必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.64.40.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57776
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.64.40.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 23:23:02 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
54.40.64.52.in-addr.arpa domain name pointer ec2-52-64-40-54.ap-southeast-2.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.40.64.52.in-addr.arpa	name = ec2-52-64-40-54.ap-southeast-2.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.49.76.100 attackbots
Jul  4 03:54:34 ns382633 sshd\[16509\]: Invalid user ena from 58.49.76.100 port 28858
Jul  4 03:54:34 ns382633 sshd\[16509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.49.76.100
Jul  4 03:54:36 ns382633 sshd\[16509\]: Failed password for invalid user ena from 58.49.76.100 port 28858 ssh2
Jul  4 04:10:40 ns382633 sshd\[19624\]: Invalid user test from 58.49.76.100 port 44856
Jul  4 04:10:40 ns382633 sshd\[19624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.49.76.100
2020-07-04 13:18:24
192.35.168.214 attack
"Found User-Agent associated with security scanner - Matched Data: zgrab found within REQUEST_HEADERS:User-Agent: mozilla/5.0 zgrab/0.x"
2020-07-04 13:06:21
113.109.79.230 attackbots
VNC brute force attack detected by fail2ban
2020-07-04 12:53:39
94.196.92.250 attackspam
check all MAC PRODUCTS SERIAL NUMBER AND HYPHEN HACK FROM USA/UK -SAME COUNTRY WITH THE SAME HISTORY -THROW IN THEIR 123 IMMIGRANTS
2020-07-04 13:18:47
5.249.159.37 attackspam
Jul  4 02:23:16 vlre-nyc-1 sshd\[32714\]: Invalid user jiangtao from 5.249.159.37
Jul  4 02:23:16 vlre-nyc-1 sshd\[32714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.159.37
Jul  4 02:23:18 vlre-nyc-1 sshd\[32714\]: Failed password for invalid user jiangtao from 5.249.159.37 port 33116 ssh2
Jul  4 02:27:03 vlre-nyc-1 sshd\[325\]: Invalid user ljl from 5.249.159.37
Jul  4 02:27:03 vlre-nyc-1 sshd\[325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.159.37
...
2020-07-04 13:19:18
31.209.21.17 attack
Jul  4 02:14:29 amit sshd\[20723\]: Invalid user gangadhar from 31.209.21.17
Jul  4 02:14:29 amit sshd\[20723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.209.21.17
Jul  4 02:14:31 amit sshd\[20723\]: Failed password for invalid user gangadhar from 31.209.21.17 port 44372 ssh2
...
2020-07-04 12:55:35
218.92.0.133 attack
Jul  4 06:51:34 vps sshd[170504]: Failed password for root from 218.92.0.133 port 33632 ssh2
Jul  4 06:51:37 vps sshd[170504]: Failed password for root from 218.92.0.133 port 33632 ssh2
Jul  4 06:51:42 vps sshd[170504]: Failed password for root from 218.92.0.133 port 33632 ssh2
Jul  4 06:51:45 vps sshd[170504]: Failed password for root from 218.92.0.133 port 33632 ssh2
Jul  4 06:51:48 vps sshd[170504]: Failed password for root from 218.92.0.133 port 33632 ssh2
...
2020-07-04 12:52:58
200.114.236.19 attackspambots
Invalid user oracle from 200.114.236.19 port 34404
2020-07-04 13:12:17
221.207.8.251 attack
Invalid user usr from 221.207.8.251 port 43904
2020-07-04 13:14:09
222.85.17.40 attackspambots
Honeypot attack, port: 445, PTR: 40.17.85.222.broad.xc.ha.dynamic.163data.com.cn.
2020-07-04 13:02:22
107.171.233.158 attackbots
TCP Port Scanning
2020-07-04 12:43:32
144.48.112.86 attackspambots
VNC brute force attack detected by fail2ban
2020-07-04 12:36:48
95.242.7.147 attackbots
Jul  4 06:25:45 roki-contabo sshd\[23529\]: Invalid user pck from 95.242.7.147
Jul  4 06:25:45 roki-contabo sshd\[23529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.242.7.147
Jul  4 06:25:47 roki-contabo sshd\[23529\]: Failed password for invalid user pck from 95.242.7.147 port 38060 ssh2
Jul  4 06:42:59 roki-contabo sshd\[7039\]: Invalid user andres from 95.242.7.147
Jul  4 06:42:59 roki-contabo sshd\[7039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.242.7.147
...
2020-07-04 12:51:37
112.85.42.181 attackbotsspam
Jul  4 04:59:41 hcbbdb sshd\[15615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
Jul  4 04:59:43 hcbbdb sshd\[15615\]: Failed password for root from 112.85.42.181 port 8332 ssh2
Jul  4 04:59:56 hcbbdb sshd\[15615\]: Failed password for root from 112.85.42.181 port 8332 ssh2
Jul  4 05:00:00 hcbbdb sshd\[15652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
Jul  4 05:00:02 hcbbdb sshd\[15652\]: Failed password for root from 112.85.42.181 port 40261 ssh2
2020-07-04 13:10:36
120.70.100.159 attackspambots
ssh brute force
2020-07-04 13:18:03

最近上报的IP列表

30.49.209.105 43.133.1.40 133.15.106.194 84.43.26.64
171.190.147.205 97.12.27.174 96.19.189.6 213.144.222.121
143.25.70.102 52.49.210.204 225.79.243.170 84.146.184.124
186.71.181.75 98.157.165.218 223.25.120.104 157.150.129.3
223.6.150.62 202.41.72.247 251.98.196.63 70.163.87.172