必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.42.54.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;71.42.54.59.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:25:28 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
59.54.42.71.in-addr.arpa domain name pointer syn-071-042-054-059.biz.spectrum.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
59.54.42.71.in-addr.arpa	name = syn-071-042-054-059.biz.spectrum.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
73.143.106.124 attack
Automatic report - Banned IP Access
2019-12-25 14:01:44
202.175.113.123 attackbots
" "
2019-12-25 14:17:40
181.84.249.66 attackspam
Unauthorized connection attempt detected from IP address 181.84.249.66 to port 445
2019-12-25 14:11:54
190.128.158.26 attack
Dec 25 05:53:05 km20725 sshd\[14102\]: Invalid user nyx from 190.128.158.26Dec 25 05:53:08 km20725 sshd\[14102\]: Failed password for invalid user nyx from 190.128.158.26 port 7314 ssh2Dec 25 05:57:21 km20725 sshd\[14335\]: Invalid user mignonne from 190.128.158.26Dec 25 05:57:23 km20725 sshd\[14335\]: Failed password for invalid user mignonne from 190.128.158.26 port 9049 ssh2
...
2019-12-25 13:40:40
212.72.47.218 attackspam
212.72.47.218 has been banned for [spam]
...
2019-12-25 14:11:01
182.61.23.89 attackbots
Dec 25 05:52:53 minden010 sshd[25020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.23.89
Dec 25 05:52:55 minden010 sshd[25020]: Failed password for invalid user donetta from 182.61.23.89 port 55596 ssh2
Dec 25 05:57:05 minden010 sshd[26425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.23.89
...
2019-12-25 13:48:49
220.127.135.103 attackbots
firewall-block, port(s): 23/tcp
2019-12-25 13:51:47
211.25.81.250 attackspambots
Automatic report - Banned IP Access
2019-12-25 13:50:27
192.99.70.208 attack
$f2bV_matches
2019-12-25 13:47:42
94.198.110.205 attackspambots
$f2bV_matches
2019-12-25 14:14:04
140.143.136.89 attackbots
Dec 25 01:56:39 ws24vmsma01 sshd[20450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.136.89
Dec 25 01:56:41 ws24vmsma01 sshd[20450]: Failed password for invalid user rast from 140.143.136.89 port 57902 ssh2
...
2019-12-25 14:04:44
34.73.254.71 attackspam
Invalid user oracle from 34.73.254.71 port 51750
2019-12-25 14:06:46
183.88.47.3 attack
Unauthorized connection attempt detected from IP address 183.88.47.3 to port 445
2019-12-25 13:56:46
194.61.24.250 attack
Dec 24 19:58:11 hpm sshd\[25498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.24.250  user=root
Dec 24 19:58:13 hpm sshd\[25498\]: Failed password for root from 194.61.24.250 port 57354 ssh2
Dec 24 19:58:15 hpm sshd\[25500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.24.250  user=root
Dec 24 19:58:17 hpm sshd\[25500\]: Failed password for root from 194.61.24.250 port 58406 ssh2
Dec 24 19:58:21 hpm sshd\[25519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.61.24.250  user=root
2019-12-25 14:05:47
58.218.250.12 attack
Dec 25 05:27:03 localhost sshd\[4848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.218.250.12  user=news
Dec 25 05:27:06 localhost sshd\[4848\]: Failed password for news from 58.218.250.12 port 5337 ssh2
Dec 25 05:30:01 localhost sshd\[4920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.218.250.12  user=root
Dec 25 05:30:03 localhost sshd\[4920\]: Failed password for root from 58.218.250.12 port 39913 ssh2
Dec 25 05:32:46 localhost sshd\[4961\]: Invalid user sungsik from 58.218.250.12 port 14843
...
2019-12-25 13:48:30

最近上报的IP列表

28.99.172.130 29.225.179.234 61.240.193.5 170.16.201.95
91.110.145.228 67.209.223.89 59.51.188.80 186.15.221.154
56.118.78.39 48.162.80.120 22.58.110.151 82.82.0.33
40.233.148.199 214.232.170.110 194.100.147.110 116.83.44.150
92.68.86.158 252.180.54.47 236.7.224.180 157.240.131.116