必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.31.54.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;63.31.54.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 15:42:53 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 42.54.31.63.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.54.31.63.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
87.198.48.13 attackspam
Bruteforce on SSH Honeypot
2019-07-03 03:37:34
109.236.70.207 attackspambots
[portscan] Port scan
2019-07-03 03:09:37
189.135.200.248 attackbotsspam
Mar  2 08:17:33 motanud sshd\[6778\]: Invalid user users from 189.135.200.248 port 36834
Mar  2 08:17:33 motanud sshd\[6778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.135.200.248
Mar  2 08:17:35 motanud sshd\[6778\]: Failed password for invalid user users from 189.135.200.248 port 36834 ssh2
2019-07-03 03:15:29
139.59.80.65 attack
$f2bV_matches
2019-07-03 03:06:32
181.236.235.94 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-02 15:42:15]
2019-07-03 03:10:29
120.52.152.16 attackspam
02.07.2019 19:29:59 Connection to port 3283 blocked by firewall
2019-07-03 03:42:48
106.75.30.51 attackbotsspam
Jul  2 18:35:13 *** sshd[26080]: Invalid user presta from 106.75.30.51
2019-07-03 03:26:06
34.77.51.253 attack
Automatic report - Web App Attack
2019-07-03 03:34:17
194.50.254.227 attackspambots
1562075002 - 07/02/2019 20:43:22 Host: 194.50.254.227/194.50.254.227 Port: 23 TCP Blocked
...
2019-07-03 03:02:38
170.79.201.9 attackspambots
23/tcp
[2019-07-02]1pkt
2019-07-03 03:23:52
142.93.178.87 attack
Jul  2 15:42:26 lnxmail61 sshd[10038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.178.87
2019-07-03 03:37:07
85.84.209.164 attack
Hit on /wp-login.php
2019-07-03 03:17:28
189.19.83.116 attackbotsspam
Jun  2 12:28:11 motanud sshd\[29082\]: Invalid user pi from 189.19.83.116 port 60876
Jun  2 12:28:11 motanud sshd\[29081\]: Invalid user pi from 189.19.83.116 port 60874
Jun  2 12:28:11 motanud sshd\[29081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.19.83.116
Jun  2 12:28:11 motanud sshd\[29082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.19.83.116
2019-07-03 02:57:55
5.133.66.218 attackbots
Jul  2 15:43:15 server postfix/smtpd[7638]: NOQUEUE: reject: RCPT from chief.ppobmspays.com[5.133.66.218]: 554 5.7.1 Service unavailable; Client host [5.133.66.218] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2019-07-03 03:08:13
45.252.249.178 attackspam
45.252.249.178 - - [02/Jul/2019:15:42:03 +0200] "GET /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.252.249.178 - - [02/Jul/2019:15:42:10 +0200] "POST /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.252.249.178 - - [02/Jul/2019:15:42:11 +0200] "GET /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.252.249.178 - - [02/Jul/2019:15:42:18 +0200] "POST /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.252.249.178 - - [02/Jul/2019:15:42:29 +0200] "GET /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.252.249.178 - - [02/Jul/2019:15:42:32 +0200] "POST /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-03 03:32:35

最近上报的IP列表

85.39.56.203 233.38.3.1 20.189.1.189 170.139.202.178
83.123.154.156 100.60.192.13 34.117.189.121 38.152.164.253
226.160.229.148 98.157.173.10 83.36.7.214 177.219.14.196
132.15.222.244 140.20.128.152 152.16.207.141 242.198.223.128
148.148.89.148 9.202.216.245 27.182.128.252 77.143.42.169