必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.180.13.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49683
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;74.180.13.54.			IN	A

;; AUTHORITY SECTION:
.			532	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080801 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 09 07:49:37 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
54.13.180.74.in-addr.arpa domain name pointer adsl-074-180-013-054.sip.jan.bellsouth.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
54.13.180.74.in-addr.arpa	name = adsl-074-180-013-054.sip.jan.bellsouth.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.171.18.36 attack
Request: "GET /about/ HTTP/1.0"
2019-06-22 04:22:09
170.82.22.100 attackspambots
Request: "GET / HTTP/1.1"
2019-06-22 04:07:33
45.71.31.4 attackspambots
Jun 17 21:03:04 mxgate1 postfix/postscreen[9814]: CONNECT from [45.71.31.4]:38601 to [176.31.12.44]:25
Jun 17 21:03:04 mxgate1 postfix/dnsblog[9817]: addr 45.71.31.4 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 17 21:03:04 mxgate1 postfix/dnsblog[9816]: addr 45.71.31.4 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 17 21:03:04 mxgate1 postfix/dnsblog[9816]: addr 45.71.31.4 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 17 21:03:04 mxgate1 postfix/dnsblog[9819]: addr 45.71.31.4 listed by domain bl.spamcop.net as 127.0.0.2
Jun 17 21:03:04 mxgate1 postfix/dnsblog[9815]: addr 45.71.31.4 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 17 21:03:04 mxgate1 postfix/dnsblog[9818]: addr 45.71.31.4 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 17 21:03:05 mxgate1 postfix/postscreen[9814]: PREGREET 22 after 0.67 from [45.71.31.4]:38601: EHLO lhostnamehoexpress.hostname

Jun 17 21:03:05 mxgate1 postfix/postscreen[9814]: DNSBL rank 6 for [45.71.31.4]:386........
-------------------------------
2019-06-22 04:16:51
89.179.247.216 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 04:44:20
93.93.59.175 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 04:05:15
92.119.237.3 attackbots
NAME : ISANET-Customers1 CIDR : 92.119.236.0/23 DDoS attack Albania - block certain countries :) IP: 92.119.237.3  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 04:18:17
82.117.253.212 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 04:09:11
92.118.160.5 attackspambots
Request: "GET / HTTP/1.0"
2019-06-22 04:04:24
104.236.122.193 attackbotsspam
" "
2019-06-22 04:08:28
85.238.98.75 attackspambots
Request: "GET / HTTP/1.1"
2019-06-22 04:06:08
179.83.51.159 attackspambots
2019-06-21T20:15:43.764359abusebot-5.cloudsearch.cf sshd\[6044\]: Invalid user appldev from 179.83.51.159 port 40158
2019-06-22 04:23:13
159.192.234.36 attackspambots
Request: "GET / HTTP/1.1"
2019-06-22 03:58:27
46.166.190.137 attackspambots
Bad Bot Request: "HEAD / HTTP/1.1" Agent: "Mozilla/5.0 (compatible; Uptimebot/1.0;  http://www.uptime.com/uptimebot)"
2019-06-22 04:30:29
195.128.102.66 attack
SSH/22 MH Probe, BF, Hack -
2019-06-22 04:09:39
192.241.132.183 attackbotsspam
firewall-block, port(s): 6380/tcp
2019-06-22 04:30:55

最近上报的IP列表

67.145.238.120 220.82.11.54 52.174.139.98 176.101.252.62
165.22.225.199 77.40.80.30 243.207.82.46 8.90.86.135
122.230.83.211 3.76.74.33 159.143.190.20 131.154.81.62
215.239.139.15 159.121.77.253 38.81.146.14 98.97.192.243
14.41.159.148 19.137.40.38 131.33.119.206 35.32.175.16