必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.134.104.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9231
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.134.104.169.			IN	A

;; AUTHORITY SECTION:
.			96	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112401 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 25 05:33:44 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 169.104.134.54.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.104.134.54.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.88.112.90 attack
Sep 27 17:28:49 localhost sshd\[29824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.90  user=root
Sep 27 17:28:52 localhost sshd\[29824\]: Failed password for root from 49.88.112.90 port 17450 ssh2
Sep 27 17:28:54 localhost sshd\[29824\]: Failed password for root from 49.88.112.90 port 17450 ssh2
2019-09-27 23:29:54
177.206.87.206 attack
Sep 27 09:03:36 aat-srv002 sshd[18144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.206.87.206
Sep 27 09:03:39 aat-srv002 sshd[18144]: Failed password for invalid user P@ssw9rd from 177.206.87.206 port 59036 ssh2
Sep 27 09:09:21 aat-srv002 sshd[18318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.206.87.206
Sep 27 09:09:22 aat-srv002 sshd[18318]: Failed password for invalid user virus from 177.206.87.206 port 43302 ssh2
...
2019-09-27 23:37:29
213.136.79.178 attackbotsspam
2019-09-27T15:21:51.933428abusebot-6.cloudsearch.cf sshd\[24948\]: Invalid user snacke from 213.136.79.178 port 35950
2019-09-27 23:35:12
148.70.210.77 attackspambots
Sep 27 15:14:45 v22019058497090703 sshd[4526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.210.77
Sep 27 15:14:47 v22019058497090703 sshd[4526]: Failed password for invalid user ako from 148.70.210.77 port 44857 ssh2
Sep 27 15:21:50 v22019058497090703 sshd[5086]: Failed password for man from 148.70.210.77 port 36827 ssh2
...
2019-09-28 00:03:38
183.111.125.172 attackspambots
Sep 27 14:44:02 game-panel sshd[11654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.125.172
Sep 27 14:44:04 game-panel sshd[11654]: Failed password for invalid user burner from 183.111.125.172 port 51184 ssh2
Sep 27 14:50:39 game-panel sshd[11892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.125.172
2019-09-27 23:56:47
37.59.38.137 attack
Sep 27 05:24:15 wbs sshd\[9568\]: Invalid user odroid from 37.59.38.137
Sep 27 05:24:15 wbs sshd\[9568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ks399973.kimsufi.com
Sep 27 05:24:17 wbs sshd\[9568\]: Failed password for invalid user odroid from 37.59.38.137 port 48317 ssh2
Sep 27 05:28:46 wbs sshd\[9933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ks399973.kimsufi.com  user=root
Sep 27 05:28:48 wbs sshd\[9933\]: Failed password for root from 37.59.38.137 port 40381 ssh2
2019-09-27 23:36:13
106.13.6.116 attack
Sep 27 05:49:03 auw2 sshd\[27688\]: Invalid user user from 106.13.6.116
Sep 27 05:49:03 auw2 sshd\[27688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
Sep 27 05:49:05 auw2 sshd\[27688\]: Failed password for invalid user user from 106.13.6.116 port 49358 ssh2
Sep 27 05:57:22 auw2 sshd\[28425\]: Invalid user smmsp from 106.13.6.116
Sep 27 05:57:22 auw2 sshd\[28425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
2019-09-27 23:59:31
14.162.183.197 attackbotsspam
Sep 23 13:54:23 zn006 sshd[11816]: Address 14.162.183.197 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 23 13:54:23 zn006 sshd[11816]: Invalid user alex from 14.162.183.197
Sep 23 13:54:23 zn006 sshd[11816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.162.183.197 
Sep 23 13:54:25 zn006 sshd[11816]: Failed password for invalid user alex from 14.162.183.197 port 47392 ssh2
Sep 23 13:54:25 zn006 sshd[11816]: Received disconnect from 14.162.183.197: 11: Bye Bye [preauth]
Sep 23 14:15:38 zn006 sshd[14074]: Address 14.162.183.197 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 23 14:15:38 zn006 sshd[14074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.162.183.197  user=proxy
Sep 23 14:15:39 zn006 sshd[14074]: Failed password for proxy from 14.162.183.197 port 57862 ssh2
Sep 23 14:15........
-------------------------------
2019-09-27 23:50:57
35.231.18.158 attackbotsspam
Sep 27 17:15:21 MK-Soft-Root2 sshd[32231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.18.158 
Sep 27 17:15:23 MK-Soft-Root2 sshd[32231]: Failed password for invalid user superpipes from 35.231.18.158 port 39128 ssh2
...
2019-09-27 23:39:11
83.97.20.176 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-27 23:42:37
77.247.110.8 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-09-27 23:50:02
128.199.173.127 attackspambots
frenzy
2019-09-27 23:32:06
64.187.238.218 attack
Automatic report - Banned IP Access
2019-09-27 23:38:35
61.190.99.62 attack
(mod_security) mod_security (id:230011) triggered by 61.190.99.62 (CN/China/-): 5 in the last 3600 secs
2019-09-28 00:00:29
218.188.210.214 attackbotsspam
2019-09-27T13:48:53.759398abusebot-8.cloudsearch.cf sshd\[8673\]: Invalid user incoming from 218.188.210.214 port 50694
2019-09-27 23:34:53

最近上报的IP列表

61.223.182.122 47.86.16.206 48.15.96.61 47.129.177.4
17.168.114.200 177.6.253.121 41.130.117.229 42.120.189.207
57.124.161.20 40.34.28.77 4.248.194.62 178.153.200.222
37.233.190.47 74.44.114.142 1.57.238.207 172.35.34.68
116.98.213.80 197.54.244.178 189.164.64.44 105.44.231.41