必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.150.54.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53103
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.150.54.77.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:31:39 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 77.54.150.61.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 77.54.150.61.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
84.203.56.241 attackbots
SSH login attempts.
2020-08-18 22:38:31
218.92.0.215 attackbotsspam
$f2bV_matches
2020-08-18 21:57:00
111.175.33.141 attack
Aug 18 13:48:13 rocket sshd[27969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.175.33.141
Aug 18 13:48:16 rocket sshd[27969]: Failed password for invalid user jur from 111.175.33.141 port 21647 ssh2
...
2020-08-18 22:10:25
49.35.84.174 attackbotsspam
1597754043 - 08/18/2020 14:34:03 Host: 49.35.84.174/49.35.84.174 Port: 445 TCP Blocked
2020-08-18 22:35:00
1.11.201.18 attack
Aug 18 12:29:07 localhost sshd[80682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.11.201.18  user=root
Aug 18 12:29:09 localhost sshd[80682]: Failed password for root from 1.11.201.18 port 60242 ssh2
Aug 18 12:34:30 localhost sshd[81228]: Invalid user ivone from 1.11.201.18 port 52174
Aug 18 12:34:30 localhost sshd[81228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.11.201.18
Aug 18 12:34:30 localhost sshd[81228]: Invalid user ivone from 1.11.201.18 port 52174
Aug 18 12:34:32 localhost sshd[81228]: Failed password for invalid user ivone from 1.11.201.18 port 52174 ssh2
...
2020-08-18 22:07:26
222.186.190.17 attack
Aug 18 14:04:49 rush sshd[28407]: Failed password for root from 222.186.190.17 port 35675 ssh2
Aug 18 14:06:56 rush sshd[28465]: Failed password for root from 222.186.190.17 port 41450 ssh2
...
2020-08-18 22:16:38
51.158.190.54 attack
2020-08-18T15:42:33.422355vps773228.ovh.net sshd[15377]: Failed password for ftp from 51.158.190.54 port 43046 ssh2
2020-08-18T15:46:24.798885vps773228.ovh.net sshd[15395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54  user=root
2020-08-18T15:46:27.291208vps773228.ovh.net sshd[15395]: Failed password for root from 51.158.190.54 port 51046 ssh2
2020-08-18T15:50:13.453269vps773228.ovh.net sshd[15435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.190.54  user=root
2020-08-18T15:50:15.383442vps773228.ovh.net sshd[15435]: Failed password for root from 51.158.190.54 port 59048 ssh2
...
2020-08-18 22:11:42
82.69.96.126 attackspam
Aug 17 08:41:51 www sshd[21303]: Invalid user opuser from 82.69.96.126
Aug 17 08:41:51 www sshd[21303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-69-96-126.dsl.in-addr.zen.co.uk 
Aug 17 08:41:53 www sshd[21303]: Failed password for invalid user opuser from 82.69.96.126 port 61434 ssh2
Aug 17 08:41:53 www sshd[21303]: Received disconnect from 82.69.96.126: 11: Bye Bye [preauth]
Aug 17 09:02:06 www sshd[22382]: Invalid user xj from 82.69.96.126
Aug 17 09:02:06 www sshd[22382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-69-96-126.dsl.in-addr.zen.co.uk 
Aug 17 09:02:08 www sshd[22382]: Failed password for invalid user xj from 82.69.96.126 port 43576 ssh2
Aug 17 09:02:08 www sshd[22382]: Received disconnect from 82.69.96.126: 11: Bye Bye [preauth]
Aug 17 09:07:47 www sshd[22639]: Invalid user vishostnameante from 82.69.96.126
Aug 17 09:07:47 www sshd[22639]: pam_unix(sshd:auth): ........
-------------------------------
2020-08-18 22:35:24
84.2.226.70 attackbotsspam
Failed password for invalid user admin from 84.2.226.70 port 44186 ssh2
2020-08-18 22:02:30
167.99.69.130 attackbotsspam
Aug 18 14:35:27 ajax sshd[26790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.69.130 
Aug 18 14:35:28 ajax sshd[26790]: Failed password for invalid user fms from 167.99.69.130 port 36622 ssh2
2020-08-18 22:12:08
174.17.91.154 attack
Unauthorised access (Aug 18) SRC=174.17.91.154 LEN=52 TOS=0x10 PREC=0x40 TTL=118 ID=2788 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-18 22:16:59
174.219.143.140 attackspambots
Brute forcing email accounts
2020-08-18 22:26:20
216.244.66.234 attackbots
20 attempts against mh-misbehave-ban on pluto
2020-08-18 22:17:37
36.74.229.224 attackbots
Icarus honeypot on github
2020-08-18 21:58:17
177.152.124.21 attackspambots
Aug 18 13:45:29 rush sshd[28030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.21
Aug 18 13:45:31 rush sshd[28030]: Failed password for invalid user oracle from 177.152.124.21 port 38738 ssh2
Aug 18 13:50:26 rush sshd[28109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.21
...
2020-08-18 22:04:26

最近上报的IP列表

221.131.103.132 57.116.39.207 197.123.19.71 33.44.132.171
219.100.37.78 114.51.67.239 154.75.75.224 30.99.175.248
24.51.233.45 166.171.226.223 52.184.75.69 25.91.110.248
95.136.213.170 148.168.252.3 22.217.144.210 29.3.127.228
146.12.214.198 144.101.124.89 58.174.232.228 203.8.34.191