必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.42.145.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50723
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.42.145.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:45:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 192.145.42.54.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 192.145.42.54.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.96.155.116 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/118.96.155.116/ 
 
 ID - 1H : (23)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ID 
 NAME ASN : ASN7713 
 
 IP : 118.96.155.116 
 
 CIDR : 118.96.154.0/23 
 
 PREFIX COUNT : 2255 
 
 UNIQUE IP COUNT : 2765312 
 
 
 ATTACKS DETECTED ASN7713 :  
  1H - 1 
  3H - 3 
  6H - 3 
 12H - 3 
 24H - 3 
 
 DateTime : 2020-03-13 13:46:34 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-14 00:44:38
148.66.133.91 attackbots
IP blocked
2020-03-14 00:29:02
148.70.23.131 attackspam
Jan 20 19:40:03 pi sshd[8011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.131 
Jan 20 19:40:06 pi sshd[8011]: Failed password for invalid user km from 148.70.23.131 port 53769 ssh2
2020-03-14 00:18:34
221.226.43.62 attackspambots
Invalid user alice from 221.226.43.62 port 38406
2020-03-14 00:46:40
46.161.27.218 attack
Unauthorized connection attempt detected from IP address 46.161.27.218 to port 5900 [T]
2020-03-14 00:12:57
148.255.190.111 attackspam
Jan 22 00:14:09 pi sshd[16726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.255.190.111  user=root
Jan 22 00:14:12 pi sshd[16726]: Failed password for invalid user root from 148.255.190.111 port 38667 ssh2
2020-03-14 00:33:33
178.62.33.138 attackbots
Invalid user odoo from 178.62.33.138 port 55726
2020-03-14 00:29:39
148.70.183.43 attackbotsspam
Jan  5 18:20:28 pi sshd[12001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.183.43 
Jan  5 18:20:29 pi sshd[12001]: Failed password for invalid user mysql from 148.70.183.43 port 43452 ssh2
2020-03-14 00:24:50
122.52.48.92 attackspambots
detected by Fail2Ban
2020-03-13 23:58:27
191.242.112.62 attackspambots
Unauthorized connection attempt from IP address 191.242.112.62 on Port 445(SMB)
2020-03-14 00:39:37
140.143.245.30 attackbots
DATE:2020-03-13 16:03:27, IP:140.143.245.30, PORT:ssh SSH brute force auth (docker-dc)
2020-03-14 00:38:04
148.72.207.248 attackspambots
Jan 22 07:27:00 pi sshd[18773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.207.248 
Jan 22 07:27:01 pi sshd[18773]: Failed password for invalid user davi from 148.72.207.248 port 35900 ssh2
2020-03-14 00:00:54
46.38.145.156 attack
Mar 13 16:39:51 server postfix/smtpd[4265]: warning: unknown[46.38.145.156]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 13 16:39:57 server postfix/smtpd[4265]: warning: unknown[46.38.145.156]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 13 16:40:07 server postfix/smtpd[4265]: warning: unknown[46.38.145.156]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-03-14 00:11:14
222.186.180.147 attackbotsspam
Mar 13 21:18:00 gw1 sshd[21703]: Failed password for root from 222.186.180.147 port 64080 ssh2
Mar 13 21:18:12 gw1 sshd[21703]: error: maximum authentication attempts exceeded for root from 222.186.180.147 port 64080 ssh2 [preauth]
...
2020-03-14 00:22:04
157.245.158.250 attackbotsspam
(From bray.zoe@googlemail.com)  Precious,

This specific is usually  Plants from Personal  Treatment  Advertisings.

Facial area masks around  high quality which often certificated by means of FOOD AND DRUG ADMINISTRATION can easily  maintain you and your current  household safety.

 Right here we  would love to tell anyone that we have some sort of  a great deal involving KN95 experience hide  and also medical a few tiers ply count mask together with  great  rate.

If a person possess any interest, remember to feel free  to allow you  understand, we are going to mail you typically the  cost intended for your type  recommendation.

For  information, be sure to  see each of our  main  internet site: www.face-mask.ltd and www.n95us.com

Intended for wholesale contact: candace@face-mask.ltd

Thanks and Best  concerns,

Flora
2020-03-14 00:34:40

最近上报的IP列表

63.105.135.238 178.85.133.57 96.57.179.145 207.58.78.96
156.191.197.101 189.7.204.118 195.192.254.32 59.106.214.83
143.219.160.165 16.230.5.239 250.199.37.157 5.123.194.38
122.25.121.97 142.33.180.112 182.154.112.220 45.80.231.247
23.60.167.3 225.152.136.112 4.111.108.240 192.67.139.108