必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Guensberg

省份(region): Solothurn

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.145.64.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58075
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.145.64.66.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010501 1800 900 604800 86400

;; Query time: 130 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 06 05:19:24 CST 2020
;; MSG SIZE  rcvd: 115
HOST信息:
66.64.145.5.in-addr.arpa domain name pointer 66-64-145-5.dyn.cable.fcom.ch.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.64.145.5.in-addr.arpa	name = 66-64-145-5.dyn.cable.fcom.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.241.155.247 attackspambots
DATE:2020-06-07 14:50:53, IP:192.241.155.247, PORT:6379 REDIS brute force auth on honeypot server (honey-neo-dc)
2020-06-07 21:26:15
111.229.50.131 attack
Unauthorized SSH login attempts
2020-06-07 21:00:38
218.92.0.191 attackbots
Jun  7 13:21:42 cdc sshd[1490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191  user=root
Jun  7 13:21:43 cdc sshd[1490]: Failed password for invalid user root from 218.92.0.191 port 60974 ssh2
2020-06-07 21:07:46
193.178.131.133 attackspambots
"Unauthorized connection attempt on SSHD detected"
2020-06-07 21:10:55
121.60.119.70 attack
Jun  5 02:23:12 v2hgb sshd[857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.60.119.70  user=r.r
Jun  5 02:23:14 v2hgb sshd[857]: Failed password for r.r from 121.60.119.70 port 10108 ssh2
Jun  5 02:23:16 v2hgb sshd[857]: Received disconnect from 121.60.119.70 port 10108:11: Bye Bye [preauth]
Jun  5 02:23:16 v2hgb sshd[857]: Disconnected from authenticating user r.r 121.60.119.70 port 10108 [preauth]
Jun  5 02:25:21 v2hgb sshd[960]: Connection closed by 121.60.119.70 port 10110 [preauth]
Jun  5 02:27:03 v2hgb sshd[1115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.60.119.70  user=r.r
Jun  5 02:27:05 v2hgb sshd[1115]: Failed password for r.r from 121.60.119.70 port 10112 ssh2
Jun  5 02:27:06 v2hgb sshd[1115]: Received disconnect from 121.60.119.70 port 10112:11: Bye Bye [preauth]
Jun  5 02:27:06 v2hgb sshd[1115]: Disconnected from authenticating user r.r 121.60.119.70 port 101........
-------------------------------
2020-06-07 21:00:24
90.219.250.51 attack
Automatic report - Port Scan Attack
2020-06-07 21:11:53
93.174.95.106 attackspambots
Jun  7 14:09:01 debian-2gb-nbg1-2 kernel: \[13790486.190118\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.174.95.106 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=120 ID=16217 PROTO=TCP SPT=29011 DPT=5357 WINDOW=40821 RES=0x00 SYN URGP=0
2020-06-07 21:01:00
222.186.190.14 attackbotsspam
Jun  7 14:52:40 home sshd[28976]: Failed password for root from 222.186.190.14 port 13913 ssh2
Jun  7 14:52:42 home sshd[28976]: Failed password for root from 222.186.190.14 port 13913 ssh2
Jun  7 14:52:44 home sshd[28976]: Failed password for root from 222.186.190.14 port 13913 ssh2
...
2020-06-07 20:54:59
45.156.186.188 attack
Jun  7 08:18:44 NPSTNNYC01T sshd[17207]: Failed password for root from 45.156.186.188 port 37820 ssh2
Jun  7 08:22:04 NPSTNNYC01T sshd[17489]: Failed password for root from 45.156.186.188 port 55892 ssh2
...
2020-06-07 21:24:37
185.220.102.8 attack
Jun  7 14:09:08 [Censored Hostname] sshd[10475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.8 
Jun  7 14:09:10 [Censored Hostname] sshd[10475]: Failed password for invalid user admin from 185.220.102.8 port 39463 ssh2[...]
2020-06-07 20:55:42
218.92.0.202 attack
Jun  7 14:08:53 santamaria sshd\[8899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
Jun  7 14:08:54 santamaria sshd\[8899\]: Failed password for root from 218.92.0.202 port 51589 ssh2
Jun  7 14:08:57 santamaria sshd\[8899\]: Failed password for root from 218.92.0.202 port 51589 ssh2
...
2020-06-07 21:07:28
190.143.39.211 attackspambots
2020-06-07T12:53:57.630990shield sshd\[27570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.143.39.211  user=root
2020-06-07T12:54:00.268442shield sshd\[27570\]: Failed password for root from 190.143.39.211 port 45828 ssh2
2020-06-07T12:57:01.469723shield sshd\[28628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.143.39.211  user=root
2020-06-07T12:57:03.364830shield sshd\[28628\]: Failed password for root from 190.143.39.211 port 33096 ssh2
2020-06-07T12:59:54.165242shield sshd\[29926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.143.39.211  user=root
2020-06-07 21:13:52
185.130.184.207 attackbots
[2020-06-07 09:03:42] NOTICE[1288] chan_sip.c: Registration from '' failed for '185.130.184.207:49882' - Wrong password
[2020-06-07 09:03:42] SECURITY[1303] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-07T09:03:42.538-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7733",SessionID="0x7f4d74373c98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.130.184.207/49882",Challenge="759ba608",ReceivedChallenge="759ba608",ReceivedHash="a3431ad36a4afe6faa1455768f931475"
[2020-06-07 09:05:17] NOTICE[1288] chan_sip.c: Registration from '' failed for '185.130.184.207:59653' - Wrong password
[2020-06-07 09:05:17] SECURITY[1303] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-07T09:05:17.755-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2004",SessionID="0x7f4d742d3bb8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.130
...
2020-06-07 21:29:07
222.186.175.216 attackbotsspam
Jun  7 15:22:20 vmi345603 sshd[3574]: Failed password for root from 222.186.175.216 port 53240 ssh2
Jun  7 15:22:23 vmi345603 sshd[3574]: Failed password for root from 222.186.175.216 port 53240 ssh2
...
2020-06-07 21:31:48
5.62.41.147 attack
abuseConfidenceScore blocked for 12h
2020-06-07 21:05:16

最近上报的IP列表

126.181.223.254 182.96.84.226 176.153.51.120 49.146.44.139
70.35.114.92 94.50.162.183 206.46.86.69 75.138.96.252
32.203.202.0 41.204.96.75 97.80.194.204 41.38.224.151
50.92.65.16 95.207.49.74 78.148.30.197 41.38.213.11
197.230.132.6 218.40.67.103 41.34.17.3 35.115.26.64