必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.255.214.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.255.214.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 15 00:26:00 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
116.214.255.54.in-addr.arpa domain name pointer ec2-54-255-214-116.ap-southeast-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.214.255.54.in-addr.arpa	name = ec2-54-255-214-116.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.70.149.83 attackspam
Oct  6 16:02:59 galaxy event: galaxy/lswi: smtp: cellular@uni-potsdam.de [212.70.149.83] authentication failure using internet password
Oct  6 16:03:25 galaxy event: galaxy/lswi: smtp: xiao@uni-potsdam.de [212.70.149.83] authentication failure using internet password
Oct  6 16:03:51 galaxy event: galaxy/lswi: smtp: dist@uni-potsdam.de [212.70.149.83] authentication failure using internet password
Oct  6 16:04:17 galaxy event: galaxy/lswi: smtp: view@uni-potsdam.de [212.70.149.83] authentication failure using internet password
Oct  6 16:04:43 galaxy event: galaxy/lswi: smtp: madmax@uni-potsdam.de [212.70.149.83] authentication failure using internet password
...
2020-10-06 22:05:57
49.234.14.216 attackspambots
49.234.14.216 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  6 08:18:52 server2 sshd[30280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.165.99.208  user=root
Oct  6 08:18:53 server2 sshd[30280]: Failed password for root from 178.165.99.208 port 44450 ssh2
Oct  6 08:19:32 server2 sshd[31092]: Failed password for root from 129.211.92.123 port 52356 ssh2
Oct  6 08:20:17 server2 sshd[32038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.14.216  user=root
Oct  6 08:19:30 server2 sshd[31092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.92.123  user=root
Oct  6 08:18:36 server2 sshd[29932]: Failed password for root from 106.12.127.39 port 59896 ssh2

IP Addresses Blocked:

178.165.99.208 (UA/Ukraine/-)
129.211.92.123 (CN/China/-)
2020-10-06 22:11:00
167.172.56.36 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-10-06 22:39:19
141.98.9.31 attack
$f2bV_matches
2020-10-06 22:14:32
117.69.231.120 attack
Lines containing failures of 117.69.231.120
Oct  5 04:22:58 shared02 sshd[2602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.69.231.120  user=r.r
Oct  5 04:23:00 shared02 sshd[2602]: Failed password for r.r from 117.69.231.120 port 44556 ssh2
Oct  5 04:23:00 shared02 sshd[2602]: Received disconnect from 117.69.231.120 port 44556:11: Bye Bye [preauth]
Oct  5 04:23:00 shared02 sshd[2602]: Disconnected from authenticating user r.r 117.69.231.120 port 44556 [preauth]
Oct  5 04:33:54 shared02 sshd[7481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.69.231.120  user=r.r
Oct  5 04:33:55 shared02 sshd[7481]: Failed password for r.r from 117.69.231.120 port 60368 ssh2
Oct  5 04:33:56 shared02 sshd[7481]: Received disconnect from 117.69.231.120 port 60368:11: Bye Bye [preauth]
Oct  5 04:33:56 shared02 sshd[7481]: Disconnected from authenticating user r.r 117.69.231.120 port 60368 [preaut........
------------------------------
2020-10-06 22:08:06
220.78.28.68 attackbots
Oct  6 14:55:19 sip sshd[1840104]: Failed password for root from 220.78.28.68 port 1605 ssh2
Oct  6 14:59:27 sip sshd[1840137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.78.28.68  user=root
Oct  6 14:59:29 sip sshd[1840137]: Failed password for root from 220.78.28.68 port 6732 ssh2
...
2020-10-06 22:19:12
85.209.0.253 attackbotsspam
Oct  6 16:26:44 debian64 sshd[4698]: Failed password for root from 85.209.0.253 port 59048 ssh2
...
2020-10-06 22:29:28
144.217.243.216 attackspam
$f2bV_matches
2020-10-06 22:17:01
64.227.74.131 attackspambots
Port scan on 1 port(s): 8088
2020-10-06 22:30:25
165.227.181.118 attackspambots
Invalid user anand from 165.227.181.118 port 33312
2020-10-06 22:07:41
128.106.210.171 attack
Automatic report - Port Scan Attack
2020-10-06 21:59:59
203.126.142.98 attackspam
Web-based SQL injection attempt
2020-10-06 22:14:08
191.217.170.33 attackbotsspam
2020-10-06T08:19:30.869018dreamphreak.com sshd[546116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.217.170.33  user=root
2020-10-06T08:19:32.998602dreamphreak.com sshd[546116]: Failed password for root from 191.217.170.33 port 60320 ssh2
...
2020-10-06 22:33:19
122.194.229.122 attackspambots
Oct  6 15:34:11 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
Oct  6 15:34:14 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
Oct  6 15:34:18 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
Oct  6 15:34:21 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
Oct  6 15:34:24 mavik sshd[20075]: Failed password for root from 122.194.229.122 port 61482 ssh2
...
2020-10-06 22:35:28
5.188.3.105 attack
2020-10-05 UTC: (14x) - root(14x)
2020-10-06 22:30:00

最近上报的IP列表

3.0.251.153 180.181.33.62 183.217.16.149 119.136.155.115
11.148.6.61 84.35.0.141 66.47.60.66 65.5.74.16
57.238.43.0 4.111.53.24 103.195.65.239 33.62.221.6
9.6.197.165 148.206.46.169 54.158.215.119 128.246.128.75
54.37.197.155 195.30.249.121 172.250.245.3 220.128.216.181