必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kamp-Lintfort

省份(region): North Rhine-Westphalia

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
85.14.245.40 attack
lfd: (smtpauth) Failed SMTP AUTH login from 85.14.245.40 (srv83039.dus2.fastwebserver.de): 5 in the last 3600 secs - Sun Jul 22 08:27:34 2018
2020-02-24 23:10:49
85.14.245.154 attackbots
Repeated RDP login failures. Last user: alex
2020-02-22 04:57:34
85.14.245.153 attackspam
scan r
2019-11-05 02:14:35
85.14.245.149 attackbots
Honeypot hit.
2019-10-24 06:54:14
85.14.245.156 attack
webserver:80 [09/Oct/2019]  "\x03" 400 0
webserver:80 [09/Oct/2019]  "\x03" 400 0
webserver:80 [08/Oct/2019]  "\x03" 400 0
2019-10-10 04:49:24
85.14.245.221 attackbots
rdp
2019-10-05 00:04:30
85.14.245.149 attack
Many RDP login attempts detected by IDS script
2019-07-18 11:05:40
85.14.245.158 attackbotsspam
Bruteforcing port 3389 (Remote Desktop) - Exceed maximum 10 attempts/hour
2019-07-14 09:35:56
85.14.245.157 attack
3389BruteforceFW22
2019-07-01 03:59:03
85.14.245.221 attackspambots
RDP Brute-Force (Grieskirchen RZ1)
2019-06-23 03:30:05
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.14.245.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.14.245.66.			IN	A

;; AUTHORITY SECTION:
.			323	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022060102 1800 900 604800 86400

;; Query time: 150 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 02 01:48:31 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
66.245.14.85.in-addr.arpa domain name pointer ds10822.dus7.dedicated.server-hosting.expert.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.245.14.85.in-addr.arpa	name = ds10822.dus7.dedicated.server-hosting.expert.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.197.52 attackbots
Brute-force attempt banned
2020-04-21 19:58:40
157.230.153.75 attackbotsspam
Invalid user test from 157.230.153.75 port 51263
2020-04-21 20:04:46
141.98.81.99 attackbots
Apr 21 11:32:12 *** sshd[5943]: Invalid user Administrator from 141.98.81.99
2020-04-21 19:35:17
49.207.61.194 attackbotsspam
Fail2Ban - HTTP Auth Bruteforce Attempt
2020-04-21 19:41:56
141.98.81.83 attackspambots
Apr 21 13:11:16 host sshd[29505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.83  user=root
Apr 21 13:11:19 host sshd[29505]: Failed password for root from 141.98.81.83 port 45991 ssh2
...
2020-04-21 19:26:44
106.52.88.211 attackbotsspam
2020-04-21T05:24:59.2487461495-001 sshd[12449]: Failed password for root from 106.52.88.211 port 43108 ssh2
2020-04-21T05:28:07.9128861495-001 sshd[12649]: Invalid user il from 106.52.88.211 port 46190
2020-04-21T05:28:07.9163191495-001 sshd[12649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.88.211
2020-04-21T05:28:07.9128861495-001 sshd[12649]: Invalid user il from 106.52.88.211 port 46190
2020-04-21T05:28:09.9992641495-001 sshd[12649]: Failed password for invalid user il from 106.52.88.211 port 46190 ssh2
2020-04-21T05:31:18.1946601495-001 sshd[12808]: Invalid user test from 106.52.88.211 port 49274
...
2020-04-21 19:43:28
167.99.225.157 attack
scans 2 times in preceeding hours on the ports (in chronological order) 31717 31717 resulting in total of 7 scans from 167.99.0.0/16 block.
2020-04-21 19:49:43
103.26.195.54 attackspam
Unauthorized connection attempt detected from IP address 103.26.195.54 to port 445
2020-04-21 19:37:29
188.173.80.134 attackspambots
(sshd) Failed SSH login from 188.173.80.134 (RO/Romania/188-173-80-134.next-gen.ro): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 21 11:35:52 ubnt-55d23 sshd[24643]: Invalid user zl from 188.173.80.134 port 48819
Apr 21 11:35:54 ubnt-55d23 sshd[24643]: Failed password for invalid user zl from 188.173.80.134 port 48819 ssh2
2020-04-21 19:46:12
170.79.233.162 attackspambots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-04-21 19:57:31
159.203.198.34 attackbotsspam
Invalid user test from 159.203.198.34 port 43453
2020-04-21 20:03:55
223.240.103.54 attackspambots
$f2bV_matches
2020-04-21 19:44:10
89.36.210.156 attack
Invalid user admin2 from 89.36.210.156 port 53720
2020-04-21 20:08:42
159.89.133.144 attack
$f2bV_matches
2020-04-21 19:47:32
111.229.83.100 attackspambots
"fail2ban match"
2020-04-21 19:30:49

最近上报的IP列表

196.53.0.93 151.3.229.219 183.122.243.220 229.203.85.7
116.252.51.9 206.3.111.202 116.57.18.120 116.124.5.114
116.123.50.46 176.21.83.24 116.19.251.4 116.42.87.18
189.162.13.0 188.73.174.6 116.52.63.8 116.11.174.100
252.5.224.58 133.38.1.170 84.139.126.243 66.58.144.145