必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Reykjavík

省份(region): Höfuðborgarsvæði

国家(country): Iceland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       45.80.0.0 - 45.88.215.255
CIDR:           45.80.0.0/13, 45.88.128.0/18, 45.88.192.0/20, 45.88.208.0/21, 45.88.0.0/17
NetName:        RIPE
NetHandle:      NET-45-80-0-0-1
Parent:         NET45 (NET-45-0-0-0-0)
NetType:        Early Registrations, Transferred to RIPE NCC
OriginAS:       
Organization:   RIPE Network Coordination Centre (RIPE)
RegDate:        2014-09-05
Updated:        2025-02-10
Comment:        These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref:            https://rdap.arin.net/registry/ip/45.80.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.ripe.net


OrgName:        RIPE Network Coordination Centre
OrgId:          RIPE
Address:        P.O. Box 10096
City:           Amsterdam
StateProv:      
PostalCode:     1001EB
Country:        NL
RegDate:        
Updated:        2013-07-29
Ref:            https://rdap.arin.net/registry/entity/RIPE

ReferralServer:  whois.ripe.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: RNO29-ARIN
OrgTechName:   RIPE NCC Operations
OrgTechPhone:  +31 20 535 4444 
OrgTechEmail:  hostmaster@ripe.net
OrgTechRef:    https://rdap.arin.net/registry/entity/RNO29-ARIN

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName:   Abuse Contact
OrgAbusePhone:  +31205354444 
OrgAbuseEmail:  abuse@ripe.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE3850-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.83.21.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28509
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.83.21.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012900 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 30 00:15:07 CST 2026
;; MSG SIZE  rcvd: 104
HOST信息:
42.21.83.45.in-addr.arpa domain name pointer vm4712886.example.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.21.83.45.in-addr.arpa	name = vm4712886.example.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.117.169.18 attack
2019-08-28 19:53:16,040 fail2ban.actions        \[1817\]: NOTICE  \[ssh\] Ban 193.117.169.18
2019-08-28 20:12:22,860 fail2ban.actions        \[1817\]: NOTICE  \[ssh\] Ban 193.117.169.18
2019-08-28 20:31:48,837 fail2ban.actions        \[1817\]: NOTICE  \[ssh\] Ban 193.117.169.18
2019-08-28 20:51:21,973 fail2ban.actions        \[1817\]: NOTICE  \[ssh\] Ban 193.117.169.18
2019-08-28 21:10:47,311 fail2ban.actions        \[1817\]: NOTICE  \[ssh\] Ban 193.117.169.18
...
2019-09-02 15:35:58
191.232.198.212 attack
Sep  2 08:51:38 eventyay sshd[780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.198.212
Sep  2 08:51:40 eventyay sshd[780]: Failed password for invalid user bernard from 191.232.198.212 port 54118 ssh2
Sep  2 08:57:21 eventyay sshd[2302]: Failed password for mail from 191.232.198.212 port 44462 ssh2
...
2019-09-02 15:11:18
24.232.29.188 attackspam
SSH invalid-user multiple login try
2019-09-02 15:12:51
167.71.80.101 attack
SSH Brute Force, server-1 sshd[17604]: Failed password for invalid user yq from 167.71.80.101 port 58784 ssh2
2019-09-02 15:46:13
165.22.106.224 attack
Sep  1 20:32:19 hiderm sshd\[12157\]: Invalid user viktor from 165.22.106.224
Sep  1 20:32:19 hiderm sshd\[12157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.106.224
Sep  1 20:32:21 hiderm sshd\[12157\]: Failed password for invalid user viktor from 165.22.106.224 port 37970 ssh2
Sep  1 20:38:13 hiderm sshd\[12635\]: Invalid user mx from 165.22.106.224
Sep  1 20:38:13 hiderm sshd\[12635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.106.224
2019-09-02 14:48:42
113.193.30.98 attack
Sep  2 06:25:11 ip-172-31-1-72 sshd\[31123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.30.98  user=ftp
Sep  2 06:25:13 ip-172-31-1-72 sshd\[31123\]: Failed password for ftp from 113.193.30.98 port 20609 ssh2
Sep  2 06:29:46 ip-172-31-1-72 sshd\[31254\]: Invalid user karika from 113.193.30.98
Sep  2 06:29:46 ip-172-31-1-72 sshd\[31254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.30.98
Sep  2 06:29:48 ip-172-31-1-72 sshd\[31254\]: Failed password for invalid user karika from 113.193.30.98 port 15287 ssh2
2019-09-02 15:05:13
116.58.241.78 attack
REQUESTED PAGE: ../../mnt/custom/ProductDefinition
2019-09-02 15:30:23
222.73.205.94 attack
Sep  2 06:27:43 MK-Soft-VM4 sshd\[31333\]: Invalid user ww from 222.73.205.94 port 33312
Sep  2 06:27:43 MK-Soft-VM4 sshd\[31333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.205.94
Sep  2 06:27:45 MK-Soft-VM4 sshd\[31333\]: Failed password for invalid user ww from 222.73.205.94 port 33312 ssh2
...
2019-09-02 14:49:05
206.189.190.32 attack
Sep  1 17:54:26 aiointranet sshd\[1373\]: Invalid user firebird from 206.189.190.32
Sep  1 17:54:26 aiointranet sshd\[1373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.190.32
Sep  1 17:54:27 aiointranet sshd\[1373\]: Failed password for invalid user firebird from 206.189.190.32 port 39504 ssh2
Sep  1 17:58:22 aiointranet sshd\[1743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.190.32  user=postfix
Sep  1 17:58:24 aiointranet sshd\[1743\]: Failed password for postfix from 206.189.190.32 port 54730 ssh2
2019-09-02 15:34:49
133.130.109.100 attackbots
6379/tcp 8080/tcp 8161/tcp...
[2019-07-03/09-02]48pkt,3pt.(tcp)
2019-09-02 14:46:00
106.12.36.21 attackspambots
Sep  2 07:04:44 www4 sshd\[37393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.21  user=root
Sep  2 07:04:46 www4 sshd\[37393\]: Failed password for root from 106.12.36.21 port 44150 ssh2
Sep  2 07:07:16 www4 sshd\[37821\]: Invalid user hadoop from 106.12.36.21
Sep  2 07:07:16 www4 sshd\[37821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.21
...
2019-09-02 15:42:38
103.248.25.171 attackspam
Sep  2 08:21:55 DAAP sshd[6755]: Invalid user cmsftp from 103.248.25.171 port 39012
...
2019-09-02 14:58:14
223.243.29.102 attackspam
Sep  2 07:20:59 rotator sshd\[4207\]: Invalid user weixin from 223.243.29.102Sep  2 07:21:01 rotator sshd\[4207\]: Failed password for invalid user weixin from 223.243.29.102 port 35106 ssh2Sep  2 07:24:12 rotator sshd\[4235\]: Failed password for root from 223.243.29.102 port 33166 ssh2Sep  2 07:27:26 rotator sshd\[5060\]: Invalid user test from 223.243.29.102Sep  2 07:27:27 rotator sshd\[5060\]: Failed password for invalid user test from 223.243.29.102 port 59478 ssh2Sep  2 07:30:41 rotator sshd\[5828\]: Invalid user mysql from 223.243.29.102
...
2019-09-02 15:21:16
46.101.76.236 attackbotsspam
Sep  1 20:26:46 lcdev sshd\[15123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236  user=root
Sep  1 20:26:48 lcdev sshd\[15123\]: Failed password for root from 46.101.76.236 port 47440 ssh2
Sep  1 20:34:08 lcdev sshd\[15740\]: Invalid user jv from 46.101.76.236
Sep  1 20:34:08 lcdev sshd\[15740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.76.236
Sep  1 20:34:10 lcdev sshd\[15740\]: Failed password for invalid user jv from 46.101.76.236 port 35846 ssh2
2019-09-02 14:48:03
211.20.181.186 attackbotsspam
Sep  2 14:00:03 itv-usvr-01 sshd[1494]: Invalid user ashok from 211.20.181.186
Sep  2 14:00:11 itv-usvr-01 sshd[1494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.20.181.186
Sep  2 14:00:03 itv-usvr-01 sshd[1494]: Invalid user ashok from 211.20.181.186
Sep  2 14:00:14 itv-usvr-01 sshd[1494]: Failed password for invalid user ashok from 211.20.181.186 port 6151 ssh2
2019-09-02 15:44:10

最近上报的IP列表

81.70.185.61 192.71.12.181 165.22.222.13 117.35.182.147
39.100.70.23 20.84.117.189 199.45.155.67 77.237.68.140
66.249.76.234 44.234.121.207 107.170.17.98 45.83.21.240
203.208.187.69 85.217.140.6 67.213.82.18 100.53.127.71
18.97.19.246 159.203.115.22 199.45.155.66 47.236.18.91