必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.42.54.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42878
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.42.54.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 11:05:24 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 197.54.42.159.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.54.42.159.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.254.114.105 attackbotsspam
2019-10-30T14:13:31.920375scmdmz1 sshd\[30515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.ip-51-254-114.eu  user=root
2019-10-30T14:13:33.874519scmdmz1 sshd\[30515\]: Failed password for root from 51.254.114.105 port 39728 ssh2
2019-10-30T14:19:44.235578scmdmz1 sshd\[31012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.ip-51-254-114.eu  user=root
...
2019-10-30 22:19:15
86.107.12.15 attack
445/tcp 445/tcp
[2019-10-30]2pkt
2019-10-30 22:30:04
209.141.34.95 attackspambots
Web App Attack
2019-10-30 22:51:38
144.217.243.216 attackbotsspam
Oct 30 14:01:16 localhost sshd\[20400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.243.216  user=root
Oct 30 14:01:18 localhost sshd\[20400\]: Failed password for root from 144.217.243.216 port 37960 ssh2
Oct 30 14:05:03 localhost sshd\[20641\]: Invalid user xy from 144.217.243.216
Oct 30 14:05:03 localhost sshd\[20641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.243.216
Oct 30 14:05:05 localhost sshd\[20641\]: Failed password for invalid user xy from 144.217.243.216 port 49112 ssh2
...
2019-10-30 22:33:21
49.88.112.71 attack
2019-10-30T14:18:12.116788shield sshd\[1934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-10-30T14:18:14.158238shield sshd\[1934\]: Failed password for root from 49.88.112.71 port 13548 ssh2
2019-10-30T14:18:17.516780shield sshd\[1934\]: Failed password for root from 49.88.112.71 port 13548 ssh2
2019-10-30T14:18:20.282414shield sshd\[1934\]: Failed password for root from 49.88.112.71 port 13548 ssh2
2019-10-30T14:18:42.237256shield sshd\[2031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-10-30 22:21:43
109.237.1.81 attackspam
1433/tcp
[2019-10-30]1pkt
2019-10-30 22:17:56
182.73.105.146 attackspambots
445/tcp
[2019-10-30]1pkt
2019-10-30 22:24:41
41.180.68.214 attackbots
Oct 30 14:57:43 serwer sshd\[17230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.180.68.214  user=root
Oct 30 14:57:45 serwer sshd\[17230\]: Failed password for root from 41.180.68.214 port 57156 ssh2
Oct 30 15:06:14 serwer sshd\[18717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.180.68.214  user=root
...
2019-10-30 22:57:18
218.87.30.159 attack
1433/tcp
[2019-10-30]1pkt
2019-10-30 22:37:53
173.237.113.70 attackspam
5555/tcp
[2019-10-30]1pkt
2019-10-30 22:47:24
190.236.38.236 attackspam
Oct 30 14:33:19 srv206 sshd[28873]: Invalid user password from 190.236.38.236
...
2019-10-30 22:36:02
36.189.255.162 attack
Oct 30 15:33:25 lnxweb62 sshd[24850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.255.162
2019-10-30 23:03:31
187.28.50.230 attack
Invalid user ftpuser from 187.28.50.230 port 38952
2019-10-30 22:26:54
149.202.59.85 attackbots
2019-10-30T12:26:06.738224abusebot-8.cloudsearch.cf sshd\[24285\]: Invalid user profili from 149.202.59.85 port 49545
2019-10-30 22:47:54
185.222.58.132 attackbots
Multiple WP attacks, tries to access /new/wp-admin/install.php
2019-10-30 22:17:37

最近上报的IP列表

221.237.14.255 114.241.190.119 144.92.235.77 96.220.225.1
124.74.151.122 17.214.73.13 101.213.243.17 77.6.35.153
76.64.38.208 192.164.71.209 165.170.99.159 116.95.213.51
240.24.224.31 34.217.206.248 54.65.6.88 16.26.145.17
143.35.232.95 250.95.34.108 125.59.163.91 70.142.58.49