必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Israel

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
45.80.104.195 attackbots
Chat Spam
2020-08-18 08:30:32
45.80.104.119 attackbots
9.260.741,85-03/02 [bc18/m74] PostRequest-Spammer scoring: Lusaka01
2019-11-20 07:30:46
45.80.104.152 attack
Name: 'gekllokjwer'
Street: 'DXJXKCusGwzJU'
City: 'chOjdNXZYEVOMtMwe'
Zip: 'DeRgRoRKaO'
Message: 'Ñåìåé Ïÿòèãîðñê Àòûðàó, Êàçàõñòàí êóïèòü Ýêñòàçè (Mdma) Äçåðæèíñê Äåðáåíò Àõàíãàìà, Øðè-Ëàíêà êóïèòü Ñêîðîñòü ÑÊ êðèñòàëëû (ñîëü-Àëüôà-ÏÂÏ) Îáíèíñê Ìàãíèòîãîðñê
2019-10-22 05:11:19
45.80.104.101 attackbots
45.80.104.101 - - [20/Oct/2019:07:59:55 -0400] "GET /?page=..%2f..%2f..%2fetc%2fpasswd&action=view&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 16395 "https://newportbrassfaucets.com/?page=..%2f..%2f..%2fetc%2fpasswd&action=view&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
...
2019-10-21 01:15:22
45.80.104.109 attackspambots
45.80.104.109 - - [20/Oct/2019:08:03:33 -0400] "GET /?page=products&action=..%2f..%2fetc%2fpasswd%00&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 17152 "https://newportbrassfaucets.com/?page=products&action=..%2f..%2fetc%2fpasswd%00&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
...
2019-10-20 21:57:02
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.80.104.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45183
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.80.104.127.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:50:52 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 127.104.80.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 127.104.80.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.86.188.50 attackspam
Port probing on unauthorized port 445
2020-10-13 16:38:38
185.196.31.30 attack
Unauthorized connection attempt from IP address 185.196.31.30 on Port 445(SMB)
2020-10-13 16:39:13
194.5.207.189 attackspam
Oct 13 10:06:53 ip106 sshd[27678]: Failed password for root from 194.5.207.189 port 49582 ssh2
...
2020-10-13 16:31:48
134.175.236.132 attackspam
Oct 13 07:45:23 *hidden* sshd[44314]: Failed password for invalid user elli from 134.175.236.132 port 41428 ssh2 Oct 13 08:01:25 *hidden* sshd[44633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.236.132 user=root Oct 13 08:01:27 *hidden* sshd[44633]: Failed password for *hidden* from 134.175.236.132 port 56400 ssh2
2020-10-13 16:51:30
46.43.91.160 attack
Unauthorized connection attempt from IP address 46.43.91.160 on Port 445(SMB)
2020-10-13 17:02:28
81.68.126.54 attack
Oct 13 05:49:15 * sshd[1234]: Failed password for root from 81.68.126.54 port 50970 ssh2
2020-10-13 16:47:07
138.59.40.199 attackspambots
Attempted Brute Force (dovecot)
2020-10-13 16:38:14
54.36.180.236 attackspam
$f2bV_matches
2020-10-13 16:52:33
218.92.0.145 attackspam
Oct 13 09:55:49 prod4 sshd\[30665\]: Failed password for root from 218.92.0.145 port 40038 ssh2
Oct 13 09:55:52 prod4 sshd\[30665\]: Failed password for root from 218.92.0.145 port 40038 ssh2
Oct 13 09:55:56 prod4 sshd\[30665\]: Failed password for root from 218.92.0.145 port 40038 ssh2
...
2020-10-13 16:45:20
167.114.3.105 attack
Automatic report BANNED IP
2020-10-13 16:29:02
194.1.168.36 attackbotsspam
Oct 12 17:41:21 shivevps sshd[15912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.1.168.36  user=www-data
Oct 12 17:41:24 shivevps sshd[15912]: Failed password for www-data from 194.1.168.36 port 45588 ssh2
Oct 12 17:45:50 shivevps sshd[16062]: Invalid user yoshitani from 194.1.168.36 port 52660
...
2020-10-13 16:55:24
150.109.57.43 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-10-13 16:45:39
79.124.62.86 attackspam
Oct 13 10:31:06 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=79.124.62.86 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=20695 PROTO=TCP SPT=53030 DPT=1254 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 13 10:31:47 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=79.124.62.86 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=31793 PROTO=TCP SPT=53030 DPT=63135 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 13 10:32:24 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=79.124.62.86 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=28585 PROTO=TCP SPT=53030 DPT=29216 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 13 10:33:50 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=79.124.62.86 DST=217.198.117.163 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=8516 PROTO=TCP SPT=53030 DPT=22402 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 13 10:
...
2020-10-13 17:02:08
46.218.85.122 attack
SSH login attempts.
2020-10-13 16:41:39
158.181.16.127 attackspam
Unauthorized connection attempt from IP address 158.181.16.127 on Port 445(SMB)
2020-10-13 16:33:50

最近上报的IP列表

127.2.52.190 44.83.63.87 115.112.139.139 249.227.56.176
168.155.187.79 21.100.61.175 240.219.162.145 50.30.138.68
14.90.98.61 249.173.13.47 201.13.115.97 236.205.212.150
63.148.197.156 192.71.38.230 156.12.213.118 172.172.177.247
190.226.56.15 230.100.158.15 52.215.179.128 234.136.9.169