必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.145.32.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.145.32.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 10:15:13 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 53.32.145.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.32.145.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.85.239.195 attackbots
CMS (WordPress or Joomla) login attempt.
2020-07-18 17:39:02
112.85.42.176 attackspam
[MK-Root1] SSH login failed
2020-07-18 17:45:58
104.231.230.159 attackspambots
2020-07-18T05:51:20.493084jeroenwennink sshd[18447]: Invalid user admin from 104.231.230.159 port 45811
2020-07-18T05:51:20.723590jeroenwennink sshd[18447]: Disconnected from 104.231.230.159 port 45811 [preauth]
2020-07-18T05:51:21.667719jeroenwennink sshd[18452]: Invalid user admin from 104.231.230.159 port 45873
2020-07-18T05:51:21.900154jeroenwennink sshd[18452]: Disconnected from 104.231.230.159 port 45873 [preauth]
2020-07-18T05:51:22.854029jeroenwennink sshd[18454]: Invalid user admin from 104.231.230.159 port 45911
...
2020-07-18 17:37:52
45.179.188.250 attackspambots
Jul 18 05:28:10 mail.srvfarm.net postfix/smtpd[2098113]: warning: unknown[45.179.188.250]: SASL PLAIN authentication failed: 
Jul 18 05:28:10 mail.srvfarm.net postfix/smtpd[2098113]: lost connection after AUTH from unknown[45.179.188.250]
Jul 18 05:30:06 mail.srvfarm.net postfix/smtps/smtpd[2115378]: warning: unknown[45.179.188.250]: SASL PLAIN authentication failed: 
Jul 18 05:30:06 mail.srvfarm.net postfix/smtps/smtpd[2115378]: lost connection after AUTH from unknown[45.179.188.250]
Jul 18 05:38:05 mail.srvfarm.net postfix/smtpd[2115730]: warning: unknown[45.179.188.250]: SASL PLAIN authentication failed:
2020-07-18 18:04:23
64.225.35.135 attackspam
Jul 18 11:01:20 santamaria sshd\[27698\]: Invalid user gpadmin from 64.225.35.135
Jul 18 11:01:21 santamaria sshd\[27698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.35.135
Jul 18 11:01:22 santamaria sshd\[27698\]: Failed password for invalid user gpadmin from 64.225.35.135 port 47586 ssh2
...
2020-07-18 17:57:10
41.182.210.116 attackspambots
Automatic report - XMLRPC Attack
2020-07-18 17:54:23
13.78.170.101 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-18 18:07:15
118.27.12.150 attackbotsspam
Jul 18 06:36:43 124388 sshd[16302]: Invalid user factorio from 118.27.12.150 port 44410
Jul 18 06:36:43 124388 sshd[16302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.12.150
Jul 18 06:36:43 124388 sshd[16302]: Invalid user factorio from 118.27.12.150 port 44410
Jul 18 06:36:45 124388 sshd[16302]: Failed password for invalid user factorio from 118.27.12.150 port 44410 ssh2
Jul 18 06:38:38 124388 sshd[16485]: Invalid user platon from 118.27.12.150 port 46200
2020-07-18 17:45:41
123.6.5.104 attackbots
Jul 18 11:32:52 rancher-0 sshd[436545]: Invalid user santhosh from 123.6.5.104 port 42651
Jul 18 11:32:54 rancher-0 sshd[436545]: Failed password for invalid user santhosh from 123.6.5.104 port 42651 ssh2
...
2020-07-18 17:50:29
159.65.8.65 attackbotsspam
Invalid user trudy from 159.65.8.65 port 49686
2020-07-18 17:52:03
45.181.108.34 attack
Automatic report - Port Scan Attack
2020-07-18 17:50:07
65.52.202.157 attackspam
Jul 18 10:36:16 jane sshd[32330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.52.202.157 
Jul 18 10:36:19 jane sshd[32330]: Failed password for invalid user admin from 65.52.202.157 port 65364 ssh2
...
2020-07-18 17:36:49
20.184.48.24 attackbots
sshd: Failed password for invalid user .... from 20.184.48.24 port 59799 ssh2 (3 attempts)
2020-07-18 17:57:56
112.85.42.189 attackbots
2020-07-18T05:33:06.062428uwu-server sshd[1200191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
2020-07-18T05:33:08.463680uwu-server sshd[1200191]: Failed password for root from 112.85.42.189 port 27976 ssh2
2020-07-18T05:33:06.062428uwu-server sshd[1200191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
2020-07-18T05:33:08.463680uwu-server sshd[1200191]: Failed password for root from 112.85.42.189 port 27976 ssh2
2020-07-18T05:33:12.154274uwu-server sshd[1200191]: Failed password for root from 112.85.42.189 port 27976 ssh2
...
2020-07-18 17:49:35
139.255.100.235 attackspambots
Invalid user rts from 139.255.100.235 port 47320
2020-07-18 17:55:58

最近上报的IP列表

185.108.235.11 189.120.159.24 237.232.222.192 131.155.202.140
136.246.10.33 198.145.235.80 51.128.221.41 152.149.13.137
211.50.223.54 69.64.162.150 161.24.171.37 234.46.245.245
46.21.118.26 252.136.89.201 122.103.112.11 25.152.129.201
56.18.191.152 14.101.224.108 224.158.104.27 124.59.192.103