必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ashburn

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.208.189.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.208.189.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120701 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 08:47:09 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
41.189.208.54.in-addr.arpa domain name pointer ec2-54-208-189-41.compute-1.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.189.208.54.in-addr.arpa	name = ec2-54-208-189-41.compute-1.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.163.134.39 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/31.163.134.39/ 
 RU - 1H : (171)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 31.163.134.39 
 
 CIDR : 31.163.128.0/18 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 WYKRYTE ATAKI Z ASN12389 :  
  1H - 4 
  3H - 11 
  6H - 24 
 12H - 32 
 24H - 63 
 
 DateTime : 2019-10-08 13:47:30 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-09 03:11:01
113.181.129.238 attackbots
Chat Spam
2019-10-09 03:17:31
191.193.200.125 attack
Unauthorised access (Oct  8) SRC=191.193.200.125 LEN=40 TOS=0x10 PREC=0x40 TTL=238 ID=47990 DF TCP DPT=23 WINDOW=14600 SYN
2019-10-09 03:35:42
210.245.83.158 attackbots
" "
2019-10-09 03:13:17
218.98.40.154 attackbotsspam
Sep 11 22:05:28 dallas01 sshd[722]: Failed password for root from 218.98.40.154 port 13507 ssh2
Sep 11 22:05:30 dallas01 sshd[722]: Failed password for root from 218.98.40.154 port 13507 ssh2
Sep 11 22:05:32 dallas01 sshd[722]: Failed password for root from 218.98.40.154 port 13507 ssh2
Sep 11 22:05:36 dallas01 sshd[739]: Failed password for root from 218.98.40.154 port 27153 ssh2
2019-10-09 03:14:17
104.248.170.45 attackbotsspam
Oct  8 17:21:14 game-panel sshd[8680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.170.45
Oct  8 17:21:17 game-panel sshd[8680]: Failed password for invalid user P@ssword01 from 104.248.170.45 port 44002 ssh2
Oct  8 17:25:22 game-panel sshd[8802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.170.45
2019-10-09 03:20:07
103.89.88.64 attack
Oct  8 20:07:53 blackbee postfix/smtpd\[11852\]: warning: unknown\[103.89.88.64\]: SASL LOGIN authentication failed: authentication failure
Oct  8 20:07:56 blackbee postfix/smtpd\[11852\]: warning: unknown\[103.89.88.64\]: SASL LOGIN authentication failed: authentication failure
Oct  8 20:07:59 blackbee postfix/smtpd\[11852\]: warning: unknown\[103.89.88.64\]: SASL LOGIN authentication failed: authentication failure
Oct  8 20:08:01 blackbee postfix/smtpd\[11852\]: warning: unknown\[103.89.88.64\]: SASL LOGIN authentication failed: authentication failure
Oct  8 20:08:04 blackbee postfix/smtpd\[11852\]: warning: unknown\[103.89.88.64\]: SASL LOGIN authentication failed: authentication failure
...
2019-10-09 03:09:00
79.19.193.247 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/79.19.193.247/ 
 IT - 1H : (68)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IT 
 NAME ASN : ASN3269 
 
 IP : 79.19.193.247 
 
 CIDR : 79.18.0.0/15 
 
 PREFIX COUNT : 550 
 
 UNIQUE IP COUNT : 19507712 
 
 
 WYKRYTE ATAKI Z ASN3269 :  
  1H - 3 
  3H - 5 
  6H - 11 
 12H - 23 
 24H - 40 
 
 DateTime : 2019-10-08 13:46:55 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-09 03:26:25
218.98.40.148 attackbotsspam
Sep 11 21:34:54 dallas01 sshd[28245]: Failed password for root from 218.98.40.148 port 47956 ssh2
Sep 11 21:34:56 dallas01 sshd[28245]: Failed password for root from 218.98.40.148 port 47956 ssh2
Sep 11 21:34:58 dallas01 sshd[28245]: Failed password for root from 218.98.40.148 port 47956 ssh2
2019-10-09 03:39:17
85.105.156.98 attack
Automatic report - Port Scan Attack
2019-10-09 03:16:33
92.119.160.6 attackspambots
10/08/2019-15:05:01.362837 92.119.160.6 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-09 03:18:15
72.79.25.123 attackbots
Default IP, Non-Browser, Bad UA (none),  Port Scan & Connects
2019-10-07 21:08:05 72.79.25.123 HTTP/1.1 GET /
2019-10-09 03:13:32
176.120.59.145 attack
...
2019-10-09 03:12:29
199.195.252.213 attack
Oct  8 19:25:56 vps01 sshd[14989]: Failed password for root from 199.195.252.213 port 51516 ssh2
2019-10-09 03:31:27
185.22.174.162 attackbots
Oct  8 00:35:24 new sshd[13344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.22.174.162  user=r.r
Oct  8 00:35:26 new sshd[13344]: Failed password for r.r from 185.22.174.162 port 45264 ssh2
Oct  8 00:35:26 new sshd[13344]: Received disconnect from 185.22.174.162: 11: Bye Bye [preauth]
Oct  8 00:47:28 new sshd[16398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.22.174.162  user=r.r
Oct  8 00:47:30 new sshd[16398]: Failed password for r.r from 185.22.174.162 port 54686 ssh2
Oct  8 00:47:30 new sshd[16398]: Received disconnect from 185.22.174.162: 11: Bye Bye [preauth]
Oct  8 00:51:40 new sshd[17684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.22.174.162  user=r.r
Oct  8 00:51:42 new sshd[17684]: Failed password for r.r from 185.22.174.162 port 39338 ssh2
Oct  8 00:51:42 new sshd[17684]: Received disconnect from 185.22.174.162: 1........
-------------------------------
2019-10-09 03:38:25

最近上报的IP列表

22.182.229.224 135.115.76.156 145.119.93.99 227.33.180.86
187.198.152.18 93.221.204.69 44.230.222.238 238.179.63.65
248.180.124.149 43.117.82.143 128.5.124.185 62.182.117.4
141.91.227.157 62.97.124.95 157.50.124.77 74.215.206.11
251.188.232.250 125.185.29.80 132.209.93.185 7.78.45.36