必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.54.68.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37099
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.54.68.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 00:48:55 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 207.68.54.6.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 6.54.68.207.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.217.139.137 attackbotsspam
srvr3: (mod_security) mod_security (id:920350) triggered by 46.217.139.137 (MK/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/10/02 22:39:57 [error] 70998#0: *410 [client 46.217.139.137] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "160167119767.124272"] [ref "o0,14v21,14"], client: 46.217.139.137, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-10-03 22:13:43
159.65.154.48 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-03 21:55:53
106.12.57.165 attackspam
24852/tcp 16010/tcp 25739/tcp...
[2020-08-04/10-03]25pkt,25pt.(tcp)
2020-10-03 21:59:01
61.155.2.142 attackspam
Invalid user cedric from 61.155.2.142 port 41089
2020-10-03 20:58:15
178.148.186.248 attackbots
Brute forcing email accounts
2020-10-03 21:56:46
175.137.104.57 attack
Lines containing failures of 175.137.104.57 (max 1000)
Oct  2 22:27:37 srv sshd[98150]: Connection closed by 175.137.104.57 port 61298
Oct  2 22:27:40 srv sshd[98151]: Invalid user 666666 from 175.137.104.57 port 61479
Oct  2 22:27:40 srv sshd[98151]: Connection closed by invalid user 666666 175.137.104.57 port 61479 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=175.137.104.57
2020-10-03 20:55:42
46.105.75.105 attackspambots
$f2bV_matches
2020-10-03 20:59:03
46.101.7.67 attackbotsspam
2020-10-02T22:45:43.647446amanda2.illicoweb.com sshd\[31057\]: Invalid user eduardo from 46.101.7.67 port 55512
2020-10-02T22:45:43.652871amanda2.illicoweb.com sshd\[31057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.7.67
2020-10-02T22:45:45.384843amanda2.illicoweb.com sshd\[31057\]: Failed password for invalid user eduardo from 46.101.7.67 port 55512 ssh2
2020-10-02T22:50:11.984213amanda2.illicoweb.com sshd\[31426\]: Invalid user fernando from 46.101.7.67 port 39966
2020-10-02T22:50:11.989521amanda2.illicoweb.com sshd\[31426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.7.67
...
2020-10-03 21:07:24
195.133.56.185 attack
(mod_security) mod_security (id:210730) triggered by 195.133.56.185 (CZ/Czechia/-): 5 in the last 300 secs
2020-10-03 20:56:59
103.253.146.142 attack
1601724353 - 10/03/2020 13:25:53 Host: 103.253.146.142/103.253.146.142 Port: 540 TCP Blocked
2020-10-03 21:17:44
46.101.5.144 attack
20 attempts against mh-ssh on soil
2020-10-03 21:13:46
178.212.242.18 attackspam
fail2ban - Attack against Apache (too many 404s)
2020-10-03 21:18:53
72.180.73.137 attackspambots
Oct  3 08:52:22 mx sshd[5688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.180.73.137
Oct  3 08:52:24 mx sshd[5688]: Failed password for invalid user wan from 72.180.73.137 port 47658 ssh2
2020-10-03 21:10:13
121.60.118.60 attack
20 attempts against mh-ssh on echoip
2020-10-03 22:11:44
46.101.40.21 attackspam
Oct  3 18:42:55 itv-usvr-02 sshd[30651]: Invalid user oracle from 46.101.40.21 port 55144
Oct  3 18:42:55 itv-usvr-02 sshd[30651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21
Oct  3 18:42:55 itv-usvr-02 sshd[30651]: Invalid user oracle from 46.101.40.21 port 55144
Oct  3 18:42:57 itv-usvr-02 sshd[30651]: Failed password for invalid user oracle from 46.101.40.21 port 55144 ssh2
Oct  3 18:50:23 itv-usvr-02 sshd[30978]: Invalid user user from 46.101.40.21 port 48124
2020-10-03 21:57:09

最近上报的IP列表

89.250.137.106 34.75.219.188 136.113.217.195 231.229.17.137
136.86.32.172 6.252.3.234 152.126.70.135 33.134.166.59
148.146.94.157 2.146.253.213 116.241.120.117 12.207.183.203
5.86.154.127 119.148.71.194 185.129.170.80 181.16.253.145
40.99.199.33 91.115.49.45 249.131.26.34 132.4.158.47