必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.168.29.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.168.29.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:59:12 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 145.29.168.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.29.168.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
186.87.32.48 attackbotsspam
2020-04-18T08:03:27.145859abusebot.cloudsearch.cf sshd[32242]: Invalid user test from 186.87.32.48 port 47327
2020-04-18T08:03:27.154405abusebot.cloudsearch.cf sshd[32242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.87.32.48
2020-04-18T08:03:27.145859abusebot.cloudsearch.cf sshd[32242]: Invalid user test from 186.87.32.48 port 47327
2020-04-18T08:03:29.194717abusebot.cloudsearch.cf sshd[32242]: Failed password for invalid user test from 186.87.32.48 port 47327 ssh2
2020-04-18T08:07:40.807856abusebot.cloudsearch.cf sshd[32714]: Invalid user admin from 186.87.32.48 port 50544
2020-04-18T08:07:40.814449abusebot.cloudsearch.cf sshd[32714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.87.32.48
2020-04-18T08:07:40.807856abusebot.cloudsearch.cf sshd[32714]: Invalid user admin from 186.87.32.48 port 50544
2020-04-18T08:07:42.252640abusebot.cloudsearch.cf sshd[32714]: Failed password for invalid user
...
2020-04-18 19:05:01
221.228.72.222 attackspambots
Apr 18 09:31:28 shared-1 sshd\[22823\]: Invalid user nexus from 221.228.72.222Apr 18 09:32:45 shared-1 sshd\[22864\]: Invalid user system from 221.228.72.222
...
2020-04-18 19:27:51
119.202.215.121 attack
firewall-block, port(s): 23/tcp
2020-04-18 19:01:45
104.131.13.199 attackbots
(sshd) Failed SSH login from 104.131.13.199 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 18 13:02:07 ubnt-55d23 sshd[21191]: Invalid user ubuntu from 104.131.13.199 port 58878
Apr 18 13:02:09 ubnt-55d23 sshd[21191]: Failed password for invalid user ubuntu from 104.131.13.199 port 58878 ssh2
2020-04-18 19:07:13
128.199.190.18 attack
firewall-block, port(s): 25764/tcp
2020-04-18 18:59:01
66.249.64.152 attack
404 NOT FOUND
2020-04-18 19:08:14
64.225.22.43 attackspam
8243/tcp 3753/tcp 32150/tcp...
[2020-04-12/18]15pkt,6pt.(tcp)
2020-04-18 19:13:10
198.11.181.188 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-04-18 19:21:49
176.121.235.236 attackspambots
firewall-block, port(s): 1433/tcp
2020-04-18 18:55:13
45.113.70.223 attack
Unauthorized connection attempt detected from IP address 45.113.70.223 to port 70
2020-04-18 19:06:04
148.251.99.90 attack
$f2bV_matches
2020-04-18 19:15:22
167.114.92.48 attackbots
firewall-block, port(s): 80/tcp
2020-04-18 18:58:00
193.187.116.190 attack
detected by Fail2Ban
2020-04-18 19:17:15
106.75.157.90 attack
SSH/22 MH Probe, BF, Hack -
2020-04-18 18:49:21
31.16.60.22 attackspambots
Unauthorized connection attempt detected from IP address 31.16.60.22 to port 23
2020-04-18 18:52:09

最近上报的IP列表

139.224.249.140 222.175.21.26 75.100.222.146 25.129.3.74
40.17.156.243 135.16.5.170 106.65.40.136 74.50.45.48
180.110.116.27 168.39.116.155 217.0.111.54 252.197.201.71
29.71.239.50 120.52.27.141 177.67.76.157 152.185.17.155
52.83.229.8 77.221.120.187 244.187.158.101 144.223.92.55