必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.114.105.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63027
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.114.105.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 00:03:53 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 70.105.114.54.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.105.114.54.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.22.45.95 attack
2019-12-04T20:28:17.116886+01:00 lumpi kernel: [777652.077410] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.95 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=40484 PROTO=TCP SPT=41205 DPT=3346 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-05 03:33:42
58.87.124.196 attackspam
Dec  4 14:46:33 TORMINT sshd\[24540\]: Invalid user tubasa from 58.87.124.196
Dec  4 14:46:33 TORMINT sshd\[24540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.124.196
Dec  4 14:46:35 TORMINT sshd\[24540\]: Failed password for invalid user tubasa from 58.87.124.196 port 52696 ssh2
...
2019-12-05 03:50:58
81.45.56.199 attack
Dec  4 19:22:03 localhost sshd\[70630\]: Invalid user choong from 81.45.56.199 port 42414
Dec  4 19:22:03 localhost sshd\[70630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.45.56.199
Dec  4 19:22:05 localhost sshd\[70630\]: Failed password for invalid user choong from 81.45.56.199 port 42414 ssh2
Dec  4 19:28:06 localhost sshd\[70798\]: Invalid user 123456 from 81.45.56.199 port 52952
Dec  4 19:28:06 localhost sshd\[70798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.45.56.199
...
2019-12-05 03:46:29
218.92.0.160 attackbots
Dec  5 00:55:59 gw1 sshd[21374]: Failed password for root from 218.92.0.160 port 31517 ssh2
Dec  5 00:56:02 gw1 sshd[21374]: Failed password for root from 218.92.0.160 port 31517 ssh2
...
2019-12-05 03:57:12
187.72.118.191 attackspam
Failed password for root from 187.72.118.191 port 35880 ssh2
2019-12-05 03:18:05
179.178.18.24 attackspam
Unauthorised access (Dec  4) SRC=179.178.18.24 LEN=52 TOS=0x10 PREC=0x40 TTL=110 ID=22708 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-05 03:43:17
81.153.205.47 attackbots
Automatic report - Port Scan Attack
2019-12-05 03:40:15
165.227.157.168 attackspambots
Dec  4 09:38:20 tdfoods sshd\[30392\]: Invalid user aminudin from 165.227.157.168
Dec  4 09:38:20 tdfoods sshd\[30392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168
Dec  4 09:38:21 tdfoods sshd\[30392\]: Failed password for invalid user aminudin from 165.227.157.168 port 41292 ssh2
Dec  4 09:43:47 tdfoods sshd\[31034\]: Invalid user mylinux from 165.227.157.168
Dec  4 09:43:47 tdfoods sshd\[31034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.157.168
2019-12-05 03:55:03
188.6.161.77 attackbots
2019-12-04T19:28:18.901163abusebot-2.cloudsearch.cf sshd\[19915\]: Invalid user mcouat from 188.6.161.77 port 50953
2019-12-05 03:31:46
222.186.180.223 attackbotsspam
2019-12-04T20:49:48.430640vps751288.ovh.net sshd\[30030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
2019-12-04T20:49:50.375732vps751288.ovh.net sshd\[30030\]: Failed password for root from 222.186.180.223 port 3456 ssh2
2019-12-04T20:49:53.938275vps751288.ovh.net sshd\[30030\]: Failed password for root from 222.186.180.223 port 3456 ssh2
2019-12-04T20:49:56.718214vps751288.ovh.net sshd\[30030\]: Failed password for root from 222.186.180.223 port 3456 ssh2
2019-12-04T20:49:59.774262vps751288.ovh.net sshd\[30030\]: Failed password for root from 222.186.180.223 port 3456 ssh2
2019-12-05 03:51:57
1.53.137.12 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps or Hacking.
2019-12-05 03:15:50
151.80.144.39 attackspambots
Dec  4 20:04:39 mail sshd\[24072\]: Invalid user ploeger from 151.80.144.39
Dec  4 20:04:39 mail sshd\[24072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.39
Dec  4 20:04:41 mail sshd\[24072\]: Failed password for invalid user ploeger from 151.80.144.39 port 34384 ssh2
...
2019-12-05 03:27:44
81.16.123.123 attackspam
proto=tcp  .  spt=48184  .  dpt=25  .     (Listed on    truncate-gbudb also unsubscore and rbldns-ru)     (321)
2019-12-05 03:17:21
62.152.4.151 attackspam
Automatic report - Port Scan Attack
2019-12-05 03:38:21
63.81.87.195 attackspam
2019-12-04T20:28:02.848825stark.klein-stark.info postfix/smtpd\[5635\]: NOQUEUE: reject: RCPT from urea.jcnovel.com\[63.81.87.195\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
2019-12-04T20:45:40.241129stark.klein-stark.info postfix/smtpd\[6608\]: NOQUEUE: reject: RCPT from urea.jcnovel.com\[63.81.87.195\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-05 03:47:31

最近上报的IP列表

81.30.142.25 147.37.216.149 193.155.225.244 39.94.93.116
82.3.201.81 92.27.152.66 230.191.25.130 164.158.143.208
190.239.185.47 52.223.151.17 5.54.233.111 22.52.3.194
49.46.193.47 226.209.43.152 53.179.125.86 66.80.207.100
81.251.210.21 15.252.235.116 159.248.152.170 213.106.189.150