必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ballerup

省份(region): Region Hovedstaden

国家(country): Denmark

运营商(isp): Telenor

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.145.96.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40510
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.145.96.84.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 08:06:12 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
84.96.145.94.in-addr.arpa domain name pointer 094145096084.dynamic.telenor.dk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
84.96.145.94.in-addr.arpa	name = 094145096084.dynamic.telenor.dk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.17.159.54 attackbotsspam
Jul  6 06:49:39 lnxded64 sshd[29852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.159.54
Jul  6 06:49:39 lnxded64 sshd[29852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.159.54
2019-07-06 13:20:19
189.170.149.194 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 02:54:03,559 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.170.149.194)
2019-07-06 13:08:07
168.228.149.77 attack
SMTP-sasl brute force
...
2019-07-06 13:40:53
106.47.40.101 attack
probing for wordpress favicon backdoor
GET /home/favicon.ico
2019-07-06 12:59:07
177.66.59.210 attackbotsspam
smtp auth brute force
2019-07-06 13:04:03
59.145.221.103 attackbotsspam
Jul  6 05:46:41 mail sshd\[11821\]: Invalid user dale from 59.145.221.103\
Jul  6 05:46:44 mail sshd\[11821\]: Failed password for invalid user dale from 59.145.221.103 port 60690 ssh2\
Jul  6 05:49:50 mail sshd\[11856\]: Invalid user anselme from 59.145.221.103\
Jul  6 05:49:51 mail sshd\[11856\]: Failed password for invalid user anselme from 59.145.221.103 port 44967 ssh2\
Jul  6 05:53:00 mail sshd\[11863\]: Invalid user capricorne from 59.145.221.103\
Jul  6 05:53:03 mail sshd\[11863\]: Failed password for invalid user capricorne from 59.145.221.103 port 57473 ssh2\
2019-07-06 13:24:38
77.222.103.62 attackspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-06 05:52:58]
2019-07-06 13:16:31
117.6.160.3 attackspam
Invalid user vmail from 117.6.160.3 port 65056
2019-07-06 13:00:56
51.68.137.40 attackbots
Failed password for invalid user ftpuser from 51.68.137.40 port 34954 ssh2
Invalid user a from 51.68.137.40 port 60750
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.137.40
Failed password for invalid user a from 51.68.137.40 port 60750 ssh2
Invalid user shuan from 51.68.137.40 port 58314
2019-07-06 12:56:15
201.59.18.170 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 00:40:58,157 INFO [shellcode_manager] (201.59.18.170) no match, writing hexdump (7ed5e10fa2dc167644f189b37126ee14 :2155597) - MS17010 (EternalBlue)
2019-07-06 12:56:48
103.81.85.214 attack
WordPress wp-login brute force :: 103.81.85.214 0.228 BYPASS [06/Jul/2019:13:53:38  1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 4214 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-06 13:14:20
125.166.228.65 attackspam
2019-07-06T05:53:31.8451141240 sshd\[8471\]: Invalid user ranjeet from 125.166.228.65 port 39358
2019-07-06T05:53:31.8509151240 sshd\[8471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.166.228.65
2019-07-06T05:53:34.1069751240 sshd\[8471\]: Failed password for invalid user ranjeet from 125.166.228.65 port 39358 ssh2
...
2019-07-06 13:14:38
189.51.103.89 attackspam
smtp auth brute force
2019-07-06 13:25:51
177.19.244.130 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 02:56:06,405 INFO [amun_request_handler] PortScan Detected on Port: 25 (177.19.244.130)
2019-07-06 12:52:08
160.153.234.75 attackbotsspam
Jul  6 05:54:21 lnxweb61 sshd[16775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.234.75
2019-07-06 12:53:12

最近上报的IP列表

189.81.163.164 50.182.222.107 149.83.211.205 217.244.247.172
87.251.157.149 179.12.72.32 202.202.25.191 128.142.113.117
243.220.135.138 188.99.158.227 96.23.120.31 228.3.121.82
87.51.239.109 3.196.201.238 48.163.203.117 123.47.243.228
57.168.73.86 206.59.45.176 41.4.56.38 144.4.62.139