必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Agusan

省份(region): Northern Mindanao

国家(country): Philippines

运营商(isp): DSL

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
Unauthorized connection attempt from IP address 49.145.234.142 on Port 445(SMB)
2020-03-03 04:34:11
相同子网IP讨论:
IP 类型 评论内容 时间
49.145.234.155 spam
Attempted to steal Steam Login Credentials.
2021-01-25 06:01:47
49.145.234.219 attackbots
Unauthorized connection attempt detected from IP address 49.145.234.219 to port 445 [T]
2020-07-01 19:10:24
49.145.234.192 attackbots
Jun 30 14:11:13 venus sshd[22221]: Did not receive identification string from 49.145.234.192
Jun 30 14:11:18 venus sshd[22233]: Invalid user system from 49.145.234.192
Jun 30 14:11:19 venus sshd[22233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.145.234.192 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.145.234.192
2020-07-01 01:29:27
49.145.234.204 attackbots
Unauthorized connection attempt from IP address 49.145.234.204 on Port 445(SMB)
2020-04-29 06:43:17
49.145.234.83 attackbotsspam
Honeypot attack, port: 445, PTR: dsl.49.145.234.83.pldt.net.
2020-03-26 05:46:30
49.145.234.253 attackspam
Unauthorized connection attempt from IP address 49.145.234.253 on Port 445(SMB)
2020-02-22 03:59:50
49.145.234.155 attackspam
Honeypot attack, port: 445, PTR: dsl.49.145.234.155.pldt.net.
2020-02-11 14:03:18
49.145.234.96 attackbotsspam
firewall-block, port(s): 445/tcp
2019-11-26 06:23:27
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.145.234.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.145.234.142.			IN	A

;; AUTHORITY SECTION:
.			387	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030201 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 04:34:08 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
142.234.145.49.in-addr.arpa domain name pointer dsl.49.145.234.142.pldt.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.234.145.49.in-addr.arpa	name = dsl.49.145.234.142.pldt.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.194.204.116 attackspambots
08/05/2019-09:13:14.880711 82.194.204.116 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 80
2019-08-05 21:29:01
119.47.68.118 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=52858)(08050931)
2019-08-05 20:59:02
46.99.172.18 attack
[portscan] tcp/22 [SSH]
*(RWIN=1024)(08050931)
2019-08-05 20:52:35
203.163.244.134 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=53180)(08050931)
2019-08-05 20:43:32
111.251.163.90 attack
[portscan] tcp/23 [TELNET]
*(RWIN=29216)(08050931)
2019-08-05 21:28:08
112.86.91.153 attack
Aug  5 08:23:20 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 112.86.91.153 port 48654 ssh2 (target: 158.69.100.147:22, password: ubnt)
Aug  5 08:23:20 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 112.86.91.153 port 48654 ssh2 (target: 158.69.100.147:22, password: ubnt)
Aug  5 08:23:21 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 112.86.91.153 port 48654 ssh2 (target: 158.69.100.147:22, password: ubnt)
Aug  5 08:23:21 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 112.86.91.153 port 48654 ssh2 (target: 158.69.100.147:22, password: ubnt)
Aug  5 08:23:21 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 112.86.91.153 port 48654 ssh2 (target: 158.69.100.147:22, password: ubnt)
Aug  5 08:23:21 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 112.86.91.153 port 48654 ssh2 (target: 158.69.100.147:22, password: ubnt)
Aug  5 08:23:22 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 11........
------------------------------
2019-08-05 20:48:07
213.14.216.253 attackbots
Unauthorized connection attempt from IP address 213.14.216.253 on Port 445(SMB)
2019-08-05 20:54:29
103.124.90.149 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 20:48:55
139.220.192.57 attackspambots
Probing for vulnerable services
2019-08-05 20:57:50
195.246.57.116 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 21:22:11
59.149.117.108 attackbots
[portscan] tcp/22 [SSH]
*(RWIN=21097)(08050931)
2019-08-05 21:06:19
125.88.158.123 attackspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 21:26:44
14.177.232.173 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08050931)
2019-08-05 21:32:10
61.178.32.88 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 21:05:52
65.182.104.18 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 20:42:41

最近上报的IP列表

197.254.196.78 217.97.189.122 183.166.98.165 146.199.66.34
87.146.210.181 64.225.156.74 35.22.156.217 182.76.80.70
200.244.21.218 80.199.142.23 91.36.70.178 156.204.53.137
27.93.33.162 119.248.65.75 180.20.242.251 125.39.181.33
148.246.169.101 186.35.29.155 92.127.55.77 87.5.244.141