必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Boardman

省份(region): Oregon

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.184.130.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.184.130.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:59:57 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
68.130.184.54.in-addr.arpa domain name pointer ec2-54-184-130-68.us-west-2.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.130.184.54.in-addr.arpa	name = ec2-54-184-130-68.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.158.150.188 attack
23/tcp
[2019-10-15]1pkt
2019-10-16 01:25:27
51.75.52.127 attack
10/15/2019-17:44:16.334565 51.75.52.127 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52
2019-10-16 02:01:55
181.197.219.53 attackspam
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=16217)(10151156)
2019-10-16 01:55:11
91.103.97.77 attackbotsspam
10/15/2019-18:22:07.867714 91.103.97.77 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-16 01:46:25
41.39.1.239 attack
[portscan] tcp/1433 [MsSQL]
in spfbl.net:'listed'
*(RWIN=1024)(10151156)
2019-10-16 01:50:41
201.242.104.20 attack
[portscan] tcp/1433 [MsSQL]
in spfbl.net:'listed'
*(RWIN=8192)(10151156)
2019-10-16 01:52:17
103.243.94.158 attackspam
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(10151156)
2019-10-16 01:46:01
61.158.219.11 attackbots
[portscan] tcp/1433 [MsSQL]
in spfbl.net:'listed'
*(RWIN=1024)(10151156)
2019-10-16 01:49:06
112.53.84.94 attackspambots
[portscan] tcp/1433 [MsSQL]
in spfbl.net:'listed'
*(RWIN=1024)(10151156)
2019-10-16 01:28:53
183.192.243.67 attack
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=48618)(10151156)
2019-10-16 01:40:46
114.225.219.151 attack
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=16615)(10151156)
2019-10-16 01:56:52
128.70.206.89 attackspambots
[portscan] tcp/1433 [MsSQL]
in spfbl.net:'listed'
*(RWIN=8192)(10151156)
2019-10-16 01:55:49
192.140.120.2 attackbots
[portscan] tcp/23 [TELNET]
in sorbs:'listed [spam]'
in spfbl.net:'listed'
*(RWIN=14600)(10151156)
2019-10-16 01:53:21
193.93.253.53 attackspambots
15.10.2019 14:25:36 - FTP-Server Bruteforce
 - Detected by FTP-Monster 
(https://www.elinox.de/FTP-Monster)
2019-10-16 01:39:38
177.81.53.40 attack
[portscan] tcp/23 [TELNET]
in spfbl.net:'listed'
*(RWIN=34851)(10151156)
2019-10-16 01:25:50

最近上报的IP列表

144.152.74.20 56.254.13.90 36.200.214.41 52.155.194.218
51.236.127.48 38.115.137.62 96.87.227.58 138.231.243.162
117.63.255.144 43.206.213.96 230.24.163.144 106.93.210.156
71.106.151.47 137.34.225.186 72.155.132.90 144.246.64.3
186.2.27.208 85.174.201.239 160.61.183.1 229.251.201.212