必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Iran (ISLAMIC Republic Of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.9.254.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25840
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.9.254.14.			IN	A

;; AUTHORITY SECTION:
.			423	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112701 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 28 13:25:50 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 14.254.9.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.254.9.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.104.193.185 attackspambots
Unauthorised access (Nov  8) SRC=103.104.193.185 LEN=52 TOS=0x10 PREC=0x40 TTL=116 ID=28689 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-08 16:04:57
115.84.95.133 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-08 16:39:06
42.54.115.205 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-08 16:34:24
58.87.120.53 attackbots
Nov  8 09:07:00 SilenceServices sshd[14937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53
Nov  8 09:07:02 SilenceServices sshd[14937]: Failed password for invalid user snowbal from 58.87.120.53 port 44148 ssh2
Nov  8 09:12:05 SilenceServices sshd[16439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53
2019-11-08 16:30:52
218.246.5.114 attackbotsspam
Nov  8 09:06:05 server sshd\[541\]: Invalid user alex from 218.246.5.114
Nov  8 09:06:05 server sshd\[541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.246.5.114 
Nov  8 09:06:06 server sshd\[541\]: Failed password for invalid user alex from 218.246.5.114 port 56416 ssh2
Nov  8 09:29:12 server sshd\[6247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.246.5.114  user=root
Nov  8 09:29:14 server sshd\[6247\]: Failed password for root from 218.246.5.114 port 57780 ssh2
...
2019-11-08 16:08:53
185.23.200.231 attackspam
Nov  7 11:19:22 Aberdeen-m4-Access auth.info sshd[8064]: Failed password for r.r from 185.23.200.231 port 46130 ssh2
Nov  7 11:19:22 Aberdeen-m4-Access auth.notice sshguard[2827]: Attack from "185.23.200.231" on service 100 whostnameh danger 10.
Nov  7 11:19:22 Aberdeen-m4-Access auth.info sshd[8064]: Received disconnect from 185.23.200.231 port 46130:11: Bye Bye [preauth]
Nov  7 11:19:22 Aberdeen-m4-Access auth.info sshd[8064]: Disconnected from 185.23.200.231 port 46130 [preauth]
Nov  7 11:19:22 Aberdeen-m4-Access auth.notice sshguard[2827]: Attack from "185.23.200.231" on service 100 whostnameh danger 10.
Nov  7 11:19:22 Aberdeen-m4-Access auth.notice sshguard[2827]: Attack from "185.23.200.231" on service 100 whostnameh danger 10.
Nov  7 11:19:22 Aberdeen-m4-Access auth.warn sshguard[2827]: Blocking "185.23.200.231/32" for 240 secs (3 attacks in 0 secs, after 2 abuses over 1118 secs.)
Nov  7 11:26:21 Aberdeen-m4-Access auth.info sshd[12174]: Failed password for r.r f........
------------------------------
2019-11-08 16:39:44
106.13.127.238 attack
Nov  8 08:46:47 vps647732 sshd[21947]: Failed password for root from 106.13.127.238 port 57224 ssh2
...
2019-11-08 16:08:22
180.183.182.106 attack
Chat Spam
2019-11-08 16:32:58
157.167.52.180 attackspam
POST /wp-admin/admin-ajax.php HTTP/1.1 200 372 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.87 Safari/537.36
2019-11-08 16:29:05
46.38.144.179 attackbots
Nov  8 09:10:21 webserver postfix/smtpd\[23302\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 09:11:34 webserver postfix/smtpd\[23302\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 09:12:43 webserver postfix/smtpd\[23302\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 09:13:50 webserver postfix/smtpd\[23492\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  8 09:15:01 webserver postfix/smtpd\[23492\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-08 16:16:48
139.99.5.223 attackspambots
2019-11-08T08:31:08.186192mail01 postfix/smtpd[31209]: warning: ip223.ip-139-99-5.net[139.99.5.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08T08:32:38.204450mail01 postfix/smtpd[22413]: warning: ip223.ip-139-99-5.net[139.99.5.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08T08:35:58.475070mail01 postfix/smtpd[10215]: warning: ip223.ip-139-99-5.net[139.99.5.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08 16:14:27
140.143.69.34 attack
Nov  8 07:50:42 ms-srv sshd[6391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.69.34  user=root
Nov  8 07:50:44 ms-srv sshd[6391]: Failed password for invalid user root from 140.143.69.34 port 29173 ssh2
2019-11-08 16:29:34
115.84.76.5 attackspam
Nov  8 07:28:50 cvbnet sshd[21137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.76.5 
Nov  8 07:28:51 cvbnet sshd[21137]: Failed password for invalid user admin from 115.84.76.5 port 56584 ssh2
...
2019-11-08 16:24:29
91.228.96.156 attack
[portscan] Port scan
2019-11-08 16:23:13
49.234.115.143 attack
Nov  8 03:26:47 plusreed sshd[19274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.115.143  user=root
Nov  8 03:26:49 plusreed sshd[19274]: Failed password for root from 49.234.115.143 port 32972 ssh2
...
2019-11-08 16:36:24

最近上报的IP列表

244.20.232.96 209.157.54.185 26.170.131.74 244.179.251.91
192.95.108.127 62.210.148.175 197.188.203.247 163.47.36.14
81.213.102.96 160.20.13.28 24.133.193.181 223.11.158.211
79.94.190.16 76.162.11.143 142.146.178.38 105.15.65.250
130.172.137.218 67.49.79.176 204.50.126.91 75.109.19.20