必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.70.137.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.70.137.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:07:55 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
21.137.70.154.in-addr.arpa domain name pointer proton.xtrahosting.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.137.70.154.in-addr.arpa	name = proton.xtrahosting.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.111.146.160 attackbotsspam
1589882033 - 05/19/2020 11:53:53 Host: 116.111.146.160/116.111.146.160 Port: 445 TCP Blocked
2020-05-20 00:20:05
195.154.29.107 attackspambots
wp-login brute force, XML-RPC attack
2020-05-19 23:43:00
41.94.28.9 attackbotsspam
May 19 17:40:04 meumeu sshd[173509]: Invalid user sam from 41.94.28.9 port 39228
May 19 17:40:04 meumeu sshd[173509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.94.28.9 
May 19 17:40:04 meumeu sshd[173509]: Invalid user sam from 41.94.28.9 port 39228
May 19 17:40:07 meumeu sshd[173509]: Failed password for invalid user sam from 41.94.28.9 port 39228 ssh2
May 19 17:41:45 meumeu sshd[173717]: Invalid user uzl from 41.94.28.9 port 33216
May 19 17:41:45 meumeu sshd[173717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.94.28.9 
May 19 17:41:45 meumeu sshd[173717]: Invalid user uzl from 41.94.28.9 port 33216
May 19 17:41:47 meumeu sshd[173717]: Failed password for invalid user uzl from 41.94.28.9 port 33216 ssh2
May 19 17:43:20 meumeu sshd[173900]: Invalid user fhc from 41.94.28.9 port 55270
...
2020-05-19 23:48:48
198.199.103.92 attack
May 19 11:47:52 piServer sshd[9896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.103.92 
May 19 11:47:54 piServer sshd[9896]: Failed password for invalid user pzr from 198.199.103.92 port 39541 ssh2
May 19 11:56:12 piServer sshd[10557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.103.92 
...
2020-05-19 23:50:40
106.12.84.63 attack
May 19 17:54:33 cp sshd[10316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.63
May 19 17:54:33 cp sshd[10316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.63
2020-05-20 00:12:56
190.205.103.12 attack
2020-05-20T01:11:53.624229vivaldi2.tree2.info sshd[13665]: Invalid user cwv from 190.205.103.12
2020-05-20T01:11:53.657169vivaldi2.tree2.info sshd[13665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190-205-103-12.dyn.dsl.cantv.net
2020-05-20T01:11:53.624229vivaldi2.tree2.info sshd[13665]: Invalid user cwv from 190.205.103.12
2020-05-20T01:11:55.575513vivaldi2.tree2.info sshd[13665]: Failed password for invalid user cwv from 190.205.103.12 port 31985 ssh2
2020-05-20T01:12:57.202762vivaldi2.tree2.info sshd[13726]: Invalid user djc from 190.205.103.12
...
2020-05-20 00:16:25
172.81.224.43 attackbots
May 18 20:19:59 r.ca sshd[32513]: Failed password for invalid user nominatim from 172.81.224.43 port 50834 ssh2
2020-05-20 00:08:43
165.227.88.167 attackbotsspam
May 19 11:56:20 pornomens sshd\[4877\]: Invalid user takazawa from 165.227.88.167 port 44456
May 19 11:56:20 pornomens sshd\[4877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.88.167
May 19 11:56:21 pornomens sshd\[4877\]: Failed password for invalid user takazawa from 165.227.88.167 port 44456 ssh2
...
2020-05-19 23:48:16
91.134.240.130 attackspambots
2020-05-16T20:47:58.014333linuxbox-skyline sshd[25986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.240.130  user=root
2020-05-16T20:47:59.674312linuxbox-skyline sshd[25986]: Failed password for root from 91.134.240.130 port 39113 ssh2
...
2020-05-19 23:41:14
91.220.81.12 proxy
roubo de conta de stean apartir de link q diz skin gratis
2020-05-19 22:20:27
198.108.66.192 attack
198.108.66.192

Version: '5.5.65-MariaDB'  socket: '/var/lib/mysql/mysql.sock'  port: 3306  MariaDB Server
200518 16:51:03 [Note] Hostname 'worker-12.sfj.corp.censys.io' does not resolve to '198.108.66.196'.
200518 16:51:03 [Note] Hostname 'worker-12.sfj.corp.censys.io' has the following IP addresses:
2020-05-20 00:00:36
52.232.246.89 attackspam
May 16 21:32:55 Host-KEWR-E sshd[779]: User root from 52.232.246.89 not allowed because not listed in AllowUsers
...
2020-05-19 23:38:49
190.24.6.162 attackbots
Invalid user joerg from 190.24.6.162 port 59846
2020-05-19 23:39:09
72.223.168.76 attack
A user with IP addr 72.223.168.76 has been locked out from signing in or using the password recovery form for the following reason: Exceeded the maximum number of login failures which is: 20.
2020-05-20 00:10:28
222.242.223.75 attackbotsspam
2020-05-19T11:52:42.960548scmdmz1 sshd[19537]: Invalid user hip from 222.242.223.75 port 30370
2020-05-19T11:52:44.895672scmdmz1 sshd[19537]: Failed password for invalid user hip from 222.242.223.75 port 30370 ssh2
2020-05-19T11:56:09.685417scmdmz1 sshd[20010]: Invalid user cmg from 222.242.223.75 port 16450
...
2020-05-19 23:44:39

最近上报的IP列表

225.150.86.244 148.177.29.1 78.148.216.124 164.216.44.47
147.80.209.166 57.133.15.186 93.246.79.100 21.86.239.130
54.184.255.115 12.54.29.110 15.161.93.232 69.173.139.35
240.20.222.170 184.27.4.108 242.65.48.227 173.186.57.205
248.94.49.221 232.35.25.234 205.160.80.50 243.46.119.148