必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Herning

省份(region): Region Midtjylland

国家(country): Denmark

运营商(isp): Telenor

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.145.142.224
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.145.142.224.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 19:55:52 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
224.142.145.94.in-addr.arpa domain name pointer 094145142224.dynamic.telenor.dk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
224.142.145.94.in-addr.arpa	name = 094145142224.dynamic.telenor.dk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
40.73.29.153 attackspambots
28.07.2019 12:05:15 SSH access blocked by firewall
2019-07-28 20:15:30
174.138.56.93 attackbots
Triggered by Fail2Ban at Vostok web server
2019-07-28 20:09:51
188.166.28.110 attack
Jul 28 08:07:31 vps200512 sshd\[10596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.28.110  user=root
Jul 28 08:07:34 vps200512 sshd\[10596\]: Failed password for root from 188.166.28.110 port 59554 ssh2
Jul 28 08:14:26 vps200512 sshd\[10764\]: Invalid user 1 from 188.166.28.110
Jul 28 08:14:26 vps200512 sshd\[10764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.28.110
Jul 28 08:14:27 vps200512 sshd\[10764\]: Failed password for invalid user 1 from 188.166.28.110 port 53282 ssh2
2019-07-28 20:25:36
219.84.203.57 attack
Jul 28 13:52:23 mintao sshd\[30301\]: Address 219.84.203.57 maps to zhan-yang.com.tw, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!\
Jul 28 13:52:23 mintao sshd\[30301\]: Invalid user kor from 219.84.203.57\
2019-07-28 19:53:33
128.74.32.219 attack
Unauthorized connection attempt from IP address 128.74.32.219 on Port 445(SMB)
2019-07-28 20:01:48
90.154.109.54 attackbots
Unauthorized connection attempt from IP address 90.154.109.54 on Port 445(SMB)
2019-07-28 19:55:32
110.45.145.178 attackbotsspam
Automatic report - Banned IP Access
2019-07-28 19:46:59
51.75.52.195 attackbots
Jul 28 16:56:33 vibhu-HP-Z238-Microtower-Workstation sshd\[24474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.52.195  user=root
Jul 28 16:56:35 vibhu-HP-Z238-Microtower-Workstation sshd\[24474\]: Failed password for root from 51.75.52.195 port 48618 ssh2
Jul 28 17:01:12 vibhu-HP-Z238-Microtower-Workstation sshd\[24612\]: Invalid user 01 from 51.75.52.195
Jul 28 17:01:12 vibhu-HP-Z238-Microtower-Workstation sshd\[24612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.52.195
Jul 28 17:01:14 vibhu-HP-Z238-Microtower-Workstation sshd\[24612\]: Failed password for invalid user 01 from 51.75.52.195 port 43996 ssh2
...
2019-07-28 19:43:17
119.116.226.207 attackbots
Jul 28 14:30:44 srv-4 sshd\[1176\]: Invalid user admin from 119.116.226.207
Jul 28 14:30:44 srv-4 sshd\[1176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.116.226.207
Jul 28 14:30:47 srv-4 sshd\[1176\]: Failed password for invalid user admin from 119.116.226.207 port 43629 ssh2
...
2019-07-28 20:06:30
177.124.216.10 attackspambots
Jul 28 11:31:19 unicornsoft sshd\[30666\]: User root from 177.124.216.10 not allowed because not listed in AllowUsers
Jul 28 11:31:19 unicornsoft sshd\[30666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.216.10  user=root
Jul 28 11:31:22 unicornsoft sshd\[30666\]: Failed password for invalid user root from 177.124.216.10 port 54834 ssh2
2019-07-28 19:42:13
185.65.180.250 attackspam
3389BruteforceFW23
2019-07-28 19:36:46
218.92.0.193 attack
SSH Brute-Force attacks
2019-07-28 19:39:32
47.94.144.140 attackbots
DATE:2019-07-28 13:31:26, IP:47.94.144.140, PORT:ssh brute force auth on SSH service (patata)
2019-07-28 19:38:45
119.81.31.20 attackbotsspam
ThinkPHP Remote Code Execution Vulnerability
2019-07-28 20:28:47
58.147.170.51 attack
DLink DSL Remote OS Command Injection Vulnerability
2019-07-28 20:35:29

最近上报的IP列表

224.17.214.19 241.243.46.189 16.131.21.79 89.145.78.243
53.96.67.53 204.178.41.214 121.25.185.44 174.17.116.206
33.197.37.63 26.153.208.170 70.95.7.200 23.5.248.136
77.135.195.229 196.249.21.133 157.81.131.147 79.114.33.131
235.19.69.248 179.17.206.50 66.203.251.16 217.246.53.75