必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.242.242.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;71.242.242.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:38:51 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
54.242.242.71.in-addr.arpa domain name pointer static-71-242-242-54.phlapa.east.verizon.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.242.242.71.in-addr.arpa	name = static-71-242-242-54.phlapa.east.verizon.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.163.196.146 attackspam
Nov 13 01:00:20 server sshd\[27420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.196.146  user=root
Nov 13 01:00:22 server sshd\[27420\]: Failed password for root from 119.163.196.146 port 28568 ssh2
Nov 13 01:32:58 server sshd\[2950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.196.146  user=root
Nov 13 01:33:00 server sshd\[2950\]: Failed password for root from 119.163.196.146 port 4466 ssh2
Nov 13 01:36:20 server sshd\[3997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.196.146  user=root
...
2019-11-13 07:04:24
14.63.169.33 attackspambots
Nov 12 23:35:23 vps691689 sshd[6125]: Failed password for root from 14.63.169.33 port 49124 ssh2
Nov 12 23:40:53 vps691689 sshd[6225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.169.33
...
2019-11-13 06:53:14
171.34.173.49 attackbotsspam
50 failed attempt(s) in the last 24h
2019-11-13 07:25:31
27.254.194.99 attack
Nov 12 12:51:42 auw2 sshd\[4117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.194.99  user=mysql
Nov 12 12:51:43 auw2 sshd\[4117\]: Failed password for mysql from 27.254.194.99 port 43412 ssh2
Nov 12 12:55:49 auw2 sshd\[4404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.194.99  user=root
Nov 12 12:55:51 auw2 sshd\[4404\]: Failed password for root from 27.254.194.99 port 52618 ssh2
Nov 12 12:59:57 auw2 sshd\[4699\]: Invalid user mcconney from 27.254.194.99
2019-11-13 07:02:48
49.72.212.92 attackspambots
RDPBruteCAu24
2019-11-13 06:52:28
152.0.71.183 attackbots
Nov 12 23:47:38 vps691689 sshd[6317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.0.71.183
Nov 12 23:47:41 vps691689 sshd[6317]: Failed password for invalid user brechin from 152.0.71.183 port 38923 ssh2
...
2019-11-13 06:54:04
208.80.194.42 attackspambots
[TueNov1223:31:52.4207152019][:error][pid15737:tid47800966227712][client208.80.194.42:39050][client208.80.194.42]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"395"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(DisableifyouwanttoallowMSIE6\)"][severity"WARNING"][hostname"www.ggarchitetti.ch"][uri"/"][unique_id"Xcsy2NPp--5pLs0ENI@FIQAAAQo"][TueNov1223:36:09.8718882019][:error][pid15737:tid47801054553856][client208.80.194.42:57482][client208.80.194.42]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/etc/apache2/conf.d/modsec_rules/20_asl_useragents.conf"][line"395"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(Disableifyouwanttoa
2019-11-13 07:08:33
74.58.106.15 attackbots
Nov 12 23:30:57 vps58358 sshd\[24397\]: Invalid user ens from 74.58.106.15Nov 12 23:31:00 vps58358 sshd\[24397\]: Failed password for invalid user ens from 74.58.106.15 port 56306 ssh2Nov 12 23:34:36 vps58358 sshd\[24412\]: Invalid user ngah from 74.58.106.15Nov 12 23:34:38 vps58358 sshd\[24412\]: Failed password for invalid user ngah from 74.58.106.15 port 37302 ssh2Nov 12 23:38:16 vps58358 sshd\[24424\]: Invalid user boertje from 74.58.106.15Nov 12 23:38:18 vps58358 sshd\[24424\]: Failed password for invalid user boertje from 74.58.106.15 port 46502 ssh2
...
2019-11-13 07:21:05
49.232.166.229 attackbotsspam
Nov 12 23:36:18 vmanager6029 sshd\[30508\]: Invalid user test2 from 49.232.166.229 port 60122
Nov 12 23:36:18 vmanager6029 sshd\[30508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.166.229
Nov 12 23:36:20 vmanager6029 sshd\[30508\]: Failed password for invalid user test2 from 49.232.166.229 port 60122 ssh2
2019-11-13 07:05:02
104.42.159.141 attack
SSH Bruteforce
2019-11-13 06:57:14
222.186.173.154 attack
Nov 13 00:16:34 MK-Soft-Root2 sshd[14638]: Failed password for root from 222.186.173.154 port 34728 ssh2
Nov 13 00:16:37 MK-Soft-Root2 sshd[14638]: Failed password for root from 222.186.173.154 port 34728 ssh2
...
2019-11-13 07:23:17
41.83.157.191 attackspam
MYH,DEF GET /downloader/
2019-11-13 07:10:43
203.110.179.26 attackbotsspam
50 failed attempt(s) in the last 24h
2019-11-13 07:20:52
123.206.87.154 attack
Nov 12 13:01:49 auw2 sshd\[4869\]: Invalid user kalsom from 123.206.87.154
Nov 12 13:01:49 auw2 sshd\[4869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.87.154
Nov 12 13:01:52 auw2 sshd\[4869\]: Failed password for invalid user kalsom from 123.206.87.154 port 59754 ssh2
Nov 12 13:05:37 auw2 sshd\[5327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.87.154  user=root
Nov 12 13:05:40 auw2 sshd\[5327\]: Failed password for root from 123.206.87.154 port 39148 ssh2
2019-11-13 07:07:35
181.221.192.113 attackspam
Nov 12 23:01:05 zeus sshd[17062]: Failed password for root from 181.221.192.113 port 49031 ssh2
Nov 12 23:05:56 zeus sshd[17126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.221.192.113 
Nov 12 23:05:59 zeus sshd[17126]: Failed password for invalid user goodmann from 181.221.192.113 port 39715 ssh2
2019-11-13 07:14:27

最近上报的IP列表

52.254.220.225 207.93.83.32 34.186.255.79 190.21.110.161
151.232.115.161 215.26.32.78 84.141.145.97 162.218.141.19
75.75.238.53 75.78.133.95 107.190.45.198 210.194.63.0
25.6.81.133 23.11.185.253 227.221.70.211 196.96.73.174
68.73.228.40 130.95.159.4 212.153.9.40 55.90.225.254