必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.45.75.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61724
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.45.75.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 21:57:04 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 91.75.45.54.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.75.45.54.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.82.153.37 attack
Sep  8 08:09:14 mail postfix/smtpd\[25155\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
Sep  8 08:09:25 mail postfix/smtpd\[16649\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
Sep  8 08:11:36 mail postfix/smtpd\[27738\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
2019-09-08 14:24:07
149.28.27.139 attackspambots
Lines containing failures of 149.28.27.139
Sep  7 23:28:17 MAKserver05 sshd[18477]: Invalid user steam from 149.28.27.139 port 44358
Sep  7 23:28:17 MAKserver05 sshd[18477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.28.27.139 
Sep  7 23:28:19 MAKserver05 sshd[18477]: Failed password for invalid user steam from 149.28.27.139 port 44358 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.28.27.139
2019-09-08 13:49:09
193.31.117.12 attackbots
MagicSpam Rule: from_blacklist; Spammer IP: 193.31.117.12
2019-09-08 14:17:30
192.124.185.13 attackspam
[portscan] Port scan
2019-09-08 13:59:41
81.22.45.146 attackbots
3389/tcp 3389/tcp 3389/tcp...
[2019-08-02/09-07]94pkt,1pt.(tcp)
2019-09-08 13:43:17
178.128.54.223 attackspambots
Sep  7 19:47:37 auw2 sshd\[18249\]: Invalid user steam from 178.128.54.223
Sep  7 19:47:37 auw2 sshd\[18249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.54.223
Sep  7 19:47:38 auw2 sshd\[18249\]: Failed password for invalid user steam from 178.128.54.223 port 20245 ssh2
Sep  7 19:57:26 auw2 sshd\[19020\]: Invalid user deploy from 178.128.54.223
Sep  7 19:57:27 auw2 sshd\[19020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.54.223
2019-09-08 14:04:50
139.5.159.150 attackbotsspam
port scan and connect, tcp 8000 (http-alt)
2019-09-08 14:01:32
185.86.164.108 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-09-08 13:50:54
134.213.27.221 attackspambots
Sep  7 23:24:11 mail sshd[30756]: Failed password for r.r from 134.213.27.221 port 55674 ssh2
Sep  7 23:24:17 mail sshd[30758]: Failed password for r.r from 134.213.27.221 port 56030 ssh2
Sep  7 23:24:18 mail sshd[30760]: Invalid user pi from 134.213.27.221
Sep  7 23:24:21 mail sshd[30760]: Failed password for invalid user pi from 134.213.27.221 port 56518 ssh2
Sep  7 23:24:22 mail sshd[30762]: Invalid user pi from 134.213.27.221
Sep  7 23:24:25 mail sshd[30762]: Failed password for invalid user pi from 134.213.27.221 port 57144 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.213.27.221
2019-09-08 14:09:33
167.99.89.67 attack
Sep  8 01:14:07 vmd17057 sshd\[25240\]: Invalid user username from 167.99.89.67 port 52920
Sep  8 01:14:07 vmd17057 sshd\[25240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.89.67
Sep  8 01:14:08 vmd17057 sshd\[25240\]: Failed password for invalid user username from 167.99.89.67 port 52920 ssh2
...
2019-09-08 13:46:33
190.96.49.189 attackbots
Sep  7 16:39:38 sachi sshd\[20985\]: Invalid user test from 190.96.49.189
Sep  7 16:39:38 sachi sshd\[20985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.49.189
Sep  7 16:39:40 sachi sshd\[20985\]: Failed password for invalid user test from 190.96.49.189 port 44742 ssh2
Sep  7 16:45:27 sachi sshd\[21463\]: Invalid user scpuser from 190.96.49.189
Sep  7 16:45:27 sachi sshd\[21463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.49.189
2019-09-08 14:35:08
193.56.28.127 attack
" "
2019-09-08 14:09:04
93.114.66.66 attack
fail2ban honeypot
2019-09-08 13:45:12
36.66.203.251 attack
2019-09-06T03:31:48.893386WS-Zach sshd[20362]: Invalid user vagrant from 36.66.203.251 port 53030
2019-09-06T03:31:48.896631WS-Zach sshd[20362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.203.251
2019-09-06T03:31:48.893386WS-Zach sshd[20362]: Invalid user vagrant from 36.66.203.251 port 53030
2019-09-06T03:31:51.151545WS-Zach sshd[20362]: Failed password for invalid user vagrant from 36.66.203.251 port 53030 ssh2
2019-09-06T03:49:10.070609WS-Zach sshd[28687]: Invalid user cloud from 36.66.203.251 port 41602
2019-09-06T03:49:10.073984WS-Zach sshd[28687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.66.203.251
2019-09-06T03:49:10.070609WS-Zach sshd[28687]: Invalid user cloud from 36.66.203.251 port 41602
2019-09-06T03:49:11.707003WS-Zach sshd[28687]: Failed password for invalid user cloud from 36.66.203.251 port 41602 ssh2
2019-09-06T03:54:31.406146WS-Zach sshd[31339]: Invalid user devel from 36.66.203.251 port 5594
2019-09-08 14:18:20
45.136.109.34 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-09-08 13:56:44

最近上报的IP列表

228.66.161.97 243.168.170.98 77.187.86.25 64.65.188.228
47.224.104.119 253.223.227.217 80.91.0.50 90.199.135.179
198.151.8.204 238.48.78.171 104.139.176.130 114.236.2.165
38.84.65.114 65.69.140.176 120.53.68.231 48.123.72.64
169.77.197.86 44.229.206.40 189.23.207.76 70.37.70.202