必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.54.104.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.54.104.41.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 20:59:00 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
41.104.54.119.in-addr.arpa domain name pointer 41.104.54.119.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.104.54.119.in-addr.arpa	name = 41.104.54.119.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.93.3.114 attackbotsspam
(From raphaeinpums@gmail.com) Ciao!  streckerfamilychiropractic.com 
 
We put up of the sale 
 
Sending your business proposition through the feedback form which can be found on the sites in the contact partition. Feedback forms are filled in by our application and the captcha is solved. The advantage of this method is that messages sent through feedback forms are whitelisted. This technique improve the probability that your message will be read. 
 
Our database contains more than 25 million sites around the world to which we can send your message. 
 
The cost of one million messages 49 USD 
 
FREE TEST mailing of 50,000 messages to any country of your choice. 
 
 
This message is automatically generated to use our contacts for communication. 
 
 
 
Contact us. 
Telegram - @FeedbackFormEU 
Skype  FeedbackForm2019 
WhatsApp - +44 7598 509161 
Email - FeedbackForm@make-success.com
2019-07-06 17:27:34
27.66.253.52 attack
Jul  6 05:41:49 mail sshd\[22530\]: Invalid user admin from 27.66.253.52
Jul  6 05:41:49 mail sshd\[22530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.66.253.52
Jul  6 05:41:51 mail sshd\[22530\]: Failed password for invalid user admin from 27.66.253.52 port 41672 ssh2
2019-07-06 17:57:18
211.177.84.154 attackbotsspam
Jul  6 05:33:51 mxgate1 postfix/postscreen[30471]: CONNECT from [211.177.84.154]:48116 to [176.31.12.44]:25
Jul  6 05:33:51 mxgate1 postfix/dnsblog[30475]: addr 211.177.84.154 listed by domain zen.spamhaus.org as 127.0.0.3
Jul  6 05:33:51 mxgate1 postfix/dnsblog[30475]: addr 211.177.84.154 listed by domain zen.spamhaus.org as 127.0.0.11
Jul  6 05:33:51 mxgate1 postfix/dnsblog[30475]: addr 211.177.84.154 listed by domain zen.spamhaus.org as 127.0.0.4
Jul  6 05:33:51 mxgate1 postfix/dnsblog[30473]: addr 211.177.84.154 listed by domain b.barracudacentral.org as 127.0.0.2
Jul  6 05:33:52 mxgate1 postfix/dnsblog[30476]: addr 211.177.84.154 listed by domain cbl.abuseat.org as 127.0.0.2
Jul  6 05:33:57 mxgate1 postfix/postscreen[30471]: DNSBL rank 4 for [211.177.84.154]:48116
Jul x@x
Jul  6 05:34:00 mxgate1 postfix/postscreen[30471]: HANGUP after 2.9 from [211.177.84.154]:48116 in tests after SMTP handshake
Jul  6 05:34:00 mxgate1 postfix/postscreen[30471]: DISCONNECT [211.177........
-------------------------------
2019-07-06 18:05:14
206.189.209.142 attackspam
19/7/6@05:46:49: FAIL: Alarm-Intrusion address from=206.189.209.142
...
2019-07-06 17:47:41
106.52.230.77 attack
Jul  6 10:47:49 62-210-73-4 sshd\[13865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.230.77  user=root
Jul  6 10:47:51 62-210-73-4 sshd\[13865\]: Failed password for root from 106.52.230.77 port 35726 ssh2
...
2019-07-06 17:52:11
49.247.210.176 attackbots
Jul  6 05:43:54 ns41 sshd[7703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.210.176
2019-07-06 17:04:52
111.231.75.83 attackspam
Jul  6 12:20:50 hosting sshd[23434]: Invalid user odoo from 111.231.75.83 port 41856
...
2019-07-06 18:07:46
171.238.191.168 attackbotsspam
Jul  6 06:43:20 srv-4 sshd\[5218\]: Invalid user admin from 171.238.191.168
Jul  6 06:43:20 srv-4 sshd\[5218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.238.191.168
Jul  6 06:43:22 srv-4 sshd\[5218\]: Failed password for invalid user admin from 171.238.191.168 port 48293 ssh2
...
2019-07-06 17:15:26
92.53.96.202 attack
Wordpress Admin Login attack
2019-07-06 17:26:56
216.244.66.245 attackspambots
20 attempts against mh-misbehave-ban on comet.magehost.pro
2019-07-06 18:01:54
41.239.72.54 attackspambots
Jul  6 05:33:30 shared06 sshd[16916]: Invalid user admin from 41.239.72.54
Jul  6 05:33:30 shared06 sshd[16916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.239.72.54
Jul  6 05:33:32 shared06 sshd[16916]: Failed password for invalid user admin from 41.239.72.54 port 50657 ssh2
Jul  6 05:33:32 shared06 sshd[16916]: Connection closed by 41.239.72.54 port 50657 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.239.72.54
2019-07-06 18:04:21
108.39.73.192 attackspambots
Jul  6 05:41:54 dev sshd\[21937\]: Invalid user pi from 108.39.73.192 port 52482
Jul  6 05:41:54 dev sshd\[21939\]: Invalid user pi from 108.39.73.192 port 52484
Jul  6 05:41:56 dev sshd\[21937\]: Failed password for invalid user pi from 108.39.73.192 port 52482 ssh2
2019-07-06 17:56:43
196.46.36.144 attackbots
Invalid user ih from 196.46.36.144 port 39091
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.36.144
Failed password for invalid user ih from 196.46.36.144 port 39091 ssh2
Invalid user teacher from 196.46.36.144 port 51198
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.36.144
2019-07-06 17:25:06
185.137.111.123 attack
2019-07-06T12:12:09.366506ns1.unifynetsol.net postfix/smtpd\[8595\]: warning: unknown\[185.137.111.123\]: SASL LOGIN authentication failed: authentication failure
2019-07-06T12:12:54.609575ns1.unifynetsol.net postfix/smtpd\[8701\]: warning: unknown\[185.137.111.123\]: SASL LOGIN authentication failed: authentication failure
2019-07-06T12:13:40.666680ns1.unifynetsol.net postfix/smtpd\[8701\]: warning: unknown\[185.137.111.123\]: SASL LOGIN authentication failed: authentication failure
2019-07-06T12:14:25.764881ns1.unifynetsol.net postfix/smtpd\[15856\]: warning: unknown\[185.137.111.123\]: SASL LOGIN authentication failed: authentication failure
2019-07-06T12:15:11.445236ns1.unifynetsol.net postfix/smtpd\[8701\]: warning: unknown\[185.137.111.123\]: SASL LOGIN authentication failed: authentication failure
2019-07-06 17:17:15
206.189.145.152 attackspam
2019-07-06T16:30:42.390813enmeeting.mahidol.ac.th sshd\[9184\]: Invalid user porno from 206.189.145.152 port 49014
2019-07-06T16:30:42.409494enmeeting.mahidol.ac.th sshd\[9184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.152
2019-07-06T16:30:44.362437enmeeting.mahidol.ac.th sshd\[9184\]: Failed password for invalid user porno from 206.189.145.152 port 49014 ssh2
...
2019-07-06 17:43:24

最近上报的IP列表

228.151.139.188 166.22.71.187 45.19.128.45 207.66.136.228
230.240.45.229 100.101.62.111 126.22.131.166 112.194.105.190
147.119.113.122 108.6.243.155 213.203.16.50 122.202.7.150
134.217.242.62 189.51.44.85 197.67.211.79 125.62.212.92
5.39.222.60 110.124.83.194 111.53.49.210 252.32.50.81