必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.54.120.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.54.120.68.			IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 21:28:44 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
68.120.54.117.in-addr.arpa domain name pointer rev-117-54-120-68.indo.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.120.54.117.in-addr.arpa	name = rev-117-54-120-68.indo.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.172.66.222 attackspambots
2020-10-01T13:45:25.218024paragon sshd[562470]: Failed password for invalid user order from 203.172.66.222 port 57844 ssh2
2020-10-01T13:49:25.869758paragon sshd[562613]: Invalid user louis from 203.172.66.222 port 59724
2020-10-01T13:49:25.873223paragon sshd[562613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.222
2020-10-01T13:49:25.869758paragon sshd[562613]: Invalid user louis from 203.172.66.222 port 59724
2020-10-01T13:49:27.480974paragon sshd[562613]: Failed password for invalid user louis from 203.172.66.222 port 59724 ssh2
...
2020-10-01 18:07:40
60.220.185.22 attackbots
Oct  1 08:22:16 ns382633 sshd\[17661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.185.22  user=root
Oct  1 08:22:18 ns382633 sshd\[17661\]: Failed password for root from 60.220.185.22 port 45830 ssh2
Oct  1 08:40:39 ns382633 sshd\[21103\]: Invalid user bash from 60.220.185.22 port 60326
Oct  1 08:40:39 ns382633 sshd\[21103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.185.22
Oct  1 08:40:41 ns382633 sshd\[21103\]: Failed password for invalid user bash from 60.220.185.22 port 60326 ssh2
2020-10-01 18:19:08
176.31.102.37 attackbotsspam
Invalid user jobs from 176.31.102.37 port 54183
2020-10-01 18:05:27
176.31.163.192 attackbots
2020-10-01T04:53:13.450957dreamphreak.com sshd[506030]: Failed password for root from 176.31.163.192 port 46994 ssh2
2020-10-01T04:57:14.245518dreamphreak.com sshd[506042]: Invalid user ftpuser from 176.31.163.192 port 35660
...
2020-10-01 18:02:41
177.32.97.36 attackspambots
Oct 01 04:01:28 askasleikir sshd[11559]: Failed password for git from 177.32.97.36 port 52031 ssh2
2020-10-01 17:46:58
49.233.182.23 attackspambots
Oct  1 03:41:10 *** sshd[22411]: Invalid user fff from 49.233.182.23
2020-10-01 17:44:19
36.134.5.7 attackbots
Port scan denied
2020-10-01 18:08:11
101.95.86.34 attackspam
Oct  1 10:51:20 gospond sshd[28040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.95.86.34  user=root
Oct  1 10:51:21 gospond sshd[28040]: Failed password for root from 101.95.86.34 port 58941 ssh2
...
2020-10-01 18:12:06
218.18.101.84 attack
Sep 30 20:20:07 XXX sshd[23044]: Invalid user cristina from 218.18.101.84 port 33364
2020-10-01 18:05:10
190.134.177.201 attackspam
Brute force attempt
2020-10-01 17:45:12
172.81.242.40 attackbotsspam
(sshd) Failed SSH login from 172.81.242.40 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  1 00:45:31 optimus sshd[10109]: Invalid user prova from 172.81.242.40
Oct  1 00:45:31 optimus sshd[10109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.242.40 
Oct  1 00:45:33 optimus sshd[10109]: Failed password for invalid user prova from 172.81.242.40 port 47872 ssh2
Oct  1 00:50:26 optimus sshd[11577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.242.40  user=root
Oct  1 00:50:28 optimus sshd[11577]: Failed password for root from 172.81.242.40 port 46888 ssh2
2020-10-01 17:50:00
49.233.79.168 attackspambots
Invalid user ubuntu from 49.233.79.168 port 46222
2020-10-01 18:03:33
54.38.36.210 attack
Oct  1 10:37:03 vmd26974 sshd[24027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.36.210
Oct  1 10:37:06 vmd26974 sshd[24027]: Failed password for invalid user gerencia from 54.38.36.210 port 43560 ssh2
...
2020-10-01 17:48:48
164.90.190.60 attackspambots
Oct  1 10:46:44 ajax sshd[30254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.190.60 
Oct  1 10:46:45 ajax sshd[30254]: Failed password for invalid user scan from 164.90.190.60 port 45050 ssh2
2020-10-01 17:48:01
68.183.99.198 attackbotsspam
Oct  1 00:45:57 jane sshd[23910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.99.198 
Oct  1 00:45:59 jane sshd[23910]: Failed password for invalid user work from 68.183.99.198 port 40614 ssh2
...
2020-10-01 18:20:45

最近上报的IP列表

117.54.112.22 117.54.124.102 117.54.124.100 114.226.135.94
117.54.13.52 117.54.120.10 117.54.13.181 117.54.13.184
117.54.13.54 117.54.131.54 117.54.132.18 117.54.131.90
117.54.138.118 117.54.134.130 114.226.135.97 117.54.138.131
117.54.138.141 117.54.131.50 117.54.138.134 117.54.138.36