必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.21.15.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.21.15.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:03:07 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 138.15.21.54.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.15.21.54.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
175.146.213.230 attackspam
Unauthorised access (Aug 25) SRC=175.146.213.230 LEN=40 TTL=49 ID=42367 TCP DPT=8080 WINDOW=18263 SYN 
Unauthorised access (Aug 24) SRC=175.146.213.230 LEN=40 TTL=49 ID=31408 TCP DPT=8080 WINDOW=51672 SYN
2019-08-25 07:27:03
159.89.86.93 attack
port scan and connect, tcp 22 (ssh)
2019-08-25 06:53:12
195.154.40.170 attackbotsspam
Automatic report - Port Scan Attack
2019-08-25 07:12:29
128.106.195.126 attack
Aug 24 23:10:42 smtp sshd[5535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.106.195.126  user=root
Aug 24 23:10:44 smtp sshd[5535]: Failed password for root from 128.106.195.126 port 38095 ssh2
Aug 24 23:16:59 smtp sshd[5580]: Invalid user garys from 128.106.195.126 port 35076
Aug 24 23:16:59 smtp sshd[5580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.106.195.126
Aug 24 23:16:59 smtp sshd[5580]: Invalid user garys from 128.106.195.126 port 35076
Aug 24 23:17:01 smtp sshd[5580]: Failed password for invalid user garys from 128.106.195.126 port 35076 ssh2
...
2019-08-25 07:25:51
64.32.11.8 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-08-25 07:24:03
106.13.93.161 attack
Aug 25 01:07:45 eventyay sshd[18203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.161
Aug 25 01:07:47 eventyay sshd[18203]: Failed password for invalid user hp from 106.13.93.161 port 37352 ssh2
Aug 25 01:10:38 eventyay sshd[18277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.161
...
2019-08-25 07:11:19
216.245.217.2 attack
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-08-25 07:08:32
198.108.67.97 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-08-25 06:47:30
165.22.123.146 attack
SSH bruteforce (Triggered fail2ban)
2019-08-25 06:45:05
188.214.255.241 attackbotsspam
F2B jail: sshd. Time: 2019-08-25 00:55:53, Reported by: VKReport
2019-08-25 07:03:13
153.36.236.35 attackspam
Aug 24 17:37:45 aat-srv002 sshd[30769]: Failed password for root from 153.36.236.35 port 10364 ssh2
Aug 24 17:37:53 aat-srv002 sshd[30776]: Failed password for root from 153.36.236.35 port 35603 ssh2
Aug 24 17:38:01 aat-srv002 sshd[30780]: Failed password for root from 153.36.236.35 port 61597 ssh2
...
2019-08-25 06:48:08
141.98.81.132 attack
24.08.2019 23:46:14 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-08-25 07:14:21
189.238.101.173 attackbotsspam
Invalid user wms from 189.238.101.173 port 60980
2019-08-25 07:10:36
45.170.73.52 attackspambots
Aug 24 17:36:01 aat-srv002 sshd[30732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.170.73.52
Aug 24 17:36:04 aat-srv002 sshd[30732]: Failed password for invalid user erver from 45.170.73.52 port 42862 ssh2
Aug 24 17:45:49 aat-srv002 sshd[31104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.170.73.52
Aug 24 17:45:51 aat-srv002 sshd[31104]: Failed password for invalid user cam from 45.170.73.52 port 38105 ssh2
...
2019-08-25 06:51:28
110.52.145.241 attackbotsspam
Fail2Ban - FTP Abuse Attempt
2019-08-25 07:14:52

最近上报的IP列表

56.64.48.232 201.109.185.64 228.115.156.79 22.21.123.108
241.12.76.142 246.246.179.46 191.110.51.8 144.86.223.49
225.49.171.52 66.161.100.63 230.9.203.83 77.112.148.34
237.223.218.136 6.16.190.241 122.5.156.146 207.245.152.165
170.52.13.238 251.49.57.110 247.178.251.110 242.173.211.118