2
...
2020-08-05 03:00:11
42.113.93.46 attackspam
1596564028 - 08/04/2020 20:00:28 Host: 42.113.93.46/42.113.93.46 Port: 445 TCP Blocked
2020-08-05 02:51:25
84.78.22.160 attackspam
Aug  4 16:11:24 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.208, session=\
Aug  4 16:33:14 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 8 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.208, session=\
Aug  4 16:33:14 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.208, session=\
Aug  4 17:05:25 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 8 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.208, session=\
Aug  4 17:05:25 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=84.78.22.160, lip=10.64.89.
...
2020-08-05 03:10:58
191.253.47.44 attack
Auto Detect Rule!
proto TCP (SYN), 191.253.47.44:55948->gjan.info:1433, len 44
2020-08-05 03:00:34
1.64.70.33 attack
Port probing on unauthorized port 5555
2020-08-05 02:37:40
87.103.126.98 attackspam
Aug  4 20:32:17 OPSO sshd\[9530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.126.98  user=root
Aug  4 20:32:18 OPSO sshd\[9530\]: Failed password for root from 87.103.126.98 port 33172 ssh2
Aug  4 20:36:16 OPSO sshd\[10616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.126.98  user=root
Aug  4 20:36:18 OPSO sshd\[10616\]: Failed password for root from 87.103.126.98 port 52670 ssh2
Aug  4 20:40:12 OPSO sshd\[11357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.126.98  user=root
2020-08-05 02:49:36
104.206.128.78 attackbotsspam
trying to access non-authorized port
2020-08-05 02:49:55
117.2.19.149 attack
Unauthorized connection attempt from IP address 117.2.19.149 on Port 445(SMB)
2020-08-05 02:34:58
188.119.39.29 attack
Unauthorized connection attempt from IP address 188.119.39.29 on Port 445(SMB)
2020-08-05 02:47:45
49.232.106.176 attack
2020-08-05T00:32:49.639683hostname sshd[106675]: Failed password for root from 49.232.106.176 port 40302 ssh2
...
2020-08-05 02:35:24

最近上报的IP列表

184.53.1.231 7.37.134.148 189.22.148.172 185.191.207.212
29.252.213.30 157.178.122.235 185.138.124.236 248.223.187.207
79.192.250.57 24.166.170.222 23.46.144.98 195.170.137.29
143.47.187.253 6.233.6.56 86.78.205.102 152.171.39.26
129.34.120.148 224.210.56.108 61.106.44.244 119.217.138.20