必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.53.12.181
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52884
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;254.53.12.181.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 17:31:07 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 181.12.53.254.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 181.12.53.254.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
95.160.17.142 attackspambots
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-14 01:05:12
43.229.225.28 attack
Unauthorized connection attempt from IP address 43.229.225.28 on Port 445(SMB)
2019-09-14 01:13:34
2600:3c03::f03c:91ff:fe59:f51 attackspambots
This IP address was blacklisted for the following reason:  /de/jobs/ @ 2019-09-13T08:36:53+02:00.
2019-09-14 01:14:17
110.182.83.155 attackspam
" "
2019-09-14 01:22:59
101.231.104.82 attack
Sep 13 18:03:51 vps691689 sshd[16606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.104.82
Sep 13 18:03:53 vps691689 sshd[16606]: Failed password for invalid user 123 from 101.231.104.82 port 37140 ssh2
...
2019-09-14 01:04:35
91.239.190.250 attackspam
Sep 13 12:55:43 server6 sshd[16152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.239.190.250  user=r.r
Sep 13 12:55:45 server6 sshd[16152]: Failed password for r.r from 91.239.190.250 port 58643 ssh2
Sep 13 12:55:47 server6 sshd[16152]: Failed password for r.r from 91.239.190.250 port 58643 ssh2
Sep 13 12:55:49 server6 sshd[16152]: Failed password for r.r from 91.239.190.250 port 58643 ssh2
Sep 13 12:55:51 server6 sshd[16152]: Failed password for r.r from 91.239.190.250 port 58643 ssh2
Sep 13 12:55:54 server6 sshd[16152]: Failed password for r.r from 91.239.190.250 port 58643 ssh2
Sep 13 12:55:55 server6 sshd[16152]: Failed password for r.r from 91.239.190.250 port 58643 ssh2
Sep 13 12:55:55 server6 sshd[16152]: Disconnecting: Too many authentication failures for r.r from 91.239.190.250 port 58643 ssh2 [preauth]
Sep 13 12:55:55 server6 sshd[16152]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rho........
-------------------------------
2019-09-14 01:19:46
180.111.75.253 attack
Sep 13 13:00:14 h2022099 sshd[32249]: Invalid user admin from 180.111.75.253
Sep 13 13:00:14 h2022099 sshd[32249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.111.75.253 
Sep 13 13:00:16 h2022099 sshd[32249]: Failed password for invalid user admin from 180.111.75.253 port 38800 ssh2
Sep 13 13:00:19 h2022099 sshd[32249]: Failed password for invalid user admin from 180.111.75.253 port 38800 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.111.75.253
2019-09-14 01:27:04
177.21.15.122 attack
WordPress login Brute force / Web App Attack on client site.
2019-09-14 01:55:01
62.231.168.109 attackspambots
2019-09-13T17:01:19.541858abusebot-7.cloudsearch.cf sshd\[29164\]: Invalid user bot2 from 62.231.168.109 port 39500
2019-09-14 01:11:40
85.144.226.170 attack
Sep 13 06:58:37 auw2 sshd\[25960\]: Invalid user jenkins from 85.144.226.170
Sep 13 06:58:37 auw2 sshd\[25960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170-226-144-85.ftth.glasoperator.nl
Sep 13 06:58:39 auw2 sshd\[25960\]: Failed password for invalid user jenkins from 85.144.226.170 port 43716 ssh2
Sep 13 07:03:28 auw2 sshd\[26386\]: Invalid user nagios from 85.144.226.170
Sep 13 07:03:28 auw2 sshd\[26386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170-226-144-85.ftth.glasoperator.nl
2019-09-14 01:08:27
95.46.181.21 attackbotsspam
Sep 13 12:55:57 mxgate1 postfix/postscreen[16125]: CONNECT from [95.46.181.21]:58046 to [176.31.12.44]:25
Sep 13 12:55:57 mxgate1 postfix/dnsblog[16129]: addr 95.46.181.21 listed by domain cbl.abuseat.org as 127.0.0.2
Sep 13 12:55:57 mxgate1 postfix/dnsblog[16128]: addr 95.46.181.21 listed by domain bl.spamcop.net as 127.0.0.2
Sep 13 12:55:58 mxgate1 postfix/postscreen[16125]: PREGREET 20 after 0.69 from [95.46.181.21]:58046: HELO agdysmsgu.com

Sep 13 12:55:58 mxgate1 postfix/dnsblog[16130]: addr 95.46.181.21 listed by domain zen.spamhaus.org as 127.0.0.4
Sep 13 12:55:58 mxgate1 postfix/dnsblog[16130]: addr 95.46.181.21 listed by domain zen.spamhaus.org as 127.0.0.3
Sep 13 12:55:58 mxgate1 postfix/postscreen[16125]: DNSBL rank 4 for [95.46.181.21]:58046
Sep x@x
Sep 13 12:56:00 mxgate1 postfix/postscreen[16125]: HANGUP after 2.1 from [95.46.181.21]:58046 in tests after SMTP handshake
Sep 13 12:56:00 mxgate1 postfix/postscreen[16125]: DISCONNECT [95.46.181.21]:58046


........
---------------------------------
2019-09-14 01:49:16
180.124.21.250 attackbots
Sep 13 14:14:56 elektron postfix/smtpd\[20244\]: NOQUEUE: reject: RCPT from unknown\[180.124.21.250\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[180.124.21.250\]\; from=\ to=\ proto=ESMTP helo=\
Sep 13 14:15:11 elektron postfix/smtpd\[20010\]: NOQUEUE: reject: RCPT from unknown\[180.124.21.250\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[180.124.21.250\]\; from=\ to=\ proto=ESMTP helo=\
Sep 13 14:16:02 elektron postfix/smtpd\[20010\]: NOQUEUE: reject: RCPT from unknown\[180.124.21.250\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[180.124.21.250\]\; from=\ to=\ proto=ESMTP helo=\
2019-09-14 00:55:44
13.229.113.84 attackspam
scan r
2019-09-14 01:16:01
115.159.216.187 attack
Sep 13 16:10:01 markkoudstaal sshd[28098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.216.187
Sep 13 16:10:03 markkoudstaal sshd[28098]: Failed password for invalid user 1234 from 115.159.216.187 port 58524 ssh2
Sep 13 16:16:09 markkoudstaal sshd[28800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.216.187
2019-09-14 01:44:55
185.211.245.198 attackbotsspam
Sep 13 19:19:00 relay postfix/smtpd\[3296\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 19:19:08 relay postfix/smtpd\[1205\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 19:21:25 relay postfix/smtpd\[3296\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 19:21:34 relay postfix/smtpd\[10033\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 13 19:22:22 relay postfix/smtpd\[3287\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-14 01:25:01

最近上报的IP列表

108.128.33.116 36.176.152.105 46.38.197.99 84.56.32.149
42.102.243.203 61.132.84.179 93.91.8.92 68.48.205.122
145.240.69.173 32.10.248.90 86.167.198.232 31.188.69.31
25.145.0.7 12.164.43.134 73.176.61.6 93.189.107.38
119.245.147.64 230.223.205.99 156.243.107.235 224.101.199.59