必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.61.54.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.61.54.195.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 21:21:28 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
195.54.61.108.in-addr.arpa domain name pointer 108-61-54-195.constant.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
195.54.61.108.in-addr.arpa	name = 108-61-54-195.constant.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.59.97.182 attackspambots
LGS,WP GET /wp-login.php
2019-07-04 19:22:33
65.132.59.34 attack
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-04 19:26:48
122.168.53.189 attack
2019-07-04 07:41:41 unexpected disconnection while reading SMTP command from (abts-mp-dynamic-189.53.168.122.airtelbroadband.in) [122.168.53.189]:29454 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-07-04 07:42:58 unexpected disconnection while reading SMTP command from (abts-mp-dynamic-189.53.168.122.airtelbroadband.in) [122.168.53.189]:21873 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-07-04 07:43:21 unexpected disconnection while reading SMTP command from (abts-mp-dynamic-189.53.168.122.airtelbroadband.in) [122.168.53.189]:38387 I=[10.100.18.20]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.168.53.189
2019-07-04 19:32:36
112.85.42.237 attackbots
Jul  4 12:12:10 MainVPS sshd[5901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jul  4 12:12:13 MainVPS sshd[5901]: Failed password for root from 112.85.42.237 port 58236 ssh2
Jul  4 12:13:33 MainVPS sshd[5986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jul  4 12:13:34 MainVPS sshd[5986]: Failed password for root from 112.85.42.237 port 26664 ssh2
Jul  4 12:14:32 MainVPS sshd[6055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jul  4 12:14:34 MainVPS sshd[6055]: Failed password for root from 112.85.42.237 port 52443 ssh2
...
2019-07-04 19:27:09
103.4.167.101 attack
Jul  4 09:12:27 rpi sshd[8646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.4.167.101 
Jul  4 09:12:29 rpi sshd[8646]: Failed password for invalid user weldon from 103.4.167.101 port 57944 ssh2
2019-07-04 19:10:35
122.93.235.10 attackbotsspam
Jul  4 17:14:18 tanzim-HP-Z238-Microtower-Workstation sshd\[21718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.93.235.10  user=root
Jul  4 17:14:20 tanzim-HP-Z238-Microtower-Workstation sshd\[21718\]: Failed password for root from 122.93.235.10 port 65414 ssh2
Jul  4 17:14:35 tanzim-HP-Z238-Microtower-Workstation sshd\[21776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.93.235.10  user=root
...
2019-07-04 19:55:29
202.164.48.202 attackbots
2019-07-04T16:12:41.234369enmeeting.mahidol.ac.th sshd\[14613\]: Invalid user gisele from 202.164.48.202 port 37649
2019-07-04T16:12:41.248447enmeeting.mahidol.ac.th sshd\[14613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.164.48.202
2019-07-04T16:12:43.032370enmeeting.mahidol.ac.th sshd\[14613\]: Failed password for invalid user gisele from 202.164.48.202 port 37649 ssh2
...
2019-07-04 20:04:45
37.139.24.204 attack
2019-07-04T11:40:59.015157abusebot-4.cloudsearch.cf sshd\[8675\]: Invalid user git from 37.139.24.204 port 34586
2019-07-04 19:51:25
165.22.251.129 attackspam
Jul  4 13:40:26 jane sshd\[28651\]: Invalid user deploy from 165.22.251.129 port 33606
Jul  4 13:40:26 jane sshd\[28651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.251.129
Jul  4 13:40:29 jane sshd\[28651\]: Failed password for invalid user deploy from 165.22.251.129 port 33606 ssh2
...
2019-07-04 19:44:20
51.255.28.62 attack
51.255.28.62 - - [04/Jul/2019:02:08:44 -0400] "GET /?page=products&action=../../../../../../../../../etc/passwd%00&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0 HTTP/1.1" 200 17258 "https://californiafaucetsupply.com/?page=products&action=../../../../../../../../../etc/passwd%00&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-07-04 19:24:14
51.158.68.133 attackbotsspam
51.158.68.133 - - [04/Jul/2019:02:08:45 -0400] "GET /?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0 HTTP/1.1" 200 17261 "https://californiafaucetsupply.com/?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-07-04 19:22:56
80.84.63.165 attack
2019-07-04T07:37:26.762487lin-mail-mx2.4s-zg.intra x@x
2019-07-04T07:37:47.028294lin-mail-mx2.4s-zg.intra x@x
2019-07-04T07:41:34.967254lin-mail-mx2.4s-zg.intra x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=80.84.63.165
2019-07-04 19:15:06
201.139.111.202 attackspambots
" "
2019-07-04 19:09:34
34.80.248.171 attackbotsspam
Jul  4 13:07:45 rpi sshd[10823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.248.171 
Jul  4 13:07:47 rpi sshd[10823]: Failed password for invalid user halflife from 34.80.248.171 port 55772 ssh2
2019-07-04 19:13:08
111.230.152.118 attackbots
Unauthorized SSH login attempts
2019-07-04 19:16:43

最近上报的IP列表

155.130.38.46 242.70.201.63 22.138.159.119 214.34.243.166
68.250.243.111 248.98.190.179 161.6.95.17 106.212.251.216
168.192.142.78 206.164.145.236 125.26.66.219 246.171.164.167
174.62.87.199 184.243.196.233 204.105.137.162 160.118.57.254
52.201.99.214 135.198.241.98 62.135.197.38 247.148.224.116