必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Lagos

省份(region): Lagos

国家(country): Nigeria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.107.54.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38699
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.107.54.254.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091100 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 11 22:36:52 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 254.54.107.109.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 254.54.107.109.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.99.132.170 attack
Sep 27 01:50:21 TORMINT sshd\[13936\]: Invalid user yjlo from 62.99.132.170
Sep 27 01:50:21 TORMINT sshd\[13936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.132.170
Sep 27 01:50:23 TORMINT sshd\[13936\]: Failed password for invalid user yjlo from 62.99.132.170 port 60108 ssh2
...
2019-09-27 19:35:37
211.147.216.19 attackbots
Sep 26 23:55:51 hiderm sshd\[32169\]: Invalid user mark from 211.147.216.19
Sep 26 23:55:51 hiderm sshd\[32169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.147.216.19
Sep 26 23:55:54 hiderm sshd\[32169\]: Failed password for invalid user mark from 211.147.216.19 port 48686 ssh2
Sep 27 00:00:40 hiderm sshd\[32559\]: Invalid user alber from 211.147.216.19
Sep 27 00:00:40 hiderm sshd\[32559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.147.216.19
2019-09-27 19:35:05
78.198.14.35 attackbotsspam
Brute force SMTP login attempted.
...
2019-09-27 19:49:24
171.67.70.80 attack
2019-09-26 UTC: 2x - (2x)
2019-09-27 19:38:51
189.210.146.89 attackbotsspam
Automatic report - Port Scan Attack
2019-09-27 19:17:16
141.135.75.130 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 04:45:19.
2019-09-27 20:01:06
221.131.83.162 attack
failed_logins
2019-09-27 19:32:06
1.20.251.208 attack
Unauthorised access (Sep 27) SRC=1.20.251.208 LEN=52 TTL=114 ID=6296 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-27 19:58:07
80.82.70.118 attackspambots
09/27/2019-13:12:17.316124 80.82.70.118 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2019-09-27 19:47:39
183.13.14.132 attack
Sep 26 23:02:39 fwservlet sshd[28301]: Invalid user ghici from 183.13.14.132
Sep 26 23:02:39 fwservlet sshd[28301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.14.132
Sep 26 23:02:41 fwservlet sshd[28301]: Failed password for invalid user ghici from 183.13.14.132 port 57797 ssh2
Sep 26 23:02:41 fwservlet sshd[28301]: Received disconnect from 183.13.14.132 port 57797:11: Bye Bye [preauth]
Sep 26 23:02:41 fwservlet sshd[28301]: Disconnected from 183.13.14.132 port 57797 [preauth]
Sep 26 23:06:27 fwservlet sshd[28480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.14.132  user=r.r
Sep 26 23:06:29 fwservlet sshd[28480]: Failed password for r.r from 183.13.14.132 port 60358 ssh2
Sep 26 23:06:29 fwservlet sshd[28480]: Received disconnect from 183.13.14.132 port 60358:11: Bye Bye [preauth]
Sep 26 23:06:29 fwservlet sshd[28480]: Disconnected from 183.13.14.132 port 60358 [preauth........
-------------------------------
2019-09-27 19:50:23
91.134.185.84 attackbots
Automatic report - Port Scan Attack
2019-09-27 19:20:14
37.187.46.74 attack
Sep 26 18:52:23 hpm sshd\[20900\]: Invalid user iepass from 37.187.46.74
Sep 26 18:52:23 hpm sshd\[20900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.ip-37-187-46.eu
Sep 26 18:52:25 hpm sshd\[20900\]: Failed password for invalid user iepass from 37.187.46.74 port 57652 ssh2
Sep 26 18:58:41 hpm sshd\[21428\]: Invalid user sysAdmin from 37.187.46.74
Sep 26 18:58:41 hpm sshd\[21428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.ip-37-187-46.eu
2019-09-27 19:52:15
129.213.122.26 attack
SSHScan
2019-09-27 19:23:58
196.27.127.61 attackspambots
Sep 27 11:08:40 hcbbdb sshd\[28635\]: Invalid user user1 from 196.27.127.61
Sep 27 11:08:40 hcbbdb sshd\[28635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61
Sep 27 11:08:43 hcbbdb sshd\[28635\]: Failed password for invalid user user1 from 196.27.127.61 port 38124 ssh2
Sep 27 11:14:05 hcbbdb sshd\[29240\]: Invalid user anirudh from 196.27.127.61
Sep 27 11:14:05 hcbbdb sshd\[29240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61
2019-09-27 19:33:39
62.234.95.136 attackbotsspam
2019-09-27T12:58:01.402727  sshd[1215]: Invalid user asd123 from 62.234.95.136 port 39632
2019-09-27T12:58:01.415468  sshd[1215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.136
2019-09-27T12:58:01.402727  sshd[1215]: Invalid user asd123 from 62.234.95.136 port 39632
2019-09-27T12:58:02.784832  sshd[1215]: Failed password for invalid user asd123 from 62.234.95.136 port 39632 ssh2
2019-09-27T13:01:50.470177  sshd[1317]: Invalid user P@$$w0rd from 62.234.95.136 port 54324
...
2019-09-27 19:33:07

最近上报的IP列表

156.245.248.226 3.98.67.46 152.32.141.154 35.182.219.207
18.61.230.159 16.52.165.13 14.213.31.106 18.60.60.165
103.47.219.90 103.240.6.24 106.75.87.48 15.161.90.157
15.160.27.197 15.160.247.60 116.116.202.8 113.45.75.124
45.1.60.146 31.13.72.52 192.158.30.31 156.254.11.157