必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): Telus

主机名(hostname): unknown

机构(organization): TELUS Communications Inc.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.232.111.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32241
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.232.111.54.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 28 00:40:13 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
54.111.232.216.in-addr.arpa domain name pointer s216-232-111-54.bc.hsia.telus.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
54.111.232.216.in-addr.arpa	name = s216-232-111-54.bc.hsia.telus.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.173.215 attackbotsspam
Feb  8 21:56:28 web9 sshd\[13700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Feb  8 21:56:31 web9 sshd\[13700\]: Failed password for root from 222.186.173.215 port 41846 ssh2
Feb  8 21:56:34 web9 sshd\[13700\]: Failed password for root from 222.186.173.215 port 41846 ssh2
Feb  8 21:56:48 web9 sshd\[13741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Feb  8 21:56:50 web9 sshd\[13741\]: Failed password for root from 222.186.173.215 port 36984 ssh2
2020-02-09 15:58:26
82.213.251.117 attackspambots
(sshd) Failed SSH login from 82.213.251.117 (ES/Spain/Madrid/Madrid/static.117.251.213.82.ibercom.com/[AS15704 Xtra Telecom S.A.]): 1 in the last 3600 secs
2020-02-09 15:32:59
222.186.169.194 attackbotsspam
k+ssh-bruteforce
2020-02-09 15:27:21
165.22.52.22 attackbotsspam
Fake Googlebot
2020-02-09 15:44:20
51.158.108.135 attackbots
xmlrpc attack
2020-02-09 15:49:46
171.34.173.49 attackspam
Feb  9 08:50:20 DAAP sshd[758]: Invalid user iio from 171.34.173.49 port 40402
Feb  9 08:50:20 DAAP sshd[758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.173.49
Feb  9 08:50:20 DAAP sshd[758]: Invalid user iio from 171.34.173.49 port 40402
Feb  9 08:50:22 DAAP sshd[758]: Failed password for invalid user iio from 171.34.173.49 port 40402 ssh2
Feb  9 08:54:28 DAAP sshd[795]: Invalid user tbj from 171.34.173.49 port 49085
...
2020-02-09 15:57:22
125.163.208.246 attack
1581224149 - 02/09/2020 05:55:49 Host: 125.163.208.246/125.163.208.246 Port: 445 TCP Blocked
2020-02-09 15:17:36
112.217.225.61 attack
Feb  9 06:26:43 [snip] sshd[23498]: Invalid user vtk from 112.217.225.61 port 61520
Feb  9 06:26:43 [snip] sshd[23498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.225.61
Feb  9 06:26:45 [snip] sshd[23498]: Failed password for invalid user vtk from 112.217.225.61 port 61520 ssh2[...]
2020-02-09 15:29:33
80.108.220.67 attackbots
2020-02-08T23:54:55.992997vostok sshd\[5100\]: Invalid user qtx from 80.108.220.67 port 53220
2020-02-08T23:54:55.996653vostok sshd\[5100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80-108-220-67.cable.dynamic.surfer.at | Triggered by Fail2Ban at Vostok web server
2020-02-09 15:40:30
2.132.93.49 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 09-02-2020 04:55:10.
2020-02-09 15:45:25
144.217.136.227 attack
Feb  9 08:03:23 SilenceServices sshd[15726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.136.227
Feb  9 08:03:25 SilenceServices sshd[15726]: Failed password for invalid user bhn from 144.217.136.227 port 55938 ssh2
Feb  9 08:06:56 SilenceServices sshd[17783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.136.227
2020-02-09 15:44:44
93.157.193.18 attack
Automatic report - Banned IP Access
2020-02-09 15:20:51
203.95.212.41 attackspam
unauthorized connection attempt
2020-02-09 15:35:27
106.54.198.115 attack
Feb  9 02:58:07 firewall sshd[32341]: Invalid user emw from 106.54.198.115
Feb  9 02:58:10 firewall sshd[32341]: Failed password for invalid user emw from 106.54.198.115 port 34100 ssh2
Feb  9 03:01:34 firewall sshd[32530]: Invalid user wiq from 106.54.198.115
...
2020-02-09 15:20:20
219.85.103.111 attackspambots
Feb  9 05:55:38 debian-2gb-nbg1-2 kernel: \[3483376.295732\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=219.85.103.111 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=46 ID=6998 PROTO=TCP SPT=39561 DPT=23 WINDOW=7034 RES=0x00 SYN URGP=0
2020-02-09 15:25:39

最近上报的IP列表

66.177.123.67 50.157.143.85 201.193.198.70 106.72.169.175
118.190.15.100 125.80.235.128 142.138.221.105 186.215.222.233
67.16.194.73 171.61.148.166 197.207.239.122 61.161.210.92
176.121.184.62 238.215.132.197 83.115.23.73 78.209.19.207
177.139.18.185 182.128.175.73 104.220.206.212 24.146.232.81