必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.34.172.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16817
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.34.172.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 05:27:27 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
54.172.34.220.in-addr.arpa domain name pointer softbank220034172054.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.172.34.220.in-addr.arpa	name = softbank220034172054.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
1.36.219.169 attackbots
Sep 25 23:06:33 scw-focused-cartwright sshd[5657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.36.219.169
Sep 25 23:06:35 scw-focused-cartwright sshd[5657]: Failed password for invalid user ubnt from 1.36.219.169 port 60251 ssh2
2020-09-26 12:14:55
198.12.254.72 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-26 12:10:05
188.166.251.15 attackbots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=52253  .  dstport=445  .     (3563)
2020-09-26 12:15:59
92.118.161.57 attack
Metasploit VxWorks WDB Agent Scanner Detection , PTR: 92.118.161.57.netsystemsresearch.com.
2020-09-26 12:29:20
161.35.173.243 attack
Sep 24 16:20:32 r.ca sshd[9879]: Failed password for invalid user testsftp from 161.35.173.243 port 57542 ssh2
2020-09-26 08:09:33
1.54.133.0 attackspam
2020-02-22T01:25:14.400750suse-nuc sshd[10308]: Invalid user upload from 1.54.133.0 port 57852
...
2020-09-26 12:02:02
124.152.118.131 attackbotsspam
Sep 26 04:35:43 vps8769 sshd[1674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.152.118.131
Sep 26 04:35:45 vps8769 sshd[1674]: Failed password for invalid user vnc from 124.152.118.131 port 4912 ssh2
...
2020-09-26 12:11:41
1.254.154.42 attack
2019-11-23T15:16:26.572457suse-nuc sshd[24905]: Invalid user ubuntu from 1.254.154.42 port 24373
...
2020-09-26 12:20:27
83.103.98.211 attackbotsspam
Sep 26 05:37:19 rotator sshd\[20020\]: Invalid user prashant from 83.103.98.211Sep 26 05:37:21 rotator sshd\[20020\]: Failed password for invalid user prashant from 83.103.98.211 port 14661 ssh2Sep 26 05:41:37 rotator sshd\[20826\]: Invalid user android from 83.103.98.211Sep 26 05:41:40 rotator sshd\[20826\]: Failed password for invalid user android from 83.103.98.211 port 31732 ssh2Sep 26 05:46:05 rotator sshd\[21612\]: Invalid user user from 83.103.98.211Sep 26 05:46:07 rotator sshd\[21612\]: Failed password for invalid user user from 83.103.98.211 port 2983 ssh2
...
2020-09-26 12:18:39
116.90.165.26 attackspambots
Sep 26 05:28:19 server sshd[11688]: Failed password for invalid user git from 116.90.165.26 port 56000 ssh2
Sep 26 05:31:25 server sshd[13259]: Failed password for invalid user fivem from 116.90.165.26 port 34560 ssh2
Sep 26 05:34:40 server sshd[15028]: Failed password for invalid user hb from 116.90.165.26 port 41310 ssh2
2020-09-26 12:07:59
114.33.65.6 attack
multiple unauthorized connection attempts
2020-09-26 12:28:48
1.227.4.183 attackbots
2020-08-09T04:08:53.934881suse-nuc sshd[27325]: Invalid user pi from 1.227.4.183 port 42922
2020-08-09T04:08:54.266240suse-nuc sshd[27327]: Invalid user pi from 1.227.4.183 port 42928
...
2020-09-26 12:30:55
161.35.91.28 attackspambots
srvr2: (mod_security) mod_security (id:920350) triggered by 161.35.91.28 (NL/-/-): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/24 22:37:37 [error] 439286#0: *449706 [client 161.35.91.28] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "160097985762.292721"] [ref "o0,15v21,15"], client: 161.35.91.28, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-09-26 08:12:55
218.56.160.82 attackbots
Sep 25 20:35:40 staging sshd[99825]: Invalid user ftp-user from 218.56.160.82 port 25180
Sep 25 20:35:42 staging sshd[99825]: Failed password for invalid user ftp-user from 218.56.160.82 port 25180 ssh2
Sep 25 20:39:51 staging sshd[99842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.160.82  user=root
Sep 25 20:39:53 staging sshd[99842]: Failed password for root from 218.56.160.82 port 11147 ssh2
...
2020-09-26 12:19:34
1.32.48.245 attackspambots
2019-12-31T10:56:08.982995suse-nuc sshd[17237]: Invalid user sweekhorst from 1.32.48.245 port 58764
...
2020-09-26 12:18:26

最近上报的IP列表

59.152.74.21 187.146.55.45 66.253.8.241 4.64.121.203
157.142.38.17 73.199.59.3 99.231.146.76 184.94.92.59
236.90.38.118 208.87.127.199 253.212.217.169 41.57.121.164
168.116.164.113 5.230.250.12 9.203.112.91 132.76.96.199
130.73.168.127 88.79.113.195 7.1.55.176 3.211.21.70