必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.106.254.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.106.254.57.			IN	A

;; AUTHORITY SECTION:
.			37	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 11 21:37:50 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 57.254.106.109.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.254.106.109.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.31.236 attack
Oct 30 09:42:20 hcbbdb sshd\[7125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.31.236  user=root
Oct 30 09:42:22 hcbbdb sshd\[7125\]: Failed password for root from 157.230.31.236 port 48630 ssh2
Oct 30 09:46:15 hcbbdb sshd\[7497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.31.236  user=root
Oct 30 09:46:17 hcbbdb sshd\[7497\]: Failed password for root from 157.230.31.236 port 58454 ssh2
Oct 30 09:50:10 hcbbdb sshd\[7877\]: Invalid user fc from 157.230.31.236
2019-10-30 19:03:08
92.46.220.6 attackbots
Unauthorized connection attempt from IP address 92.46.220.6 on Port 445(SMB)
2019-10-30 19:34:08
150.109.52.25 attack
Oct 30 12:20:20 nextcloud sshd\[13386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.52.25  user=root
Oct 30 12:20:23 nextcloud sshd\[13386\]: Failed password for root from 150.109.52.25 port 40404 ssh2
Oct 30 12:24:28 nextcloud sshd\[19715\]: Invalid user castis from 150.109.52.25
Oct 30 12:24:28 nextcloud sshd\[19715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.52.25
...
2019-10-30 19:29:23
159.203.73.181 attackspambots
Invalid user deutsche from 159.203.73.181 port 39827
2019-10-30 18:59:31
27.121.66.53 attack
Automatic report - XMLRPC Attack
2019-10-30 19:36:50
113.232.167.146 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/113.232.167.146/ 
 
 CN - 1H : (784)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 113.232.167.146 
 
 CIDR : 113.224.0.0/12 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 14 
  3H - 38 
  6H - 67 
 12H - 145 
 24H - 306 
 
 DateTime : 2019-10-30 04:46:56 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-30 19:27:07
80.82.77.139 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 72 - port: 9200 proto: TCP cat: Misc Attack
2019-10-30 19:02:33
115.75.58.164 attackspambots
Unauthorized connection attempt from IP address 115.75.58.164 on Port 445(SMB)
2019-10-30 19:33:19
182.23.112.34 attack
Unauthorized connection attempt from IP address 182.23.112.34 on Port 445(SMB)
2019-10-30 19:25:20
221.227.74.221 attack
Oct 29 23:46:52 esmtp postfix/smtpd[32196]: lost connection after AUTH from unknown[221.227.74.221]
Oct 29 23:46:53 esmtp postfix/smtpd[32196]: lost connection after AUTH from unknown[221.227.74.221]
Oct 29 23:46:55 esmtp postfix/smtpd[32196]: lost connection after AUTH from unknown[221.227.74.221]
Oct 29 23:46:57 esmtp postfix/smtpd[32196]: lost connection after AUTH from unknown[221.227.74.221]
Oct 29 23:46:58 esmtp postfix/smtpd[32196]: lost connection after AUTH from unknown[221.227.74.221]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=221.227.74.221
2019-10-30 19:23:17
115.159.92.54 attackbotsspam
2019-10-30T10:35:00.689753shield sshd\[32630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.92.54  user=root
2019-10-30T10:35:02.572812shield sshd\[32630\]: Failed password for root from 115.159.92.54 port 48470 ssh2
2019-10-30T10:39:30.658693shield sshd\[806\]: Invalid user dg10 from 115.159.92.54 port 57524
2019-10-30T10:39:30.663193shield sshd\[806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.92.54
2019-10-30T10:39:33.283227shield sshd\[806\]: Failed password for invalid user dg10 from 115.159.92.54 port 57524 ssh2
2019-10-30 19:01:17
199.115.125.234 attackspambots
Oct 30 08:08:43 lnxweb62 sshd[23787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.115.125.234
2019-10-30 19:32:59
91.202.16.63 attack
Unauthorised access (Oct 30) SRC=91.202.16.63 LEN=40 TTL=242 ID=54369 TCP DPT=1433 WINDOW=1024 SYN
2019-10-30 18:59:49
178.128.217.218 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-30 19:02:45
202.152.58.90 attack
Unauthorized connection attempt from IP address 202.152.58.90 on Port 445(SMB)
2019-10-30 19:06:21

最近上报的IP列表

109.106.254.46 109.106.254.67 109.106.254.86 109.106.254.9
141.171.162.180 109.106.255.11 109.106.255.20 142.144.226.238
109.107.233.146 109.107.35.153 142.187.138.188 109.107.35.158
109.107.35.5 101.92.11.127 144.187.208.184 109.108.136.116
109.108.136.155 144.205.103.228 109.108.147.62 109.108.149.25