必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Beijing

国家(country): China

运营商(isp): China Telecom

主机名(hostname): unknown

机构(organization): IDC, China Telecommunications Corporation

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.54.1.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4621
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.54.1.19.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 09:28:07 CST 2019
;; MSG SIZE  rcvd: 115

HOST信息:
Host 19.1.54.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 19.1.54.114.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
160.124.23.24 attackbots
Threat Management Alert 2: Misc Attack. Signature ET DROP Spamhaus DROP Listed Traffic Inbound group 12.
2019-09-30 01:07:51
106.13.144.8 attack
2019-09-29T16:36:36.550883hub.schaetter.us sshd\[27042\]: Invalid user moodle from 106.13.144.8 port 48024
2019-09-29T16:36:36.563111hub.schaetter.us sshd\[27042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8
2019-09-29T16:36:38.927235hub.schaetter.us sshd\[27042\]: Failed password for invalid user moodle from 106.13.144.8 port 48024 ssh2
2019-09-29T16:41:43.924248hub.schaetter.us sshd\[27093\]: Invalid user temp from 106.13.144.8 port 51848
2019-09-29T16:41:43.935471hub.schaetter.us sshd\[27093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8
...
2019-09-30 01:19:06
104.197.145.226 attackspam
Sep 29 16:08:10 MK-Soft-Root2 sshd[18891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.197.145.226 
Sep 29 16:08:12 MK-Soft-Root2 sshd[18891]: Failed password for invalid user valentino from 104.197.145.226 port 47204 ssh2
...
2019-09-30 01:47:24
123.1.150.73 attackbots
445/tcp 445/tcp
[2019-09-23/29]2pkt
2019-09-30 01:16:37
206.189.148.39 attack
Sep 29 20:03:26 taivassalofi sshd[26885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.148.39
Sep 29 20:03:28 taivassalofi sshd[26885]: Failed password for invalid user tss3 from 206.189.148.39 port 43192 ssh2
...
2019-09-30 01:14:34
128.72.207.124 attackspambots
445/tcp
[2019-09-29]1pkt
2019-09-30 01:30:27
202.119.81.229 attackspambots
Sep 29 19:36:28 pkdns2 sshd\[52039\]: Invalid user umountfs from 202.119.81.229Sep 29 19:36:29 pkdns2 sshd\[52039\]: Failed password for invalid user umountfs from 202.119.81.229 port 38972 ssh2Sep 29 19:40:44 pkdns2 sshd\[52231\]: Invalid user test from 202.119.81.229Sep 29 19:40:46 pkdns2 sshd\[52231\]: Failed password for invalid user test from 202.119.81.229 port 41762 ssh2Sep 29 19:45:04 pkdns2 sshd\[52355\]: Invalid user login from 202.119.81.229Sep 29 19:45:05 pkdns2 sshd\[52355\]: Failed password for invalid user login from 202.119.81.229 port 44552 ssh2
...
2019-09-30 01:25:13
209.59.104.193 attack
Sep 29 01:59:17 hanapaa sshd\[10911\]: Invalid user teamspeak3bot from 209.59.104.193
Sep 29 01:59:17 hanapaa sshd\[10911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.59.104.193
Sep 29 01:59:19 hanapaa sshd\[10911\]: Failed password for invalid user teamspeak3bot from 209.59.104.193 port 40838 ssh2
Sep 29 02:04:11 hanapaa sshd\[11312\]: Invalid user database from 209.59.104.193
Sep 29 02:04:11 hanapaa sshd\[11312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.59.104.193
2019-09-30 01:34:54
79.120.183.51 attackbots
2019-09-29T13:04:29.204274abusebot-5.cloudsearch.cf sshd\[30206\]: Invalid user mu from 79.120.183.51 port 33538
2019-09-30 01:48:21
145.97.252.133 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/145.97.252.133/ 
 NL - 1H : (125)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NL 
 NAME ASN : ASN1103 
 
 IP : 145.97.252.133 
 
 CIDR : 145.97.192.0/18 
 
 PREFIX COUNT : 114 
 
 UNIQUE IP COUNT : 4619264 
 
 
 WYKRYTE ATAKI Z ASN1103 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 2 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-09-30 01:46:33
59.148.173.231 attackspam
Sep 29 19:22:28 MainVPS sshd[4939]: Invalid user semenov from 59.148.173.231 port 60152
Sep 29 19:22:28 MainVPS sshd[4939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.148.173.231
Sep 29 19:22:28 MainVPS sshd[4939]: Invalid user semenov from 59.148.173.231 port 60152
Sep 29 19:22:29 MainVPS sshd[4939]: Failed password for invalid user semenov from 59.148.173.231 port 60152 ssh2
Sep 29 19:26:42 MainVPS sshd[5230]: Invalid user tom from 59.148.173.231 port 43892
...
2019-09-30 01:53:13
60.26.202.212 attackbotsspam
Sep 28 23:01:16 collab sshd[30528]: reveeclipse mapping checking getaddrinfo for no-data [60.26.202.212] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 28 23:01:16 collab sshd[30528]: Invalid user adminixxxr from 60.26.202.212
Sep 28 23:01:16 collab sshd[30528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.26.202.212 
Sep 28 23:01:19 collab sshd[30528]: Failed password for invalid user adminixxxr from 60.26.202.212 port 59952 ssh2
Sep 28 23:01:19 collab sshd[30528]: Received disconnect from 60.26.202.212: 11: Bye Bye [preauth]
Sep 28 23:17:20 collab sshd[31222]: reveeclipse mapping checking getaddrinfo for no-data [60.26.202.212] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 28 23:17:20 collab sshd[31222]: Invalid user mirror05 from 60.26.202.212
Sep 28 23:17:20 collab sshd[31222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.26.202.212 


........
-----------------------------------------------
https://www.blocklist.de/en/view.htm
2019-09-30 01:06:04
175.163.222.187 attack
Unauthorised access (Sep 29) SRC=175.163.222.187 LEN=40 TTL=49 ID=35760 TCP DPT=8080 WINDOW=53614 SYN
2019-09-30 01:49:38
140.213.24.174 attackspambots
445/tcp
[2019-09-29]1pkt
2019-09-30 01:18:34
94.191.59.106 attack
Sep 29 16:22:02 ns3110291 sshd\[17049\]: Invalid user test123 from 94.191.59.106
Sep 29 16:22:02 ns3110291 sshd\[17049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.59.106 
Sep 29 16:22:04 ns3110291 sshd\[17049\]: Failed password for invalid user test123 from 94.191.59.106 port 35470 ssh2
Sep 29 16:26:51 ns3110291 sshd\[17220\]: Invalid user amavis from 94.191.59.106
Sep 29 16:26:51 ns3110291 sshd\[17220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.59.106 
...
2019-09-30 01:13:17

最近上报的IP列表

150.134.41.4 13.128.121.205 109.145.246.129 34.76.251.191
245.118.201.178 4.199.106.99 24.131.238.254 226.133.169.238
158.59.78.76 180.27.236.253 157.240.8.23 225.129.199.201
95.225.80.135 193.47.61.116 240.33.96.94 187.241.130.208
64.127.220.131 177.64.227.118 26.159.148.61 2.189.84.137