必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.58.254.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.58.254.103.			IN	A

;; AUTHORITY SECTION:
.			190	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041101 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 09:03:28 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 103.254.58.140.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.254.58.140.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.182.252.63 attack
Oct 23 15:07:02 SilenceServices sshd[2262]: Failed password for root from 217.182.252.63 port 50866 ssh2
Oct 23 15:10:46 SilenceServices sshd[3293]: Failed password for root from 217.182.252.63 port 60506 ssh2
2019-10-23 21:16:57
218.78.53.37 attackbots
2019-10-23T11:48:15.101341abusebot.cloudsearch.cf sshd\[11747\]: Invalid user williams from 218.78.53.37 port 34160
2019-10-23 21:42:50
1.48.224.69 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-10-23 21:55:55
202.75.207.106 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-23 21:48:11
118.126.108.213 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-10-23 21:58:19
103.194.248.166 attackbotsspam
(imapd) Failed IMAP login from 103.194.248.166 (IN/India/-): 1 in the last 3600 secs
2019-10-23 21:25:29
106.12.198.21 attack
Automatic report - Banned IP Access
2019-10-23 21:18:50
35.205.126.251 attack
Port Scan
2019-10-23 21:44:07
157.7.52.245 attackbotsspam
Lines containing failures of 157.7.52.245
Oct 21 13:30:07 shared02 sshd[2600]: Invalid user admin from 157.7.52.245 port 60738
Oct 21 13:30:07 shared02 sshd[2600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.52.245
Oct 21 13:30:09 shared02 sshd[2600]: Failed password for invalid user admin from 157.7.52.245 port 60738 ssh2
Oct 21 13:30:09 shared02 sshd[2600]: Received disconnect from 157.7.52.245 port 60738:11: Normal Shutdown, Thank you for playing [preauth]
Oct 21 13:30:09 shared02 sshd[2600]: Disconnected from invalid user admin 157.7.52.245 port 60738 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.7.52.245
2019-10-23 21:15:04
66.249.155.245 attackbots
Oct 23 15:21:17 tux-35-217 sshd\[31360\]: Invalid user unit from 66.249.155.245 port 53878
Oct 23 15:21:17 tux-35-217 sshd\[31360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.245
Oct 23 15:21:19 tux-35-217 sshd\[31360\]: Failed password for invalid user unit from 66.249.155.245 port 53878 ssh2
Oct 23 15:25:34 tux-35-217 sshd\[31396\]: Invalid user phpmyadmin from 66.249.155.245 port 35322
Oct 23 15:25:34 tux-35-217 sshd\[31396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.245
...
2019-10-23 21:29:15
2.136.131.36 attack
2019-10-23T13:35:54.382821abusebot-5.cloudsearch.cf sshd\[5006\]: Invalid user arkserver from 2.136.131.36 port 33176
2019-10-23 21:38:47
191.100.8.160 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 21:49:08
54.37.233.192 attack
Oct 23 14:07:42 microserver sshd[4551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.233.192  user=root
Oct 23 14:07:44 microserver sshd[4551]: Failed password for root from 54.37.233.192 port 59000 ssh2
Oct 23 14:11:39 microserver sshd[5133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.233.192  user=root
Oct 23 14:11:41 microserver sshd[5133]: Failed password for root from 54.37.233.192 port 42286 ssh2
Oct 23 14:15:40 microserver sshd[5687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.233.192  user=root
Oct 23 14:27:23 microserver sshd[7115]: Invalid user address from 54.37.233.192 port 54834
Oct 23 14:27:23 microserver sshd[7115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.233.192
Oct 23 14:27:24 microserver sshd[7115]: Failed password for invalid user address from 54.37.233.192 port 54834 ssh2
Oct 23 14:31:20
2019-10-23 21:13:54
104.244.72.33 attackbotsspam
Oct 23 13:48:11 rotator sshd\[11364\]: Invalid user wangjiaxu from 104.244.72.33Oct 23 13:48:13 rotator sshd\[11364\]: Failed password for invalid user wangjiaxu from 104.244.72.33 port 49296 ssh2Oct 23 13:48:15 rotator sshd\[11366\]: Invalid user wangmj from 104.244.72.33Oct 23 13:48:17 rotator sshd\[11366\]: Failed password for invalid user wangmj from 104.244.72.33 port 50228 ssh2Oct 23 13:48:20 rotator sshd\[11368\]: Invalid user Wang from 104.244.72.33Oct 23 13:48:21 rotator sshd\[11368\]: Failed password for invalid user Wang from 104.244.72.33 port 51200 ssh2
...
2019-10-23 21:38:09
193.70.81.201 attack
Oct 23 02:55:53 php1 sshd\[2932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.81.201  user=root
Oct 23 02:55:55 php1 sshd\[2932\]: Failed password for root from 193.70.81.201 port 60480 ssh2
Oct 23 02:59:55 php1 sshd\[3236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.81.201  user=root
Oct 23 02:59:58 php1 sshd\[3236\]: Failed password for root from 193.70.81.201 port 43762 ssh2
Oct 23 03:04:03 php1 sshd\[3548\]: Invalid user ayesha from 193.70.81.201
2019-10-23 21:49:58

最近上报的IP列表

85.222.20.218 103.44.61.211 177.76.229.251 212.162.151.30
158.69.206.223 19.111.156.160 88.255.121.68 50.190.53.125
65.24.60.186 4.3.64.66 117.87.105.111 205.76.130.9
18.199.243.84 208.24.161.103 250.186.47.102 72.29.77.162
132.80.58.123 185.220.101.175 188.254.112.8 177.90.10.65