必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.80.158.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.80.158.0.			IN	A

;; AUTHORITY SECTION:
.			4	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023091102 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 12 05:35:09 CST 2023
;; MSG SIZE  rcvd: 104
HOST信息:
Host 0.158.80.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.158.80.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.78.72.97 attack
Bruteforce on smtp
2019-09-17 05:33:37
200.127.101.126 attackbotsspam
Sep 16 22:04:41 mout sshd[24292]: Invalid user dms from 200.127.101.126 port 58926
2019-09-17 06:09:47
167.114.152.139 attackbots
Sep 16 20:27:38 hcbbdb sshd\[12874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-167-114-152.net  user=root
Sep 16 20:27:40 hcbbdb sshd\[12874\]: Failed password for root from 167.114.152.139 port 46844 ssh2
Sep 16 20:32:26 hcbbdb sshd\[13361\]: Invalid user bernadete from 167.114.152.139
Sep 16 20:32:26 hcbbdb sshd\[13361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.ip-167-114-152.net
Sep 16 20:32:29 hcbbdb sshd\[13361\]: Failed password for invalid user bernadete from 167.114.152.139 port 35300 ssh2
2019-09-17 05:35:10
43.249.194.245 attackspambots
Sep 16 23:22:18 vps691689 sshd[9433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.249.194.245
Sep 16 23:22:20 vps691689 sshd[9433]: Failed password for invalid user bob from 43.249.194.245 port 52913 ssh2
...
2019-09-17 05:37:13
203.160.132.4 attack
Sep 16 23:08:27 vps01 sshd[20302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.132.4
Sep 16 23:08:29 vps01 sshd[20302]: Failed password for invalid user user from 203.160.132.4 port 34404 ssh2
2019-09-17 05:33:21
39.106.55.144 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-17 06:05:04
83.48.89.147 attack
Sep 17 00:24:06 pkdns2 sshd\[23213\]: Invalid user tpimuser from 83.48.89.147Sep 17 00:24:09 pkdns2 sshd\[23213\]: Failed password for invalid user tpimuser from 83.48.89.147 port 35115 ssh2Sep 17 00:28:16 pkdns2 sshd\[23389\]: Invalid user candice from 83.48.89.147Sep 17 00:28:18 pkdns2 sshd\[23389\]: Failed password for invalid user candice from 83.48.89.147 port 56762 ssh2Sep 17 00:32:19 pkdns2 sshd\[23568\]: Invalid user dayz from 83.48.89.147Sep 17 00:32:21 pkdns2 sshd\[23568\]: Failed password for invalid user dayz from 83.48.89.147 port 50335 ssh2
...
2019-09-17 06:03:22
54.37.121.239 attack
blogonese.net 54.37.121.239 \[16/Sep/2019:20:55:55 +0200\] "POST /wp-login.php HTTP/1.1" 200 5771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 54.37.121.239 \[16/Sep/2019:20:55:55 +0200\] "POST /wp-login.php HTTP/1.1" 200 5731 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-17 06:03:57
51.75.26.51 attack
Sep 16 22:11:41 mail sshd[18676]: Invalid user hadoop from 51.75.26.51
Sep 16 22:11:41 mail sshd[18676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.26.51
Sep 16 22:11:41 mail sshd[18676]: Invalid user hadoop from 51.75.26.51
Sep 16 22:11:43 mail sshd[18676]: Failed password for invalid user hadoop from 51.75.26.51 port 37256 ssh2
Sep 16 22:23:38 mail sshd[4168]: Invalid user ubuntu from 51.75.26.51
...
2019-09-17 05:49:34
62.234.95.55 attackspam
Sep 16 08:51:30 aiointranet sshd\[27325\]: Invalid user peewee from 62.234.95.55
Sep 16 08:51:30 aiointranet sshd\[27325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.55
Sep 16 08:51:32 aiointranet sshd\[27325\]: Failed password for invalid user peewee from 62.234.95.55 port 40918 ssh2
Sep 16 08:56:12 aiointranet sshd\[27697\]: Invalid user sklopaketboss from 62.234.95.55
Sep 16 08:56:12 aiointranet sshd\[27697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.55
2019-09-17 05:47:26
111.35.33.223 attack
Sep 16 22:08:49 host sshd\[28355\]: Invalid user admin from 111.35.33.223 port 30263
Sep 16 22:08:49 host sshd\[28355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.35.33.223
...
2019-09-17 06:09:13
115.62.14.237 attackspambots
" "
2019-09-17 06:15:35
130.61.122.5 attack
Sep 16 23:24:25 core sshd[17097]: Invalid user admin from 130.61.122.5 port 55336
Sep 16 23:24:27 core sshd[17097]: Failed password for invalid user admin from 130.61.122.5 port 55336 ssh2
...
2019-09-17 05:32:00
186.250.48.17 attack
Sep 16 23:51:13 vps647732 sshd[2006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.250.48.17
Sep 16 23:51:15 vps647732 sshd[2006]: Failed password for invalid user opc from 186.250.48.17 port 33694 ssh2
...
2019-09-17 06:00:14
41.74.4.114 attack
Sep 16 21:10:07 ip-172-31-62-245 sshd\[3513\]: Invalid user johnf from 41.74.4.114\
Sep 16 21:10:09 ip-172-31-62-245 sshd\[3513\]: Failed password for invalid user johnf from 41.74.4.114 port 54378 ssh2\
Sep 16 21:14:32 ip-172-31-62-245 sshd\[3548\]: Invalid user ftp from 41.74.4.114\
Sep 16 21:14:34 ip-172-31-62-245 sshd\[3548\]: Failed password for invalid user ftp from 41.74.4.114 port 38604 ssh2\
Sep 16 21:18:54 ip-172-31-62-245 sshd\[3603\]: Invalid user caroot from 41.74.4.114\
2019-09-17 05:40:52

最近上报的IP列表

45.80.0.0 142.93.203.7 206.217.135.66 58.38.125.163
178.99.165.141 129.215.106.235 192.145.131.168 85.239.52.180
172.53.202.154 144.109.92.26 225.151.107.124 15.21.237.161
169.254.227.45 103.102.248.186 15.21.237.243 134.136.35.139
15.73.182.56 163.123.141.50 2a07:db80:bf11:da6c:b5cc:cb9c:d776:eb4c 175.92.36.153