必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.8.68.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2408
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.8.68.245.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 09:39:54 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 245.68.8.54.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.68.8.54.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.75.53.141 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-10-04 18:30:08
182.114.19.82 attackspam
Netgear DGN Device Remote Command Execution Vulnerability , PTR: hn.kd.ny.adsl.
2020-10-04 19:05:40
176.122.161.175 attackspambots
2020-10-03 UTC: (2x) - bhx(2x)
2020-10-04 18:56:19
165.227.66.224 attack
Oct  4 09:57:07 Ubuntu-1404-trusty-64-minimal sshd\[28391\]: Invalid user build from 165.227.66.224
Oct  4 09:57:07 Ubuntu-1404-trusty-64-minimal sshd\[28391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.224
Oct  4 09:57:09 Ubuntu-1404-trusty-64-minimal sshd\[28391\]: Failed password for invalid user build from 165.227.66.224 port 58708 ssh2
Oct  4 10:04:03 Ubuntu-1404-trusty-64-minimal sshd\[5083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.66.224  user=root
Oct  4 10:04:06 Ubuntu-1404-trusty-64-minimal sshd\[5083\]: Failed password for root from 165.227.66.224 port 59454 ssh2
2020-10-04 18:40:45
116.58.179.3 attack
 TCP (SYN) 116.58.179.3:25509 -> port 1433, len 44
2020-10-04 18:27:56
182.122.14.5 attack
Lines containing failures of 182.122.14.5
Oct  3 19:47:18 kopano sshd[15219]: Invalid user ghostname from 182.122.14.5 port 34638
Oct  3 19:47:18 kopano sshd[15219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.14.5
Oct  3 19:47:20 kopano sshd[15219]: Failed password for invalid user ghostname from 182.122.14.5 port 34638 ssh2
Oct  3 19:47:21 kopano sshd[15219]: Received disconnect from 182.122.14.5 port 34638:11: Bye Bye [preauth]
Oct  3 19:47:21 kopano sshd[15219]: Disconnected from invalid user ghostname 182.122.14.5 port 34638 [preauth]
Oct  3 19:53:56 kopano sshd[15432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.14.5  user=r.r
Oct  3 19:53:58 kopano sshd[15432]: Failed password for r.r from 182.122.14.5 port 48728 ssh2
Oct  3 19:53:58 kopano sshd[15432]: Received disconnect from 182.122.14.5 port 48728:11: Bye Bye [preauth]
Oct  3 19:53:58 kopano sshd[15432]: Dis........
------------------------------
2020-10-04 18:38:50
68.183.227.196 attack
Oct  4 07:55:23 staging sshd[197138]: Invalid user user from 68.183.227.196 port 37168
Oct  4 07:55:23 staging sshd[197138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.196 
Oct  4 07:55:23 staging sshd[197138]: Invalid user user from 68.183.227.196 port 37168
Oct  4 07:55:26 staging sshd[197138]: Failed password for invalid user user from 68.183.227.196 port 37168 ssh2
...
2020-10-04 18:31:25
164.90.185.34 attack
[H1.VM2] Blocked by UFW
2020-10-04 18:56:48
31.163.130.53 attackbots
GPON Home Routers Remote Code Execution Vulnerability  CVE 2018-10562, PTR: ws53.zone31-163-130.zaural.ru.
2020-10-04 18:44:49
109.191.33.249 attack
Port probing on unauthorized port 445
2020-10-04 18:58:28
37.77.121.234 attackspambots
Brute forcing RDP port 3389
2020-10-04 18:35:57
222.186.42.57 attack
Oct  4 12:42:35 abendstille sshd\[28909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
Oct  4 12:42:37 abendstille sshd\[28909\]: Failed password for root from 222.186.42.57 port 46338 ssh2
Oct  4 12:42:39 abendstille sshd\[28909\]: Failed password for root from 222.186.42.57 port 46338 ssh2
Oct  4 12:42:41 abendstille sshd\[28909\]: Failed password for root from 222.186.42.57 port 46338 ssh2
Oct  4 12:42:51 abendstille sshd\[29116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
...
2020-10-04 18:47:18
64.227.37.93 attack
2020-10-04T04:08:49.227494sorsha.thespaminator.com sshd[30014]: Invalid user best from 64.227.37.93 port 56508
2020-10-04T04:08:50.846321sorsha.thespaminator.com sshd[30014]: Failed password for invalid user best from 64.227.37.93 port 56508 ssh2
...
2020-10-04 19:10:09
81.68.77.53 attackspambots
Oct  4 11:48:38 lnxweb62 sshd[24784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.77.53
Oct  4 11:48:40 lnxweb62 sshd[24784]: Failed password for invalid user test_ftp from 81.68.77.53 port 60486 ssh2
Oct  4 11:50:42 lnxweb62 sshd[25812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.77.53
2020-10-04 18:43:43
91.215.20.102 attack
Invalid user centos from 91.215.20.102 port 57660
2020-10-04 19:08:20

最近上报的IP列表

227.171.17.95 176.21.60.108 79.220.34.106 227.119.147.144
30.181.200.74 8.147.35.192 155.224.252.232 249.62.170.251
90.202.106.56 72.81.15.161 61.223.231.147 118.121.16.233
25.34.221.214 72.89.158.71 191.136.112.55 4.76.130.120
231.169.209.235 180.63.15.214 25.72.11.166 235.89.5.142