必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.135.145.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54064
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;86.135.145.9.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 13:54:25 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
9.145.135.86.in-addr.arpa domain name pointer host86-135-145-9.range86-135.btcentralplus.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.145.135.86.in-addr.arpa	name = host86-135-145-9.range86-135.btcentralplus.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.112.58.227 attack
Unauthorized connection attempt from IP address 181.112.58.227 on Port 445(SMB)
2019-09-09 21:55:08
139.59.164.196 attackbotsspam
loopsrockreggae.com 139.59.164.196 \[09/Sep/2019:06:31:57 +0200\] "POST /wp-login.php HTTP/1.1" 200 5615 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
loopsrockreggae.com 139.59.164.196 \[09/Sep/2019:06:31:57 +0200\] "POST /wp-login.php HTTP/1.1" 200 5624 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-09-09 21:15:51
132.247.172.26 attack
Sep  9 13:41:13 hb sshd\[4666\]: Invalid user kafka from 132.247.172.26
Sep  9 13:41:13 hb sshd\[4666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.247.172.26
Sep  9 13:41:16 hb sshd\[4666\]: Failed password for invalid user kafka from 132.247.172.26 port 48272 ssh2
Sep  9 13:48:03 hb sshd\[5239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.247.172.26  user=root
Sep  9 13:48:05 hb sshd\[5239\]: Failed password for root from 132.247.172.26 port 51110 ssh2
2019-09-09 22:02:01
117.93.68.152 attackspambots
2019-09-08T21:31:53.042387suse-nuc sshd[1635]: error: maximum authentication attempts exceeded for root from 117.93.68.152 port 36472 ssh2 [preauth]
...
2019-09-09 21:22:14
218.98.26.175 attackspam
Sep  3 03:16:35 itv-usvr-01 sshd[31466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.175  user=root
Sep  3 03:16:37 itv-usvr-01 sshd[31466]: Failed password for root from 218.98.26.175 port 53486 ssh2
Sep  3 03:16:43 itv-usvr-01 sshd[31468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.175  user=root
Sep  3 03:16:45 itv-usvr-01 sshd[31468]: Failed password for root from 218.98.26.175 port 19241 ssh2
Sep  3 03:16:51 itv-usvr-01 sshd[31499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.175  user=root
Sep  3 03:16:53 itv-usvr-01 sshd[31499]: Failed password for root from 218.98.26.175 port 38473 ssh2
2019-09-09 21:53:32
98.113.35.10 attack
Unauthorized connection attempt from IP address 98.113.35.10 on Port 445(SMB)
2019-09-09 21:30:57
202.51.110.214 attackbotsspam
Sep  9 11:21:00 MK-Soft-VM7 sshd\[9518\]: Invalid user znc-admin from 202.51.110.214 port 49449
Sep  9 11:21:00 MK-Soft-VM7 sshd\[9518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
Sep  9 11:21:02 MK-Soft-VM7 sshd\[9518\]: Failed password for invalid user znc-admin from 202.51.110.214 port 49449 ssh2
...
2019-09-09 21:30:07
106.12.120.155 attack
Sep  9 09:16:35 rpi sshd[1278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.155 
Sep  9 09:16:38 rpi sshd[1278]: Failed password for invalid user P@ssw0rd from 106.12.120.155 port 47798 ssh2
2019-09-09 21:12:03
42.117.207.73 attack
Unauthorized connection attempt from IP address 42.117.207.73 on Port 445(SMB)
2019-09-09 20:59:33
197.43.31.224 attack
Unauthorized connection attempt from IP address 197.43.31.224 on Port 445(SMB)
2019-09-09 21:16:40
113.140.93.94 attack
Unauthorized connection attempt from IP address 113.140.93.94 on Port 445(SMB)
2019-09-09 21:44:46
200.58.219.218 attackspambots
Sep  9 12:56:28 web8 sshd\[17015\]: Invalid user musikbot from 200.58.219.218
Sep  9 12:56:28 web8 sshd\[17015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.58.219.218
Sep  9 12:56:29 web8 sshd\[17015\]: Failed password for invalid user musikbot from 200.58.219.218 port 54760 ssh2
Sep  9 13:03:47 web8 sshd\[20418\]: Invalid user user from 200.58.219.218
Sep  9 13:03:47 web8 sshd\[20418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.58.219.218
2019-09-09 21:06:09
157.230.87.116 attack
Sep  8 23:53:05 php2 sshd\[24680\]: Invalid user test01 from 157.230.87.116
Sep  8 23:53:05 php2 sshd\[24680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.87.116
Sep  8 23:53:08 php2 sshd\[24680\]: Failed password for invalid user test01 from 157.230.87.116 port 47406 ssh2
Sep  8 23:58:24 php2 sshd\[25103\]: Invalid user p@55wOrd from 157.230.87.116
Sep  8 23:58:24 php2 sshd\[25103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.87.116
2019-09-09 21:50:32
196.219.58.146 attackspambots
Unauthorized connection attempt from IP address 196.219.58.146 on Port 445(SMB)
2019-09-09 21:14:37
193.112.4.12 attackspam
Sep  9 14:26:18 bouncer sshd\[9966\]: Invalid user testftp from 193.112.4.12 port 51466
Sep  9 14:26:18 bouncer sshd\[9966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.4.12 
Sep  9 14:26:20 bouncer sshd\[9966\]: Failed password for invalid user testftp from 193.112.4.12 port 51466 ssh2
...
2019-09-09 21:00:39

最近上报的IP列表

91.152.130.214 128.4.171.116 243.21.82.164 146.170.32.37
211.235.208.93 157.208.67.180 2.141.129.249 190.54.209.178
33.75.187.185 55.40.255.253 253.180.163.253 166.28.81.84
225.92.16.221 54.112.28.153 35.206.184.44 178.219.121.53
178.70.93.154 226.114.220.142 187.176.82.236 127.215.129.69