必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Oman

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Omani Qatari Telecommunications Company SAOC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.162.45.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14766
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.162.45.157.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 30 01:14:09 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
157.45.162.5.in-addr.arpa domain name pointer dynamic.isp.ooredoo.om.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
157.45.162.5.in-addr.arpa	name = dynamic.isp.ooredoo.om.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.133.34.2 attackspambots
Automatic report - Port Scan Attack
2020-03-14 05:29:08
45.119.215.68 attack
Mar 14 02:13:06 gw1 sshd[29319]: Failed password for root from 45.119.215.68 port 35312 ssh2
...
2020-03-14 06:03:52
116.108.242.191 attackspam
2020-03-13 22:16:03 H=\(\[116.108.242.191\]\) \[116.108.242.191\]:32168 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2020-03-13 22:16:30 H=\(\[116.108.242.191\]\) \[116.108.242.191\]:32291 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2020-03-13 22:16:55 H=\(\[116.108.242.191\]\) \[116.108.242.191\]:32386 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-03-14 05:40:27
129.226.73.26 attackbotsspam
Mar 13 22:10:29 vps647732 sshd[3762]: Failed password for root from 129.226.73.26 port 51574 ssh2
Mar 13 22:17:10 vps647732 sshd[3973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.73.26
...
2020-03-14 05:32:34
118.70.43.181 attack
1584134222 - 03/13/2020 22:17:02 Host: 118.70.43.181/118.70.43.181 Port: 445 TCP Blocked
2020-03-14 05:36:13
106.52.96.44 attack
Mar 13 22:16:26 haigwepa sshd[6712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.96.44 
Mar 13 22:16:29 haigwepa sshd[6712]: Failed password for invalid user ts3server from 106.52.96.44 port 35570 ssh2
...
2020-03-14 06:03:20
83.219.1.26 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/83.219.1.26/ 
 
 RU - 1H : (302)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 83.219.1.26 
 
 CIDR : 83.219.0.0/19 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 ATTACKS DETECTED ASN12389 :  
  1H - 4 
  3H - 11 
  6H - 16 
 12H - 28 
 24H - 28 
 
 DateTime : 2020-03-13 22:16:30 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-14 06:00:11
222.186.175.215 attack
Mar 13 22:56:50 nextcloud sshd\[12327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Mar 13 22:56:51 nextcloud sshd\[12327\]: Failed password for root from 222.186.175.215 port 31194 ssh2
Mar 13 22:56:55 nextcloud sshd\[12327\]: Failed password for root from 222.186.175.215 port 31194 ssh2
2020-03-14 05:59:36
197.221.90.54 attackbots
B: f2b postfix aggressive 3x
2020-03-14 05:34:46
58.211.191.20 attackbotsspam
2020-03-13T22:16:44.723073vps773228.ovh.net sshd[9909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.211.191.20  user=root
2020-03-13T22:16:46.255614vps773228.ovh.net sshd[9909]: Failed password for root from 58.211.191.20 port 58754 ssh2
2020-03-13T22:20:57.224158vps773228.ovh.net sshd[11420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.211.191.20  user=root
2020-03-13T22:20:59.157866vps773228.ovh.net sshd[11420]: Failed password for root from 58.211.191.20 port 55950 ssh2
2020-03-13T22:22:51.993747vps773228.ovh.net sshd[12104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.211.191.20  user=root
2020-03-13T22:22:54.243143vps773228.ovh.net sshd[12104]: Failed password for root from 58.211.191.20 port 55436 ssh2
2020-03-13T22:24:40.671341vps773228.ovh.net sshd[12751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
...
2020-03-14 05:56:27
193.31.74.218 attack
Chat Spam
2020-03-14 06:04:07
117.69.150.169 attackbots
Forbidden directory scan :: 2020/03/13 21:16:48 [error] 36085#36085: *1921063 access forbidden by rule, client: 117.69.150.169, server: [censored_1], request: "GET /knowledge-base/... HTTP/1.1", host: "www.[censored_1]"
2020-03-14 05:46:33
112.85.42.188 attack
03/13/2020-17:27:52.815420 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-14 05:29:51
159.65.158.30 attackspam
(sshd) Failed SSH login from 159.65.158.30 (IN/India/-): 10 in the last 3600 secs
2020-03-14 05:27:47
222.186.169.192 attackspam
2020-03-13T21:37:20.769399dmca.cloudsearch.cf sshd[19375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-03-13T21:37:22.316893dmca.cloudsearch.cf sshd[19375]: Failed password for root from 222.186.169.192 port 45656 ssh2
2020-03-13T21:37:25.501394dmca.cloudsearch.cf sshd[19375]: Failed password for root from 222.186.169.192 port 45656 ssh2
2020-03-13T21:37:20.769399dmca.cloudsearch.cf sshd[19375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-03-13T21:37:22.316893dmca.cloudsearch.cf sshd[19375]: Failed password for root from 222.186.169.192 port 45656 ssh2
2020-03-13T21:37:25.501394dmca.cloudsearch.cf sshd[19375]: Failed password for root from 222.186.169.192 port 45656 ssh2
2020-03-13T21:37:20.769399dmca.cloudsearch.cf sshd[19375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user
...
2020-03-14 05:41:40

最近上报的IP列表

91.148.141.114 214.251.110.220 107.39.24.107 62.108.214.146
87.18.236.121 183.97.8.219 96.92.128.201 151.170.0.19
141.161.179.83 166.35.202.160 181.58.188.81 55.121.134.230
122.54.227.6 14.206.212.115 136.187.204.195 140.132.3.228
122.143.175.13 173.201.140.207 216.171.33.102 124.87.83.30