必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Lithuania

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 78.56.99.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;78.56.99.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:43:54 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
145.99.56.78.in-addr.arpa domain name pointer 78-56-99-145.static.zebra.lt.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.99.56.78.in-addr.arpa	name = 78-56-99-145.static.zebra.lt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.229.102.56 attackbotsspam
Mar 25 13:50:15 debian-2gb-nbg1-2 kernel: \[7399694.826101\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.229.102.56 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=245 ID=15572 PROTO=TCP SPT=42745 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-25 22:10:11
52.183.211.109 attackbotsspam
Mar 25 15:16:48 Ubuntu-1404-trusty-64-minimal sshd\[23257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.183.211.109  user=root
Mar 25 15:16:50 Ubuntu-1404-trusty-64-minimal sshd\[23257\]: Failed password for root from 52.183.211.109 port 56818 ssh2
Mar 25 15:18:34 Ubuntu-1404-trusty-64-minimal sshd\[24457\]: Invalid user cacti from 52.183.211.109
Mar 25 15:18:34 Ubuntu-1404-trusty-64-minimal sshd\[24457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.183.211.109
Mar 25 15:18:36 Ubuntu-1404-trusty-64-minimal sshd\[24457\]: Failed password for invalid user cacti from 52.183.211.109 port 43020 ssh2
2020-03-25 22:20:53
61.244.196.102 attackbots
61.244.196.102 - - [25/Mar/2020:14:01:27 +0100] "GET /wp-login.php HTTP/1.1" 200 5688 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
61.244.196.102 - - [25/Mar/2020:14:01:30 +0100] "POST /wp-login.php HTTP/1.1" 200 6587 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
61.244.196.102 - - [25/Mar/2020:14:01:33 +0100] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-25 22:36:13
71.6.199.23 attackspam
Unauthorized connection attempt detected from IP address 71.6.199.23 to port 8334
2020-03-25 21:51:08
121.204.145.50 attackbots
Invalid user store from 121.204.145.50 port 36778
2020-03-25 21:59:42
218.30.107.46 attack
Mar 25 15:15:03 mout sshd[8649]: Invalid user system from 218.30.107.46 port 41915
2020-03-25 22:41:00
101.236.60.31 attack
Invalid user vilhemina from 101.236.60.31 port 52479
2020-03-25 22:04:39
92.118.37.70 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-25 22:20:35
77.247.109.240 attack
$f2bV_matches
2020-03-25 22:43:11
103.232.215.19 attack
Invalid user bw from 103.232.215.19 port 50730
2020-03-25 22:30:08
49.84.233.128 attackbots
$f2bV_matches
2020-03-25 22:09:43
111.230.221.58 attackspambots
DATE:2020-03-25 13:50:16, IP:111.230.221.58, PORT:ssh SSH brute force auth (docker-dc)
2020-03-25 22:08:29
167.99.203.202 attackspambots
firewall-block, port(s): 15065/tcp
2020-03-25 22:11:35
185.53.88.43 attack
firewall-block, port(s): 5060/udp
2020-03-25 22:01:32
64.225.24.239 attack
Mar 25 12:47:04 ip-172-31-62-245 sshd\[25808\]: Invalid user yd from 64.225.24.239\
Mar 25 12:47:06 ip-172-31-62-245 sshd\[25808\]: Failed password for invalid user yd from 64.225.24.239 port 46354 ssh2\
Mar 25 12:51:57 ip-172-31-62-245 sshd\[25859\]: Invalid user shiyao from 64.225.24.239\
Mar 25 12:51:59 ip-172-31-62-245 sshd\[25859\]: Failed password for invalid user shiyao from 64.225.24.239 port 50572 ssh2\
Mar 25 12:54:29 ip-172-31-62-245 sshd\[25902\]: Invalid user ophira from 64.225.24.239\
2020-03-25 22:20:06

最近上报的IP列表

149.85.127.46 21.136.63.151 144.237.138.213 26.153.245.198
205.211.17.227 56.21.223.227 211.121.252.230 159.250.185.4
135.201.165.231 141.227.21.78 122.251.62.98 54.105.84.249
243.237.68.176 139.203.172.108 162.36.115.15 214.131.25.151
173.104.42.198 67.179.129.36 163.250.65.152 85.64.18.165