必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Philippines

运营商(isp): Philippine Long Distance Telephone Company

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackspam
1585885617 - 04/03/2020 05:46:57 Host: 49.145.5.132/49.145.5.132 Port: 445 TCP Blocked
2020-04-03 19:30:00
相同子网IP讨论:
IP 类型 评论内容 时间
49.145.59.79 attack
Unauthorized connection attempt from IP address 49.145.59.79 on Port 445(SMB)
2020-08-22 03:40:15
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.145.5.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.145.5.132.			IN	A

;; AUTHORITY SECTION:
.			426	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040300 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 19:29:52 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
132.5.145.49.in-addr.arpa domain name pointer dsl.49.145.5.132.pldt.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.5.145.49.in-addr.arpa	name = dsl.49.145.5.132.pldt.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.187.105.202 attackspambots
Unauthorized connection attempt from IP address 201.187.105.202 on Port 445(SMB)
2019-11-19 06:06:12
188.213.161.105 attack
Nov 18 22:38:04 mail1 sshd\[540\]: Invalid user satya from 188.213.161.105 port 45628
Nov 18 22:38:04 mail1 sshd\[540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.161.105
Nov 18 22:38:06 mail1 sshd\[540\]: Failed password for invalid user satya from 188.213.161.105 port 45628 ssh2
Nov 18 22:42:38 mail1 sshd\[2898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.161.105  user=bin
Nov 18 22:42:40 mail1 sshd\[2898\]: Failed password for bin from 188.213.161.105 port 60282 ssh2
...
2019-11-19 05:47:44
14.162.207.87 attack
Unauthorized connection attempt from IP address 14.162.207.87 on Port 445(SMB)
2019-11-19 05:55:33
152.234.182.65 attack
Automatic report - Port Scan Attack
2019-11-19 05:49:57
159.203.201.14 attack
159.203.201.14 was recorded 5 times by 5 hosts attempting to connect to the following ports: 58099. Incident counter (4h, 24h, all-time): 5, 8, 129
2019-11-19 06:23:13
117.4.197.244 attackspambots
Unauthorized connection attempt from IP address 117.4.197.244 on Port 445(SMB)
2019-11-19 06:09:41
188.162.237.142 attack
Unauthorized connection attempt from IP address 188.162.237.142 on Port 445(SMB)
2019-11-19 06:18:19
111.68.102.73 attack
Unauthorised access (Nov 18) SRC=111.68.102.73 LEN=40 TTL=241 ID=15651 TCP DPT=1433 WINDOW=1024 SYN
2019-11-19 06:22:09
193.194.91.198 attackbots
Nov 18 18:41:59 [host] sshd[10561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.91.198  user=root
Nov 18 18:42:01 [host] sshd[10561]: Failed password for root from 193.194.91.198 port 40462 ssh2
Nov 18 18:45:56 [host] sshd[10624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.91.198  user=root
2019-11-19 06:22:43
138.68.57.99 attackbots
Nov 18 21:15:04 venus sshd\[29451\]: Invalid user yellowst from 138.68.57.99 port 40374
Nov 18 21:15:04 venus sshd\[29451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.99
Nov 18 21:15:06 venus sshd\[29451\]: Failed password for invalid user yellowst from 138.68.57.99 port 40374 ssh2
...
2019-11-19 06:21:10
180.248.120.146 attackbotsspam
Unauthorized connection attempt from IP address 180.248.120.146 on Port 445(SMB)
2019-11-19 06:03:53
125.165.51.62 attackspam
Unauthorized connection attempt from IP address 125.165.51.62 on Port 445(SMB)
2019-11-19 06:23:58
113.176.13.166 attackbotsspam
Unauthorized connection attempt from IP address 113.176.13.166 on Port 445(SMB)
2019-11-19 05:50:26
222.186.173.183 attack
2019-11-18T13:30:49.145903ns386461 sshd\[9000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
2019-11-18T13:30:50.761615ns386461 sshd\[9000\]: Failed password for root from 222.186.173.183 port 58880 ssh2
2019-11-18T13:30:53.878474ns386461 sshd\[9000\]: Failed password for root from 222.186.173.183 port 58880 ssh2
2019-11-18T13:30:57.210410ns386461 sshd\[9000\]: Failed password for root from 222.186.173.183 port 58880 ssh2
2019-11-18T13:31:00.286835ns386461 sshd\[9000\]: Failed password for root from 222.186.173.183 port 58880 ssh2
2019-11-18T13:31:03.108438ns386461 sshd\[9000\]: Failed password for root from 222.186.173.183 port 58880 ssh2
2019-11-18T13:31:03.108582ns386461 sshd\[9000\]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 58880 ssh2 \[preauth\]
2019-11-18T13:30:49.145903ns386461 sshd\[9000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=
...
2019-11-19 05:58:32
41.65.64.36 attackbotsspam
ssh failed login
2019-11-19 06:14:44

最近上报的IP列表

103.110.90.210 113.161.222.53 196.179.232.191 151.255.3.215
189.183.253.9 92.42.209.3 106.13.39.34 171.250.127.181
14.254.17.131 125.26.214.107 112.78.179.46 111.40.34.59
113.87.225.180 49.233.180.139 117.5.217.193 104.244.75.19
14.249.48.78 104.41.143.165 64.94.32.198 159.192.233.171