必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.21.29.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.21.29.145.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 18:30:36 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 145.29.21.54.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.29.21.54.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.123.148.211 attackbots
Invalid user flavio from 121.123.148.211 port 37416
2020-07-28 18:12:37
193.112.74.169 attack
Invalid user manoj from 193.112.74.169 port 33648
2020-07-28 18:16:04
80.82.77.240 attackbotsspam
 TCP (SYN) 80.82.77.240:64344 -> port 5901, len 44
2020-07-28 18:40:01
111.229.50.25 attackspambots
Jul 28 06:24:16 scw-tender-jepsen sshd[29438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.50.25
Jul 28 06:24:18 scw-tender-jepsen sshd[29438]: Failed password for invalid user ling from 111.229.50.25 port 39610 ssh2
2020-07-28 18:37:52
165.22.43.225 attack
Invalid user sdt from 165.22.43.225 port 42836
2020-07-28 18:26:45
27.64.49.122 attackbots
Automatic report - Port Scan Attack
2020-07-28 18:21:48
51.210.107.217 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-28T09:52:10Z and 2020-07-28T10:07:42Z
2020-07-28 18:24:32
2400:1a00:b1a1::b:76da attackspam
xmlrpc attack
2020-07-28 18:12:12
200.71.73.222 attack
Dovecot Invalid User Login Attempt.
2020-07-28 18:09:24
218.92.0.220 attack
Jul 28 12:15:42 vps sshd[1008265]: Failed password for root from 218.92.0.220 port 26662 ssh2
Jul 28 12:15:44 vps sshd[1008265]: Failed password for root from 218.92.0.220 port 26662 ssh2
Jul 28 12:15:46 vps sshd[1008891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220  user=root
Jul 28 12:15:48 vps sshd[1008891]: Failed password for root from 218.92.0.220 port 48375 ssh2
Jul 28 12:15:50 vps sshd[1008891]: Failed password for root from 218.92.0.220 port 48375 ssh2
...
2020-07-28 18:25:15
91.98.28.81 attack
xmlrpc attack
2020-07-28 18:38:23
62.234.59.145 attackspambots
B: Abusive ssh attack
2020-07-28 18:13:36
151.69.206.10 attack
Jul 28 10:40:43 ajax sshd[3370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.69.206.10 
Jul 28 10:40:44 ajax sshd[3370]: Failed password for invalid user lijz from 151.69.206.10 port 37334 ssh2
2020-07-28 18:14:48
124.219.108.3 attackspam
Invalid user test from 124.219.108.3 port 49398
2020-07-28 18:44:41
122.115.57.174 attackspambots
Jul 28 11:52:25 sip sshd[20812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.115.57.174
Jul 28 11:52:27 sip sshd[20812]: Failed password for invalid user huwenp from 122.115.57.174 port 65058 ssh2
Jul 28 12:06:53 sip sshd[26269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.115.57.174
2020-07-28 18:46:47

最近上报的IP列表

54.84.92.232 217.44.29.105 224.125.99.57 92.32.229.140
131.202.151.74 23.109.164.165 94.234.206.130 86.95.181.40
241.212.236.112 80.178.224.57 163.201.13.32 132.173.0.138
30.93.146.40 34.144.113.4 255.75.194.8 14.201.122.30
187.108.165.10 124.132.119.187 66.94.64.42 171.236.26.86