必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.55.154.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.55.154.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 09:56:47 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 2.154.55.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.154.55.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
174.138.18.157 attackbotsspam
Apr 27 07:00:59 nextcloud sshd\[11199\]: Invalid user priya from 174.138.18.157
Apr 27 07:00:59 nextcloud sshd\[11199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.18.157
Apr 27 07:01:02 nextcloud sshd\[11199\]: Failed password for invalid user priya from 174.138.18.157 port 56132 ssh2
2020-04-27 13:17:47
118.25.49.119 attackbotsspam
2020-04-27T00:37:38.6605371495-001 sshd[37094]: Failed password for root from 118.25.49.119 port 35676 ssh2
2020-04-27T00:42:07.6353151495-001 sshd[37292]: Invalid user user from 118.25.49.119 port 40770
2020-04-27T00:42:07.6414461495-001 sshd[37292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.49.119
2020-04-27T00:42:07.6353151495-001 sshd[37292]: Invalid user user from 118.25.49.119 port 40770
2020-04-27T00:42:09.5781331495-001 sshd[37292]: Failed password for invalid user user from 118.25.49.119 port 40770 ssh2
2020-04-27T00:46:36.2989401495-001 sshd[37468]: Invalid user mont from 118.25.49.119 port 45850
...
2020-04-27 13:25:23
157.245.194.35 attack
2020-04-26T23:54:29.243445sorsha.thespaminator.com sshd[8194]: Failed password for root from 157.245.194.35 port 55668 ssh2
2020-04-27T00:00:22.516603sorsha.thespaminator.com sshd[8909]: Invalid user mailman from 157.245.194.35 port 57924
...
2020-04-27 13:36:42
92.118.37.83 attackspam
Apr 27 05:58:57 debian-2gb-nbg1-2 kernel: \[10218869.780443\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.83 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=59759 PROTO=TCP SPT=58261 DPT=5008 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-27 13:00:19
222.186.15.62 attackspam
Apr 27 07:25:41 home sshd[14595]: Failed password for root from 222.186.15.62 port 43973 ssh2
Apr 27 07:25:49 home sshd[14612]: Failed password for root from 222.186.15.62 port 24145 ssh2
...
2020-04-27 13:40:20
92.118.38.83 attack
Apr 27 06:36:27 mail.srvfarm.net postfix/smtpd[262563]: warning: unknown[92.118.38.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 27 06:37:00 mail.srvfarm.net postfix/smtpd[262471]: warning: unknown[92.118.38.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 27 06:37:33 mail.srvfarm.net postfix/smtpd[262552]: warning: unknown[92.118.38.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 27 06:38:09 mail.srvfarm.net postfix/smtpd[245030]: warning: unknown[92.118.38.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 27 06:38:53 mail.srvfarm.net postfix/smtpd[262501]: warning: unknown[92.118.38.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-27 13:10:29
37.139.4.138 attackbotsspam
Apr 27 05:52:04 ns382633 sshd\[9375\]: Invalid user cps from 37.139.4.138 port 47343
Apr 27 05:52:04 ns382633 sshd\[9375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138
Apr 27 05:52:06 ns382633 sshd\[9375\]: Failed password for invalid user cps from 37.139.4.138 port 47343 ssh2
Apr 27 05:58:35 ns382633 sshd\[10440\]: Invalid user natasa from 37.139.4.138 port 56604
Apr 27 05:58:35 ns382633 sshd\[10440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138
2020-04-27 13:17:19
128.199.130.129 attackbots
128.199.130.129 - - \[27/Apr/2020:05:58:10 +0200\] "POST /wp-login.php HTTP/1.0" 200 2795 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
128.199.130.129 - - \[27/Apr/2020:05:58:12 +0200\] "POST /wp-login.php HTTP/1.0" 200 2794 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
128.199.130.129 - - \[27/Apr/2020:05:58:14 +0200\] "POST /wp-login.php HTTP/1.0" 200 2768 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-04-27 13:30:06
124.156.112.181 attackspam
Apr 27 05:02:27 scw-6657dc sshd[31111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.112.181
Apr 27 05:02:27 scw-6657dc sshd[31111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.112.181
Apr 27 05:02:29 scw-6657dc sshd[31111]: Failed password for invalid user yy from 124.156.112.181 port 39452 ssh2
...
2020-04-27 13:39:22
5.239.244.252 attackbots
Apr 27 07:23:59 [host] sshd[4029]: Invalid user sk
Apr 27 07:23:59 [host] sshd[4029]: pam_unix(sshd:a
Apr 27 07:24:00 [host] sshd[4029]: Failed password
2020-04-27 13:33:09
192.169.139.6 attackspam
Unauthorized connection attempt detected from IP address 192.169.139.6 to port 3306
2020-04-27 13:35:10
107.173.118.152 attackspambots
Apr 24 03:37:24 cloud sshd[23785]: Failed password for root from 107.173.118.152 port 50844 ssh2
Apr 27 05:58:33 cloud sshd[24242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.118.152
2020-04-27 13:16:01
134.209.24.143 attackbotsspam
Apr 27 06:46:34 ns381471 sshd[14564]: Failed password for root from 134.209.24.143 port 45072 ssh2
2020-04-27 13:03:29
111.119.252.23 attack
Apr 27 07:01:46 server sshd[36028]: Failed password for invalid user geir from 111.119.252.23 port 50298 ssh2
Apr 27 07:06:08 server sshd[39588]: Failed password for root from 111.119.252.23 port 36046 ssh2
Apr 27 07:10:25 server sshd[42710]: Failed password for invalid user kafka from 111.119.252.23 port 49996 ssh2
2020-04-27 13:37:40
124.160.83.138 attackspam
Apr 27 06:57:52 ns382633 sshd\[22530\]: Invalid user oracle from 124.160.83.138 port 40477
Apr 27 06:57:52 ns382633 sshd\[22530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.83.138
Apr 27 06:57:53 ns382633 sshd\[22530\]: Failed password for invalid user oracle from 124.160.83.138 port 40477 ssh2
Apr 27 07:11:12 ns382633 sshd\[25375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.83.138  user=root
Apr 27 07:11:14 ns382633 sshd\[25375\]: Failed password for root from 124.160.83.138 port 53182 ssh2
2020-04-27 13:12:49

最近上报的IP列表

165.250.243.44 94.11.200.191 45.190.233.201 47.45.241.53
210.139.94.117 89.175.155.197 190.24.146.247 123.33.72.187
116.49.23.32 148.146.201.220 50.67.133.189 186.110.97.200
180.199.203.135 104.119.154.20 138.175.174.243 134.208.162.109
141.159.120.38 51.138.9.119 197.236.209.14 115.152.9.140