必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands

运营商(isp): 3NT Solutions LLP

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspambots
"Unrouteable address"
2020-03-28 08:32:57
相同子网IP讨论:
IP 类型 评论内容 时间
5.45.68.133 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 5 - port: 55611 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:26:06
5.45.68.133 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 5 - port: 55608 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:53:40
5.45.68.133 attackspambots
(PERMBLOCK) 5.45.68.133 (NL/Netherlands/-) has had more than 4 temp blocks in the last 86400 secs; Ports: *; Direction: inout; Trigger: LF_PERMBLOCK_COUNT; Logs:
2020-09-30 16:19:14
5.45.68.189 attackbotsspam
Dear Sir / Madam, 
Yesterday, my close friend (Simona Simova) was contacted via fake Facebook profile to be informed that she has a profile on a escort website. While researching via the German phone number used in the advert, we have came across more ads. These profiles are created without her permission and she is now very upset. 

Here is a list of the profiles we have found: 

- https://escortsofia.info/de/sia-11/ (5.45.68.189)
- https://escortsofia.info/de/eleonora-8/ (5.45.68.189)
- https://escortinberlin.info/eleonora-3/ (5.45.68.189)
- https://escortinberlin.info/sia-2/ (5.45.68.189)

We have already hired a lawyer in Germany who will escalate the issue to the authorities.
2020-04-24 03:31:08
5.45.68.19 attackspam
WP Authentication failure
2019-07-15 18:24:20
5.45.68.19 attackspam
SQL Injection Exploit Attempts
2019-07-01 05:07:03
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.45.68.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.45.68.15.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032800 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 08:32:54 CST 2020
;; MSG SIZE  rcvd: 114
HOST信息:
15.68.45.5.in-addr.arpa domain name pointer darkhost.pro.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
15.68.45.5.in-addr.arpa	name = darkhost.pro.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.20.61 attackspambots
Unauthorized connection attempt detected from IP address 106.13.20.61 to port 2220 [J]
2020-01-19 01:54:46
106.13.105.88 attack
Invalid user abc from 106.13.105.88 port 41984
2020-01-19 01:53:48
113.173.94.217 attackbots
Invalid user admin from 113.173.94.217 port 53375
2020-01-19 01:51:08
49.232.97.184 attackspambots
Autoban   49.232.97.184 CONNECT/AUTH
2020-01-19 01:22:34
106.13.77.243 attack
Unauthorized connection attempt detected from IP address 106.13.77.243 to port 2220 [J]
2020-01-19 01:54:15
59.36.245.133 attack
Invalid user admin from 59.36.245.133 port 57187
2020-01-19 01:19:27
178.32.121.111 attackspam
Invalid user ochsner from 178.32.121.111 port 42194
2020-01-19 01:39:48
138.197.143.221 attack
Unauthorized connection attempt detected from IP address 138.197.143.221 to port 2220 [J]
2020-01-19 01:44:47
78.5.19.82 attackbotsspam
Invalid user admin from 78.5.19.82 port 57394
2020-01-19 01:17:03
50.239.163.172 attackspam
Jan 18 17:29:56 cp sshd[4573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.163.172
2020-01-19 01:20:28
178.186.119.96 attackbotsspam
Invalid user admin from 178.186.119.96 port 46595
2020-01-19 01:39:17
183.47.14.74 attackbotsspam
Autoban   183.47.14.74 CONNECT/AUTH
2020-01-19 01:36:53
188.131.238.91 attackbotsspam
Unauthorized connection attempt detected from IP address 188.131.238.91 to port 2220 [J]
2020-01-19 01:34:49
187.189.243.22 attack
Invalid user admin from 187.189.243.22 port 41394
2020-01-19 01:35:20
123.20.8.36 attack
Unauthorized connection attempt detected from IP address 123.20.8.36 to port 22 [J]
2020-01-19 01:48:26

最近上报的IP列表

178.184.64.180 159.233.113.58 185.86.210.78 196.193.0.16
18.122.147.130 104.88.112.82 245.146.140.238 236.244.232.232
123.20.127.34 149.166.62.44 124.20.133.119 153.39.165.232
188.214.39.61 107.221.159.123 119.65.16.221 239.102.192.185
147.243.232.252 90.181.161.1 171.239.212.106 76.95.131.242