必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.105.219.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.105.219.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:37:21 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 145.219.105.91.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.219.105.91.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.57.224.91 attack
Unauthorised access (Nov 20) SRC=121.57.224.91 LEN=60 TTL=47 ID=8378 DF TCP DPT=8080 WINDOW=14100 SYN
2019-11-21 01:23:46
79.140.3.69 attack
2019-11-20 15:06:23 H=79-140-3-69.broadband.tenet.odessa.ua [79.140.3.69]:13582 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=79.140.3.69)
2019-11-20 15:06:23 unexpected disconnection while reading SMTP command from 79-140-3-69.broadband.tenet.odessa.ua [79.140.3.69]:13582 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-11-20 15:36:15 H=79-140-3-69.broadband.tenet.odessa.ua [79.140.3.69]:20736 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=79.140.3.69)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=79.140.3.69
2019-11-21 01:29:17
82.144.80.250 attack
[portscan] Port scan
2019-11-21 00:59:05
39.97.230.218 attackbotsspam
Web App Attack
2019-11-21 01:13:35
222.186.190.92 attackspam
Nov 21 00:52:36 bacztwo sshd[7455]: error: PAM: Authentication failure for root from 222.186.190.92
Nov 21 00:52:39 bacztwo sshd[7455]: error: PAM: Authentication failure for root from 222.186.190.92
Nov 21 00:52:42 bacztwo sshd[7455]: error: PAM: Authentication failure for root from 222.186.190.92
Nov 21 00:52:42 bacztwo sshd[7455]: Failed keyboard-interactive/pam for root from 222.186.190.92 port 26478 ssh2
Nov 21 00:52:32 bacztwo sshd[7455]: error: PAM: Authentication failure for root from 222.186.190.92
Nov 21 00:52:36 bacztwo sshd[7455]: error: PAM: Authentication failure for root from 222.186.190.92
Nov 21 00:52:39 bacztwo sshd[7455]: error: PAM: Authentication failure for root from 222.186.190.92
Nov 21 00:52:42 bacztwo sshd[7455]: error: PAM: Authentication failure for root from 222.186.190.92
Nov 21 00:52:42 bacztwo sshd[7455]: Failed keyboard-interactive/pam for root from 222.186.190.92 port 26478 ssh2
Nov 21 00:52:45 bacztwo sshd[7455]: error: PAM: Authentication failure for
...
2019-11-21 01:01:54
220.255.237.149 attackbotsspam
Honeypot hit.
2019-11-21 01:05:23
200.85.48.30 attack
Invalid user jpg from 200.85.48.30 port 57196
2019-11-21 01:23:02
49.207.33.2 attackspambots
Nov 20 17:46:30 dedicated sshd[2393]: Invalid user squid from 49.207.33.2 port 59976
2019-11-21 01:01:12
171.84.2.31 attackbotsspam
Nov 20 15:39:12 vps01 sshd[27973]: Failed password for sshd from 171.84.2.31 port 44450 ssh2
Nov 20 15:44:55 vps01 sshd[27976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.84.2.31
Nov 20 15:44:58 vps01 sshd[27976]: Failed password for invalid user maroko from 171.84.2.31 port 9172 ssh2
2019-11-21 00:53:27
46.29.167.217 attackbots
Brute force attempt
2019-11-21 01:27:07
178.236.60.227 attackbots
Unauthorised access (Nov 20) SRC=178.236.60.227 LEN=52 TTL=116 ID=25064 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 19) SRC=178.236.60.227 LEN=52 TTL=117 ID=101 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 18) SRC=178.236.60.227 LEN=52 TTL=117 ID=15428 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-21 00:54:13
190.42.17.67 attack
2019-11-20 15:08:43 H=([190.42.17.67]) [190.42.17.67]:10210 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=190.42.17.67)
2019-11-20 15:08:45 unexpected disconnection while reading SMTP command from ([190.42.17.67]) [190.42.17.67]:10210 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-11-20 15:33:59 H=([190.42.17.67]) [190.42.17.67]:54466 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=190.42.17.67)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.42.17.67
2019-11-21 01:05:08
195.91.48.5 attack
2019-11-20 15:10:47 H=(pat-5.gprs.195-91-48.telekom.sk) [195.91.48.5]:26136 I=[10.100.18.25]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=195.91.48.5)
2019-11-20 15:10:48 unexpected disconnection while reading SMTP command from (pat-5.gprs.195-91-48.telekom.sk) [195.91.48.5]:26136 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-11-20 15:33:52 H=(pat-5.gprs.195-91-48.telekom.sk) [195.91.48.5]:31191 I=[10.100.18.25]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=195.91.48.5)

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=195.91.48.5
2019-11-21 01:02:15
103.98.129.230 attackspambots
2019-11-20 14:38:08 H=([103.98.129.230]) [103.98.129.230]:46305 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=103.98.129.230)
2019-11-20 14:38:09 unexpected disconnection while reading SMTP command from ([103.98.129.230]) [103.98.129.230]:46305 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-11-20 15:33:44 H=([103.98.129.230]) [103.98.129.230]:13404 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=103.98.129.230)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.98.129.230
2019-11-21 00:56:35
37.9.171.141 attackspam
2019-11-20T16:01:40.706557abusebot-8.cloudsearch.cf sshd\[3085\]: Invalid user sshtunnel from 37.9.171.141 port 36408
2019-11-21 01:11:26

最近上报的IP列表

107.138.161.16 126.230.180.136 55.111.203.181 150.227.26.192
72.25.174.7 142.237.93.42 221.3.147.27 117.73.143.207
44.140.88.158 181.103.193.88 224.197.196.247 14.51.117.12
159.7.157.9 45.107.74.164 255.96.168.228 243.67.235.236
190.150.139.215 190.227.99.56 48.155.232.70 72.10.170.215