必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): ggsnet Schwaengimatt Genossenschaft

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackspambots
Jun  5 19:42:24 mail.srvfarm.net webmin[3197225]: Non-existent login as oracle from 5.145.101.137
Jun  5 19:42:26 mail.srvfarm.net webmin[3197228]: Non-existent login as oracle from 5.145.101.137
Jun  5 19:42:28 mail.srvfarm.net webmin[3197231]: Non-existent login as oracle from 5.145.101.137
Jun  5 19:42:31 mail.srvfarm.net webmin[3197236]: Non-existent login as oracle from 5.145.101.137
Jun  5 19:42:36 mail.srvfarm.net webmin[3197239]: Non-existent login as oracle from 5.145.101.137
2020-06-07 23:48:43
attack
Apr 25 07:08:46 statusweb1.srvfarm.net webmin[40092]: Non-existent login as admin from 5.145.101.137
Apr 25 07:08:47 statusweb1.srvfarm.net webmin[40095]: Non-existent login as admin from 5.145.101.137
Apr 25 07:08:50 statusweb1.srvfarm.net webmin[40098]: Non-existent login as admin from 5.145.101.137
Apr 25 07:08:53 statusweb1.srvfarm.net webmin[40101]: Non-existent login as admin from 5.145.101.137
Apr 25 07:08:57 statusweb1.srvfarm.net webmin[40108]: Non-existent login as admin from 5.145.101.137
2020-04-25 14:09:45
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.145.101.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.145.101.137.			IN	A

;; AUTHORITY SECTION:
.			515	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042500 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 14:09:35 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
137.101.145.5.in-addr.arpa domain name pointer 137-101-145-5.dyn.cable.fcom.ch.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.101.145.5.in-addr.arpa	name = 137-101-145-5.dyn.cable.fcom.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.234.62.127 attackspam
Netgear DGN Device Remote Command Execution Vulnerability
2020-04-28 19:56:05
23.30.83.122 attack
Unauthorized connection attempt detected from IP address 23.30.83.122 to port 80
2020-04-28 19:54:34
113.165.234.130 attack
Unauthorized connection attempt from IP address 113.165.234.130 on Port 445(SMB)
2020-04-28 20:01:07
147.135.58.239 attackbots
Attempted connection to port 80.
2020-04-28 19:41:41
125.71.166.168 attackbots
Attempted connection to port 1433.
2020-04-28 19:44:50
59.46.177.89 attackspambots
Unauthorized connection attempt from IP address 59.46.177.89 on Port 445(SMB)
2020-04-28 20:19:47
217.20.138.171 attackbots
<6 unauthorized SSH connections
2020-04-28 19:46:55
121.121.99.105 attack
Attempted connection to port 81.
2020-04-28 19:45:09
193.56.28.156 attackspambots
Apr 28 07:46:03 srv01 postfix/smtpd[9310]: warning: unknown[193.56.28.156]: SASL LOGIN authentication failed: authentication failure
Apr 28 07:46:04 srv01 postfix/smtpd[9310]: warning: unknown[193.56.28.156]: SASL LOGIN authentication failed: authentication failure
Apr 28 07:46:04 srv01 postfix/smtpd[9310]: warning: unknown[193.56.28.156]: SASL LOGIN authentication failed: authentication failure
...
2020-04-28 19:54:58
158.140.171.33 attack
Unauthorized connection attempt from IP address 158.140.171.33 on Port 445(SMB)
2020-04-28 20:01:28
179.110.193.52 attackspam
Attempted connection to port 23.
2020-04-28 20:11:51
147.135.107.104 attack
Attempted connection to port 80.
2020-04-28 19:44:13
61.177.172.128 attack
Apr 28 14:15:01 mail sshd[27792]: Failed password for root from 61.177.172.128 port 54386 ssh2
Apr 28 14:15:05 mail sshd[27792]: Failed password for root from 61.177.172.128 port 54386 ssh2
Apr 28 14:15:15 mail sshd[27792]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 54386 ssh2 [preauth]
2020-04-28 20:21:02
66.240.236.119 attackspambots
623/udp 503/tcp 9943/tcp...
[2020-02-27/04-28]197pkt,132pt.(tcp),19pt.(udp)
2020-04-28 19:56:52
14.244.247.152 attackspambots
Attempted connection to port 445.
2020-04-28 20:12:42

最近上报的IP列表

18.212.6.244 104.248.126.88 18.218.156.38 176.226.160.238
18.209.28.211 216.218.217.69 198.199.114.226 178.141.137.249
127.35.171.12 129.211.163.150 131.108.188.142 187.132.209.203
79.101.143.58 179.144.225.249 137.20.174.208 212.40.253.168
74.14.213.225 206.131.148.27 143.157.143.95 152.43.94.65