必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Pakistan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.154.252.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52527
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.154.252.245.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 08:58:24 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 245.252.154.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.252.154.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
128.199.95.60 attack
F2B jail: sshd. Time: 2019-11-20 17:26:55, Reported by: VKReport
2019-11-21 00:39:05
212.109.27.86 attack
Unauthorized connection attempt from IP address 212.109.27.86 on Port 445(SMB)
2019-11-21 00:29:19
187.254.97.120 attackbots
2019-11-20 15:32:06 unexpected disconnection while reading SMTP command from ([187.254.97.120]) [187.254.97.120]:15554 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-11-20 15:32:22 unexpected disconnection while reading SMTP command from ([187.254.97.120]) [187.254.97.120]:54592 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-11-20 15:32:45 unexpected disconnection while reading SMTP command from ([187.254.97.120]) [187.254.97.120]:2872 I=[10.100.18.25]:25 (error: Connection reset by peer)

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.254.97.120
2019-11-21 00:32:49
185.162.235.95 attackbotsspam
MAIL: User Login Brute Force Attempt
2019-11-21 00:17:23
36.89.121.234 attackspambots
Unauthorized connection attempt from IP address 36.89.121.234 on Port 445(SMB)
2019-11-21 00:05:20
83.97.20.46 attack
(Nov 20)  LEN=40 TTL=243 ID=54321 TCP DPT=21 WINDOW=65535 SYN 
 (Nov 20)  LEN=40 TTL=241 ID=54321 TCP DPT=445 WINDOW=65535 SYN 
 (Nov 20)  LEN=40 TTL=241 ID=54321 TCP DPT=1433 WINDOW=65535 SYN 
 (Nov 19)  LEN=40 TTL=241 ID=54321 TCP DPT=8080 WINDOW=65535 SYN 
 (Nov 19)  LEN=40 TTL=241 ID=54321 TCP DPT=3389 WINDOW=65535 SYN 
 (Nov 19)  LEN=40 TTL=241 ID=54321 TCP DPT=3306 WINDOW=65535 SYN 
 (Nov 18)  LEN=40 TTL=241 ID=54321 TCP DPT=137 WINDOW=65535 SYN 
 (Nov 18)  LEN=40 TTL=241 ID=54321 TCP DPT=135 WINDOW=65535 SYN 
 (Nov 18)  LEN=40 TTL=241 ID=54321 TCP DPT=111 WINDOW=65535 SYN 
 (Nov 17)  LEN=40 TTL=241 ID=54321 TCP DPT=445 WINDOW=65535 SYN 
 (Nov 17)  LEN=40 TTL=241 ID=54321 TCP DPT=1433 WINDOW=65535 SYN 
 (Nov 17)  LEN=40 TTL=241 ID=54321 TCP DPT=8080 WINDOW=65535 SYN
2019-11-21 00:26:06
122.179.156.138 attackbotsspam
Unauthorized connection attempt from IP address 122.179.156.138 on Port 445(SMB)
2019-11-21 00:43:10
81.22.45.25 attack
Port scan on 3 port(s): 3393 13389 23389
2019-11-21 00:07:22
54.39.50.204 attackspambots
Nov 20 16:57:50 vtv3 sshd[1160]: Failed password for root from 54.39.50.204 port 48268 ssh2
Nov 20 17:01:13 vtv3 sshd[2046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.50.204 
Nov 20 17:01:15 vtv3 sshd[2046]: Failed password for invalid user dennis from 54.39.50.204 port 27444 ssh2
Nov 20 17:12:50 vtv3 sshd[4393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.50.204 
Nov 20 17:12:51 vtv3 sshd[4393]: Failed password for invalid user mysql from 54.39.50.204 port 21530 ssh2
Nov 20 17:16:25 vtv3 sshd[5283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.50.204 
Nov 20 17:27:01 vtv3 sshd[7511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.50.204 
Nov 20 17:27:03 vtv3 sshd[7511]: Failed password for invalid user home from 54.39.50.204 port 51254 ssh2
Nov 20 17:30:46 vtv3 sshd[8401]: Failed password for root from 54.39.50.20
2019-11-21 00:47:36
95.85.26.23 attack
Nov 20 04:41:53 auw2 sshd\[31278\]: Invalid user SWITCHES_SW from 95.85.26.23
Nov 20 04:41:53 auw2 sshd\[31278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=otakoyi.com.ua
Nov 20 04:41:55 auw2 sshd\[31278\]: Failed password for invalid user SWITCHES_SW from 95.85.26.23 port 59094 ssh2
Nov 20 04:45:26 auw2 sshd\[31561\]: Invalid user brown from 95.85.26.23
Nov 20 04:45:26 auw2 sshd\[31561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=otakoyi.com.ua
2019-11-21 00:25:45
185.153.199.2 attackbotsspam
11/20/2019-15:49:58.029864 185.153.199.2 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2019-11-21 00:08:10
203.109.108.39 attackspambots
Unauthorized connection attempt from IP address 203.109.108.39 on Port 445(SMB)
2019-11-21 00:20:44
34.74.188.104 attackbotsspam
C1,WP GET /digitale-produkte/wp-login.php
2019-11-21 00:26:33
125.214.48.28 attack
Unauthorized connection attempt from IP address 125.214.48.28 on Port 445(SMB)
2019-11-21 00:42:55
49.236.195.48 attackspam
Nov 20 06:06:44 auw2 sshd\[5859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.195.48  user=root
Nov 20 06:06:47 auw2 sshd\[5859\]: Failed password for root from 49.236.195.48 port 43042 ssh2
Nov 20 06:10:57 auw2 sshd\[6289\]: Invalid user abhay from 49.236.195.48
Nov 20 06:10:57 auw2 sshd\[6289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.195.48
Nov 20 06:11:00 auw2 sshd\[6289\]: Failed password for invalid user abhay from 49.236.195.48 port 50446 ssh2
2019-11-21 00:12:56

最近上报的IP列表

12.208.94.74 84.97.5.184 226.206.59.245 138.198.245.118
158.31.61.76 228.17.74.161 174.168.220.22 140.71.132.166
101.101.116.114 40.143.141.116 34.162.138.135 108.93.43.72
48.231.221.178 24.36.49.142 231.158.66.132 224.84.181.251
86.162.238.124 70.231.74.232 16.63.132.79 4.84.173.241