必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 115.201.145.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;115.201.145.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 11:04:49 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 54.145.201.115.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.145.201.115.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
168.121.71.14 attackbots
$f2bV_matches
2019-12-30 20:46:12
106.12.10.119 attackspambots
Automatic report - Banned IP Access
2019-12-30 21:10:37
39.152.54.180 attackbotsspam
Dec 30 07:21:55 163-172-32-151 proftpd[23917]: 0.0.0.0 (39.152.54.180[39.152.54.180]) - USER anonymous: no such user found from 39.152.54.180 [39.152.54.180] to 163.172.32.151:21
...
2019-12-30 20:54:04
154.117.174.98 attackbotsspam
Dec 30 14:04:35 cvbnet sshd[5257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.117.174.98 
Dec 30 14:04:37 cvbnet sshd[5257]: Failed password for invalid user ftp from 154.117.174.98 port 63867 ssh2
...
2019-12-30 21:23:54
152.115.62.241 attackspambots
19/12/30@01:21:17: FAIL: Alarm-Intrusion address from=152.115.62.241
...
2019-12-30 21:15:23
14.191.173.43 attackspambots
19/12/30@01:22:01: FAIL: Alarm-Network address from=14.191.173.43
19/12/30@01:22:01: FAIL: Alarm-Network address from=14.191.173.43
...
2019-12-30 20:50:31
121.66.224.90 attackspam
SSH invalid-user multiple login try
2019-12-30 21:02:00
2.138.58.65 attackbotsspam
Dec 30 14:43:17 site3 sshd\[36063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.138.58.65  user=root
Dec 30 14:43:19 site3 sshd\[36063\]: Failed password for root from 2.138.58.65 port 33839 ssh2
Dec 30 14:47:56 site3 sshd\[36089\]: Invalid user kkariuki from 2.138.58.65
Dec 30 14:47:56 site3 sshd\[36089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.138.58.65
Dec 30 14:47:58 site3 sshd\[36089\]: Failed password for invalid user kkariuki from 2.138.58.65 port 46971 ssh2
...
2019-12-30 20:57:46
36.85.220.193 attackbots
ssh brute force
2019-12-30 20:54:19
80.11.253.50 attackspam
Lines containing failures of 80.11.253.50
Dec 30 07:20:13 MAKserver05 sshd[24825]: Invalid user guest from 80.11.253.50 port 60585
Dec 30 07:20:13 MAKserver05 sshd[24825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.11.253.50 
Dec 30 07:20:15 MAKserver05 sshd[24825]: Failed password for invalid user guest from 80.11.253.50 port 60585 ssh2
Dec 30 07:20:15 MAKserver05 sshd[24825]: Connection closed by invalid user guest 80.11.253.50 port 60585 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=80.11.253.50
2019-12-30 20:51:14
92.63.194.27 attackspambots
PPTP VPN Brute-Force login. Usernames it tries are: 1, 11, 111, 1111, 123, 1234, Admin, admin, test, user, vpn
2019-12-30 21:13:14
107.152.174.115 attack
(From EdFrez689@gmail.com) Hi!

Do you know that there are modern features that can be integrated to your website to help it run the business with ease for both your company and your clients? I'm quite sure you've thought about making some improvements on how your site looks, but did you know that not only can you make it look better, but you can also make it more user-friendly so that your can attract more clients. I was just looking at your website and I thought I'd share some of my ideas with you. 

I am a professional web designer that is dedicated to helping businesses grow. We do this by making sure that your website is the best that it can be in terms of aesthetics, functionality, and reliability in handling your business online. I can give you plenty of information and examples of what we've done for other clients and what the results have been. The freelance work I do is done locally and is never outsourced.

I'll be glad to give you more information about the redesign at a time that's best for
2019-12-30 20:55:33
47.107.86.185 attackbotsspam
"GET /TP/public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/TP/public/index.php"
"GET /TP/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/TP/index.php"
"GET /thinkphp/html/public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/thinkphp/html/public/index.php"
"GET /html/public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/html/public/index.php"
"GET /public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/public/index.php"
"GET /TP/html/public/index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/TP/html/public/index.php"
"GET /elrekt.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/elrekt.php"
"GET /index.php HTTP/1.1" 404 136 "http://ip.ad.dr.ess/index.php"
"GET / HTTP/1.1" 200 337 "http://ip.ad.dr.ess:80"
2019-12-30 20:48:57
71.6.232.4 attack
Unauthorized connection attempt detected from IP address 71.6.232.4 to port 8080
2019-12-30 21:19:25
118.25.11.204 attackbotsspam
$f2bV_matches
2019-12-30 21:03:28

最近上报的IP列表

123.177.155.218 43.104.71.62 226.52.125.131 132.255.213.192
93.67.20.225 156.100.68.84 165.105.141.98 152.11.255.170
166.22.55.192 250.218.194.179 195.64.161.244 190.175.66.85
22.216.3.177 49.57.114.113 94.84.204.123 149.119.170.113
107.59.205.57 79.64.74.143 63.1.249.38 35.116.242.148