必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Prague

省份(region): Hlavni mesto Praha

国家(country): Czechia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.138.199.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.138.199.54.			IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021080601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 07 10:41:27 CST 2021
;; MSG SIZE  rcvd: 107
HOST信息:
Host 54.199.138.217.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.199.138.217.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.253.21.98 attackspam
Sep 21 05:37:55 vtv3 sshd\[30025\]: Invalid user hxhtftp from 183.253.21.98 port 15688
Sep 21 05:37:55 vtv3 sshd\[30025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.253.21.98
Sep 21 05:37:57 vtv3 sshd\[30025\]: Failed password for invalid user hxhtftp from 183.253.21.98 port 15688 ssh2
Sep 21 05:43:52 vtv3 sshd\[505\]: Invalid user cubes from 183.253.21.98 port 14042
Sep 21 05:43:52 vtv3 sshd\[505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.253.21.98
Sep 21 05:55:54 vtv3 sshd\[6929\]: Invalid user uftp from 183.253.21.98 port 14296
Sep 21 05:55:54 vtv3 sshd\[6929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.253.21.98
Sep 21 05:55:57 vtv3 sshd\[6929\]: Failed password for invalid user uftp from 183.253.21.98 port 14296 ssh2
Sep 21 06:02:01 vtv3 sshd\[10053\]: Invalid user school from 183.253.21.98 port 14640
Sep 21 06:02:01 vtv3 sshd\[10053\]: pam_unix\
2019-09-21 12:52:40
182.61.33.137 attackbots
Sep 21 06:46:15 plex sshd[25417]: Invalid user cw from 182.61.33.137 port 36966
2019-09-21 12:51:56
200.71.155.42 attack
200.71.155.42 - - [21/Sep/2019:05:55:27 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
200.71.155.42 - - [21/Sep/2019:05:55:28 +0200] "POST /wp-login.php HTTP/1.1" 200 1524 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
200.71.155.42 - - [21/Sep/2019:05:55:28 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
200.71.155.42 - - [21/Sep/2019:05:55:29 +0200] "POST /wp-login.php HTTP/1.1" 200 1530 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
200.71.155.42 - - [21/Sep/2019:05:55:30 +0200] "GET /wp-login.php HTTP/1.1" 200 1129 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
200.71.155.42 - - [21/Sep/2019:05:55:31 +0200] "POST /wp-login.php HTTP/1.1" 200 1525 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-09-21 13:02:25
157.230.252.181 attackspambots
2019-09-21T04:57:02.866964abusebot-3.cloudsearch.cf sshd\[30403\]: Invalid user uy from 157.230.252.181 port 36712
2019-09-21 13:00:58
206.189.73.71 attackbots
Sep 21 06:52:07 www2 sshd\[48217\]: Invalid user jboss from 206.189.73.71Sep 21 06:52:09 www2 sshd\[48217\]: Failed password for invalid user jboss from 206.189.73.71 port 54760 ssh2Sep 21 06:55:44 www2 sshd\[48681\]: Invalid user julien from 206.189.73.71
...
2019-09-21 12:54:04
45.237.140.120 attackbotsspam
Invalid user fe from 45.237.140.120 port 36538
2019-09-21 13:05:38
109.102.226.187 attackspambots
109.102.226.187 - - [21/Sep/2019:05:55:25  0200] "GET / HTTP/1.1" 301 237 "-" "Mozilla/5.0 (compatible
2019-09-21 13:07:22
121.126.161.117 attackbotsspam
Sep 21 04:58:27 hcbbdb sshd\[7242\]: Invalid user snadendla from 121.126.161.117
Sep 21 04:58:27 hcbbdb sshd\[7242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.161.117
Sep 21 04:58:29 hcbbdb sshd\[7242\]: Failed password for invalid user snadendla from 121.126.161.117 port 38590 ssh2
Sep 21 05:04:17 hcbbdb sshd\[7915\]: Invalid user en from 121.126.161.117
Sep 21 05:04:17 hcbbdb sshd\[7915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.161.117
2019-09-21 13:13:08
62.234.99.172 attackspambots
*Port Scan* detected from 62.234.99.172 (CN/China/-). 4 hits in the last 210 seconds
2019-09-21 13:11:13
81.133.189.239 attack
Sep 21 00:31:35 plusreed sshd[28042]: Invalid user pos from 81.133.189.239
...
2019-09-21 12:44:34
92.222.92.114 attackspam
Sep 20 18:07:10 lcprod sshd\[2906\]: Invalid user udai from 92.222.92.114
Sep 20 18:07:10 lcprod sshd\[2906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.ip-92-222-92.eu
Sep 20 18:07:12 lcprod sshd\[2906\]: Failed password for invalid user udai from 92.222.92.114 port 37314 ssh2
Sep 20 18:11:18 lcprod sshd\[3356\]: Invalid user rainbow from 92.222.92.114
Sep 20 18:11:18 lcprod sshd\[3356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.ip-92-222-92.eu
2019-09-21 13:40:26
201.174.46.234 attackspambots
Sep 21 07:02:33 vps691689 sshd[10820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.46.234
Sep 21 07:02:35 vps691689 sshd[10820]: Failed password for invalid user jukebox from 201.174.46.234 port 59098 ssh2
Sep 21 07:06:30 vps691689 sshd[10899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.46.234
...
2019-09-21 13:09:25
40.127.70.180 attack
Sep 21 10:10:22 areeb-Workstation sshd[25236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.70.180
Sep 21 10:10:24 areeb-Workstation sshd[25236]: Failed password for invalid user elizabet from 40.127.70.180 port 55148 ssh2
...
2019-09-21 12:51:20
89.248.162.136 attack
*Port Scan* detected from 89.248.162.136 (NL/Netherlands/no-reverse-dns-configured.com). 4 hits in the last 180 seconds
2019-09-21 13:08:08
46.219.3.139 attack
Sep 20 18:42:42 tdfoods sshd\[23861\]: Invalid user info1 from 46.219.3.139
Sep 20 18:42:42 tdfoods sshd\[23861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=relay.doris-adv.com
Sep 20 18:42:44 tdfoods sshd\[23861\]: Failed password for invalid user info1 from 46.219.3.139 port 41354 ssh2
Sep 20 18:47:01 tdfoods sshd\[24256\]: Invalid user vpopmail from 46.219.3.139
Sep 20 18:47:01 tdfoods sshd\[24256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=relay.doris-adv.com
2019-09-21 12:56:18

最近上报的IP列表

161.35.22.21 129.226.183.117 94.251.95.50 114.4.79.136
91.144.170.140 130.211.2.21 41.110.32.3 195.91.16.178
199.203.100.108 194.99.26.99 171.101.99.107 198.23.237.17
45.233.127.177 118.235.41.60 103.253.27.176 152.173.118.129
190.162.103.2 197.61.250.33 66.115.166.235 170.133.4.70