必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.128.91.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22577
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.128.91.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 12:12:48 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 139.91.128.54.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.91.128.54.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
211.24.103.163 attackbotsspam
Oct 10 22:06:30 ns341937 sshd[23210]: Failed password for root from 211.24.103.163 port 33026 ssh2
Oct 10 22:24:50 ns341937 sshd[27508]: Failed password for root from 211.24.103.163 port 36470 ssh2
...
2019-10-11 05:53:44
222.186.173.201 attackbots
[ssh] SSH attack
2019-10-11 06:17:52
183.82.100.141 attackbotsspam
2019-10-10T21:59:34.442801abusebot-5.cloudsearch.cf sshd\[2410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.100.141  user=root
2019-10-11 06:16:34
80.211.80.154 attackspambots
Oct  8 08:05:49 h2022099 sshd[1466]: reveeclipse mapping checking getaddrinfo for host154-80-211-80.serverdedicati.aruba.hostname [80.211.80.154] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct  8 08:05:49 h2022099 sshd[1466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.80.154  user=r.r
Oct  8 08:05:51 h2022099 sshd[1466]: Failed password for r.r from 80.211.80.154 port 33248 ssh2
Oct  8 08:05:51 h2022099 sshd[1466]: Received disconnect from 80.211.80.154: 11: Bye Bye [preauth]
Oct  8 08:22:09 h2022099 sshd[4003]: reveeclipse mapping checking getaddrinfo for host154-80-211-80.serverdedicati.aruba.hostname [80.211.80.154] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct  8 08:22:09 h2022099 sshd[4003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.80.154  user=r.r
Oct  8 08:22:11 h2022099 sshd[4003]: Failed password for r.r from 80.211.80.154 port 57696 ssh2
Oct  8 08:22:11 h2022099 sshd[4........
-------------------------------
2019-10-11 05:50:23
222.68.173.10 attackbots
Oct 10 11:39:41 hpm sshd\[14861\]: Invalid user admin from 222.68.173.10
Oct 10 11:39:41 hpm sshd\[14861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.68.173.10
Oct 10 11:39:43 hpm sshd\[14861\]: Failed password for invalid user admin from 222.68.173.10 port 39182 ssh2
Oct 10 11:43:40 hpm sshd\[15225\]: Invalid user user from 222.68.173.10
Oct 10 11:43:40 hpm sshd\[15225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.68.173.10
2019-10-11 05:44:51
209.17.97.50 attackspambots
Automatic report - Banned IP Access
2019-10-11 06:06:25
198.199.84.154 attackbots
Oct 10 23:16:01 eventyay sshd[28154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154
Oct 10 23:16:03 eventyay sshd[28154]: Failed password for invalid user Qwert@1234 from 198.199.84.154 port 47093 ssh2
Oct 10 23:20:03 eventyay sshd[28231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154
...
2019-10-11 05:58:32
167.71.107.112 attackspam
Oct 10 11:38:44 hpm sshd\[14645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.107.112  user=root
Oct 10 11:38:46 hpm sshd\[14645\]: Failed password for root from 167.71.107.112 port 35968 ssh2
Oct 10 11:42:28 hpm sshd\[15064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.107.112  user=root
Oct 10 11:42:29 hpm sshd\[15064\]: Failed password for root from 167.71.107.112 port 47794 ssh2
Oct 10 11:46:02 hpm sshd\[15418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.107.112  user=root
2019-10-11 05:59:29
73.59.165.164 attack
2019-10-10T21:47:18.819298abusebot-7.cloudsearch.cf sshd\[984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-59-165-164.hsd1.tn.comcast.net  user=root
2019-10-11 05:56:00
120.236.209.252 attackbotsspam
Oct 10 21:10:05 rama sshd[274984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.236.209.252  user=r.r
Oct 10 21:10:07 rama sshd[274984]: Failed password for r.r from 120.236.209.252 port 52938 ssh2
Oct 10 21:10:07 rama sshd[274984]: Received disconnect from 120.236.209.252: 11: Bye Bye [preauth]
Oct 10 21:20:24 rama sshd[279801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.236.209.252  user=r.r
Oct 10 21:20:26 rama sshd[279801]: Failed password for r.r from 120.236.209.252 port 57136 ssh2
Oct 10 21:20:27 rama sshd[279801]: Received disconnect from 120.236.209.252: 11: Bye Bye [preauth]
Oct 10 21:25:50 rama sshd[281865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.236.209.252  user=r.r
Oct 10 21:25:52 rama sshd[281865]: Failed password for r.r from 120.236.209.252 port 47894 ssh2
Oct 10 21:25:52 rama sshd[281865]: Received disconn........
-------------------------------
2019-10-11 06:11:36
81.218.199.121 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/81.218.199.121/ 
 IL - 1H : (16)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IL 
 NAME ASN : ASN8551 
 
 IP : 81.218.199.121 
 
 CIDR : 81.218.192.0/20 
 
 PREFIX COUNT : 3249 
 
 UNIQUE IP COUNT : 1550848 
 
 
 WYKRYTE ATAKI Z ASN8551 :  
  1H - 1 
  3H - 2 
  6H - 3 
 12H - 3 
 24H - 7 
 
 DateTime : 2019-10-10 22:09:28 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-11 05:43:06
106.12.68.235 attackbots
ssh failed login
2019-10-11 05:44:00
151.70.180.73 attackspam
" "
2019-10-11 06:04:12
222.180.162.8 attackspambots
Oct 10 23:58:47 s64-1 sshd[23543]: Failed password for root from 222.180.162.8 port 52191 ssh2
Oct 11 00:02:15 s64-1 sshd[23576]: Failed password for root from 222.180.162.8 port 50338 ssh2
...
2019-10-11 06:10:09
216.244.66.240 attackspam
[Thu Oct 10 22:01:15.501690 2019] [authz_core:error] [pid 12702] [client 216.244.66.240:56634] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/archive/libsord-devel-0.16.0-15.rncbc.suse.x86_64.rpm
[Thu Oct 10 22:14:10.811828 2019] [authz_core:error] [pid 14269] [client 216.244.66.240:58189] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/robots.txt
[Thu Oct 10 22:14:10.827576 2019] [authz_core:error] [pid 15556] [client 216.244.66.240:58201] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/robots.txt
...
2019-10-11 05:41:27

最近上报的IP列表

163.102.173.52 44.165.141.73 4.56.207.135 34.179.246.148
41.55.236.203 4.108.110.59 29.229.91.41 36.221.196.218
44.141.180.122 7.24.72.189 17.20.14.2 28.243.20.240
96.215.122.215 42.209.203.120 97.1.75.244 28.217.159.240
25.15.111.16 39.183.227.7 23.210.93.99 30.56.90.171