必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.148.54.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29534
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.148.54.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 18:30:29 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 54.54.148.143.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.54.148.143.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.227.211 attackspambots
*Port Scan* detected from 178.128.227.211 (CA/Canada/Ontario/Toronto (Old Toronto)/-). 4 hits in the last 210 seconds
2020-06-16 12:26:52
45.131.108.25 attackbots
Jun 16 05:47:55 iago sshd[16833]: Address 45.131.108.25 maps to 45.131.108.25.net.tube-hosting.de, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 05:47:55 iago sshd[16833]: Invalid user salar from 45.131.108.25
Jun 16 05:47:55 iago sshd[16833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.131.108.25 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.131.108.25
2020-06-16 12:16:03
160.153.234.75 attackspambots
Jun 16 05:47:27 h1745522 sshd[17883]: Invalid user valentin from 160.153.234.75 port 46652
Jun 16 05:47:27 h1745522 sshd[17883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.234.75
Jun 16 05:47:27 h1745522 sshd[17883]: Invalid user valentin from 160.153.234.75 port 46652
Jun 16 05:47:29 h1745522 sshd[17883]: Failed password for invalid user valentin from 160.153.234.75 port 46652 ssh2
Jun 16 05:51:24 h1745522 sshd[18044]: Invalid user dp from 160.153.234.75 port 48684
Jun 16 05:51:24 h1745522 sshd[18044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.234.75
Jun 16 05:51:24 h1745522 sshd[18044]: Invalid user dp from 160.153.234.75 port 48684
Jun 16 05:51:26 h1745522 sshd[18044]: Failed password for invalid user dp from 160.153.234.75 port 48684 ssh2
Jun 16 05:55:11 h1745522 sshd[18166]: Invalid user bruce from 160.153.234.75 port 50728
...
2020-06-16 12:22:02
3.21.114.79 attackspam
Failed password for invalid user kiran from 3.21.114.79 port 55496 ssh2
2020-06-16 12:25:25
187.189.153.112 attackspambots
Jun 16 06:27:37 lnxweb61 sshd[2992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.153.112
Jun 16 06:27:37 lnxweb61 sshd[2992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.153.112
2020-06-16 12:59:00
212.237.57.252 attackbotsspam
Jun 16 05:51:05 minden010 sshd[30660]: Failed password for root from 212.237.57.252 port 46144 ssh2
Jun 16 05:54:46 minden010 sshd[31211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.57.252
Jun 16 05:54:49 minden010 sshd[31211]: Failed password for invalid user admin from 212.237.57.252 port 46462 ssh2
...
2020-06-16 12:39:29
175.24.82.208 attackspam
fail2ban -- 175.24.82.208
...
2020-06-16 12:45:10
139.59.66.101 attackbots
Jun 16 06:18:57 inter-technics sshd[9169]: Invalid user sims from 139.59.66.101 port 35836
Jun 16 06:18:57 inter-technics sshd[9169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.66.101
Jun 16 06:18:57 inter-technics sshd[9169]: Invalid user sims from 139.59.66.101 port 35836
Jun 16 06:19:00 inter-technics sshd[9169]: Failed password for invalid user sims from 139.59.66.101 port 35836 ssh2
Jun 16 06:22:28 inter-technics sshd[9480]: Invalid user rv from 139.59.66.101 port 36608
...
2020-06-16 12:50:21
24.104.182.172 attackbotsspam
/Wizard/autobuilds.txt
2020-06-16 12:33:28
146.185.25.173 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-06-16 12:18:38
51.91.100.109 attackspambots
2020-06-16T06:51:40.351271afi-git.jinr.ru sshd[5518]: Invalid user cassandra from 51.91.100.109 port 57438
2020-06-16T06:51:40.354443afi-git.jinr.ru sshd[5518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.ip-51-91-100.eu
2020-06-16T06:51:40.351271afi-git.jinr.ru sshd[5518]: Invalid user cassandra from 51.91.100.109 port 57438
2020-06-16T06:51:42.499448afi-git.jinr.ru sshd[5518]: Failed password for invalid user cassandra from 51.91.100.109 port 57438 ssh2
2020-06-16T06:54:56.026521afi-git.jinr.ru sshd[6283]: Invalid user global from 51.91.100.109 port 58048
...
2020-06-16 12:35:41
198.50.136.143 attackbotsspam
Jun 16 05:46:28 sip sshd[28121]: Failed password for root from 198.50.136.143 port 55832 ssh2
Jun 16 05:54:56 sip sshd[31258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.136.143
Jun 16 05:54:59 sip sshd[31258]: Failed password for invalid user scaner from 198.50.136.143 port 58562 ssh2
2020-06-16 12:31:21
103.114.221.16 attack
Jun 16 00:48:47 firewall sshd[20131]: Invalid user lamarche from 103.114.221.16
Jun 16 00:48:49 firewall sshd[20131]: Failed password for invalid user lamarche from 103.114.221.16 port 43474 ssh2
Jun 16 00:55:14 firewall sshd[20420]: Invalid user qa from 103.114.221.16
...
2020-06-16 12:17:48
182.151.37.230 attackbots
Jun 16 06:42:56 eventyay sshd[32234]: Failed password for backup from 182.151.37.230 port 34076 ssh2
Jun 16 06:44:43 eventyay sshd[32294]: Failed password for root from 182.151.37.230 port 55918 ssh2
Jun 16 06:46:25 eventyay sshd[32329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.37.230
...
2020-06-16 12:48:21
222.186.173.238 attackspambots
2020-06-16T07:51:29.301398afi-git.jinr.ru sshd[20656]: Failed password for root from 222.186.173.238 port 19520 ssh2
2020-06-16T07:51:32.849038afi-git.jinr.ru sshd[20656]: Failed password for root from 222.186.173.238 port 19520 ssh2
2020-06-16T07:51:36.282109afi-git.jinr.ru sshd[20656]: Failed password for root from 222.186.173.238 port 19520 ssh2
2020-06-16T07:51:36.282275afi-git.jinr.ru sshd[20656]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 19520 ssh2 [preauth]
2020-06-16T07:51:36.282291afi-git.jinr.ru sshd[20656]: Disconnecting: Too many authentication failures [preauth]
...
2020-06-16 12:52:32

最近上报的IP列表

39.82.251.66 96.104.218.110 78.236.188.68 194.12.197.130
99.133.219.80 15.70.105.166 207.32.75.143 57.146.196.144
223.54.32.174 244.116.42.215 67.81.220.150 96.192.79.11
163.146.148.92 155.70.86.56 45.194.81.80 88.45.171.214
7.39.77.231 101.181.98.100 71.104.209.96 62.115.168.59