必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.21.254.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41203
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.21.254.38.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 06:10:52 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 38.254.21.54.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 38.254.21.54.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
107.170.37.161 attackspambots
Feb 10 07:55:25 vpn01 sshd[4043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.37.161
Feb 10 07:55:27 vpn01 sshd[4043]: Failed password for invalid user dva from 107.170.37.161 port 52492 ssh2
...
2020-02-10 17:47:53
49.234.80.94 attack
Feb 10 09:15:01 sd-53420 sshd\[6043\]: Invalid user tmy from 49.234.80.94
Feb 10 09:15:01 sd-53420 sshd\[6043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.80.94
Feb 10 09:15:04 sd-53420 sshd\[6043\]: Failed password for invalid user tmy from 49.234.80.94 port 53480 ssh2
Feb 10 09:19:09 sd-53420 sshd\[6438\]: Invalid user ogg from 49.234.80.94
Feb 10 09:19:09 sd-53420 sshd\[6438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.80.94
...
2020-02-10 17:11:26
112.85.42.238 attack
Feb 10 09:57:38 h2177944 sshd\[29103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
Feb 10 09:57:40 h2177944 sshd\[29103\]: Failed password for root from 112.85.42.238 port 33844 ssh2
Feb 10 09:57:42 h2177944 sshd\[29103\]: Failed password for root from 112.85.42.238 port 33844 ssh2
Feb 10 09:57:45 h2177944 sshd\[29103\]: Failed password for root from 112.85.42.238 port 33844 ssh2
...
2020-02-10 17:26:37
103.224.36.226 attackbotsspam
Feb 10 08:40:51 markkoudstaal sshd[467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226
Feb 10 08:40:53 markkoudstaal sshd[467]: Failed password for invalid user pmu from 103.224.36.226 port 37836 ssh2
Feb 10 08:46:58 markkoudstaal sshd[1591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226
2020-02-10 17:16:51
188.93.235.238 attack
Port 22 Scan, PTR: None
2020-02-10 17:10:50
59.36.147.219 attackbotsspam
Feb 10 04:55:25 hostnameghostname sshd[28861]: Invalid user doi from 59.36.147.219
Feb 10 04:55:27 hostnameghostname sshd[28861]: Failed password for invalid user doi from 59.36.147.219 port 45524 ssh2
Feb 10 05:00:15 hostnameghostname sshd[29670]: Invalid user rbo from 59.36.147.219
Feb 10 05:00:17 hostnameghostname sshd[29670]: Failed password for invalid user rbo from 59.36.147.219 port 57041 ssh2
Feb 10 05:01:13 hostnameghostname sshd[29844]: Invalid user mtw from 59.36.147.219
Feb 10 05:01:15 hostnameghostname sshd[29844]: Failed password for invalid user mtw from 59.36.147.219 port 59643 ssh2
Feb 10 05:02:13 hostnameghostname sshd[30012]: Invalid user ote from 59.36.147.219
Feb 10 05:02:16 hostnameghostname sshd[30012]: Failed password for invalid user ote from 59.36.147.219 port 34010 ssh2
Feb 10 05:03:11 hostnameghostname sshd[30158]: Invalid user ooe from 59.36.147.219
Feb 10 05:03:13 hostnameghostname sshd[30158]: Failed password for invalid user ooe from 59.36........
------------------------------
2020-02-10 17:16:03
193.188.22.188 attack
2020-02-10T06:55:41.830322vps773228.ovh.net sshd[2199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.188
2020-02-10T06:55:41.808151vps773228.ovh.net sshd[2199]: Invalid user admin from 193.188.22.188 port 48176
2020-02-10T06:55:43.828942vps773228.ovh.net sshd[2199]: Failed password for invalid user admin from 193.188.22.188 port 48176 ssh2
2020-02-10T09:33:37.148462vps773228.ovh.net sshd[2578]: Invalid user admin from 193.188.22.188 port 15969
2020-02-10T09:33:37.191398vps773228.ovh.net sshd[2578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.188
2020-02-10T09:33:37.148462vps773228.ovh.net sshd[2578]: Invalid user admin from 193.188.22.188 port 15969
2020-02-10T09:33:38.747093vps773228.ovh.net sshd[2578]: Failed password for invalid user admin from 193.188.22.188 port 15969 ssh2
2020-02-10T09:33:38.982568vps773228.ovh.net sshd[2580]: Invalid user admin from 193.188.22.188 port 20
...
2020-02-10 17:23:33
92.118.38.57 attackbots
2020-02-10 10:33:32 dovecot_login authenticator failed for \(User\) \[92.118.38.57\]: 535 Incorrect authentication data \(set_id=protz@no-server.de\)
2020-02-10 10:33:32 dovecot_login authenticator failed for \(User\) \[92.118.38.57\]: 535 Incorrect authentication data \(set_id=protz@no-server.de\)
2020-02-10 10:33:38 dovecot_login authenticator failed for \(User\) \[92.118.38.57\]: 535 Incorrect authentication data \(set_id=protz@no-server.de\)
2020-02-10 10:33:41 dovecot_login authenticator failed for \(User\) \[92.118.38.57\]: 535 Incorrect authentication data \(set_id=protz@no-server.de\)
2020-02-10 10:34:04 dovecot_login authenticator failed for \(User\) \[92.118.38.57\]: 535 Incorrect authentication data \(set_id=prova@no-server.de\)
2020-02-10 10:34:04 dovecot_login authenticator failed for \(User\) \[92.118.38.57\]: 535 Incorrect authentication data \(set_id=prova@no-server.de\)
...
2020-02-10 17:43:33
177.138.176.13 attackspam
1581310355 - 02/10/2020 11:52:35 Host: 177-138-176-13.dsl.telesp.net.br/177.138.176.13 Port: 23 TCP Blocked
...
2020-02-10 17:30:42
113.184.4.157 attackspam
1581310359 - 02/10/2020 05:52:39 Host: 113.184.4.157/113.184.4.157 Port: 445 TCP Blocked
2020-02-10 17:28:55
74.69.59.119 attackbots
Honeypot attack, port: 445, PTR: cpe-74-69-59-119.rochester.res.rr.com.
2020-02-10 17:31:48
51.38.140.6 attack
Scanning
2020-02-10 17:11:11
201.105.94.118 attackspambots
Port probing on unauthorized port 23
2020-02-10 17:48:14
171.224.178.219 attackspam
Feb 10 05:52:07 mout sshd[32722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.224.178.219
Feb 10 05:52:06 mout sshd[32722]: Invalid user tech from 171.224.178.219 port 59906
Feb 10 05:52:08 mout sshd[32722]: Failed password for invalid user tech from 171.224.178.219 port 59906 ssh2
2020-02-10 17:53:59
51.68.89.100 attack
2020-02-10T05:46:13.442457struts4.enskede.local sshd\[9382\]: Invalid user rvk from 51.68.89.100 port 47020
2020-02-10T05:46:13.449527struts4.enskede.local sshd\[9382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.89.100
2020-02-10T05:46:16.154580struts4.enskede.local sshd\[9382\]: Failed password for invalid user rvk from 51.68.89.100 port 47020 ssh2
2020-02-10T05:51:42.121929struts4.enskede.local sshd\[9385\]: Invalid user dvo from 51.68.89.100 port 59452
2020-02-10T05:51:42.134662struts4.enskede.local sshd\[9385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.89.100
...
2020-02-10 17:36:55

最近上报的IP列表

217.203.154.225 83.119.68.139 127.144.154.232 162.44.96.182
43.83.19.180 76.148.217.126 215.215.8.237 94.197.36.4
250.227.214.81 60.74.75.248 108.186.38.177 129.178.34.54
8.237.192.20 173.230.60.38 222.239.66.152 135.90.115.153
242.53.239.114 94.219.9.16 31.122.212.227 173.16.7.113