必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.54.124.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.54.124.11.			IN	A

;; AUTHORITY SECTION:
.			325	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:34:37 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
11.124.54.82.in-addr.arpa domain name pointer host-82-54-124-11.retail.telecomitalia.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.124.54.82.in-addr.arpa	name = host-82-54-124-11.retail.telecomitalia.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.224.65.254 attackbots
Sep 27 17:09:05 core sshd[9121]: Invalid user admin from 212.224.65.254 port 53512
Sep 27 17:09:08 core sshd[9121]: Failed password for invalid user admin from 212.224.65.254 port 53512 ssh2
...
2019-09-28 00:03:11
80.197.250.58 attackspambots
DATE:2019-09-27 14:01:33, IP:80.197.250.58, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis)
2019-09-28 00:05:48
148.70.210.77 attackspambots
Sep 27 15:14:45 v22019058497090703 sshd[4526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.210.77
Sep 27 15:14:47 v22019058497090703 sshd[4526]: Failed password for invalid user ako from 148.70.210.77 port 44857 ssh2
Sep 27 15:21:50 v22019058497090703 sshd[5086]: Failed password for man from 148.70.210.77 port 36827 ssh2
...
2019-09-28 00:03:38
177.69.237.49 attackbotsspam
Sep 27 05:34:04 hanapaa sshd\[2594\]: Invalid user tom from 177.69.237.49
Sep 27 05:34:04 hanapaa sshd\[2594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.49
Sep 27 05:34:05 hanapaa sshd\[2594\]: Failed password for invalid user tom from 177.69.237.49 port 44794 ssh2
Sep 27 05:39:23 hanapaa sshd\[3197\]: Invalid user ADVMAIL from 177.69.237.49
Sep 27 05:39:23 hanapaa sshd\[3197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.237.49
2019-09-27 23:43:53
59.28.91.30 attackbotsspam
Sep 27 17:26:43 host sshd\[34860\]: Invalid user mwang from 59.28.91.30 port 49696
Sep 27 17:26:43 host sshd\[34860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.28.91.30
...
2019-09-27 23:54:18
66.186.181.47 attack
RDP Bruteforce
2019-09-28 00:04:37
112.13.91.29 attackbots
Sep 27 17:30:31 nextcloud sshd\[23504\]: Invalid user rosa from 112.13.91.29
Sep 27 17:30:31 nextcloud sshd\[23504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.13.91.29
Sep 27 17:30:33 nextcloud sshd\[23504\]: Failed password for invalid user rosa from 112.13.91.29 port 3548 ssh2
...
2019-09-28 00:08:38
111.198.29.223 attackbotsspam
Sep 27 18:16:55 plex sshd[26609]: Invalid user surf from 111.198.29.223 port 32043
2019-09-28 00:22:34
14.162.183.197 attackbotsspam
Sep 23 13:54:23 zn006 sshd[11816]: Address 14.162.183.197 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 23 13:54:23 zn006 sshd[11816]: Invalid user alex from 14.162.183.197
Sep 23 13:54:23 zn006 sshd[11816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.162.183.197 
Sep 23 13:54:25 zn006 sshd[11816]: Failed password for invalid user alex from 14.162.183.197 port 47392 ssh2
Sep 23 13:54:25 zn006 sshd[11816]: Received disconnect from 14.162.183.197: 11: Bye Bye [preauth]
Sep 23 14:15:38 zn006 sshd[14074]: Address 14.162.183.197 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 23 14:15:38 zn006 sshd[14074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.162.183.197  user=proxy
Sep 23 14:15:39 zn006 sshd[14074]: Failed password for proxy from 14.162.183.197 port 57862 ssh2
Sep 23 14:15........
-------------------------------
2019-09-27 23:50:57
134.175.153.238 attackspam
Sep 27 17:41:49 OPSO sshd\[32301\]: Invalid user nexus from 134.175.153.238 port 36654
Sep 27 17:41:49 OPSO sshd\[32301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.153.238
Sep 27 17:41:51 OPSO sshd\[32301\]: Failed password for invalid user nexus from 134.175.153.238 port 36654 ssh2
Sep 27 17:46:58 OPSO sshd\[964\]: Invalid user oracle from 134.175.153.238 port 45196
Sep 27 17:46:58 OPSO sshd\[964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.153.238
2019-09-27 23:53:39
80.82.65.105 attackspambots
09/27/2019-15:59:02.264012 80.82.65.105 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-27 23:47:51
213.136.79.178 attackbotsspam
2019-09-27T15:21:51.933428abusebot-6.cloudsearch.cf sshd\[24948\]: Invalid user snacke from 213.136.79.178 port 35950
2019-09-27 23:35:12
59.25.197.142 attackbots
Sep 27 16:23:36 MK-Soft-VM6 sshd[23203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.142 
Sep 27 16:23:38 MK-Soft-VM6 sshd[23203]: Failed password for invalid user jiang from 59.25.197.142 port 43446 ssh2
...
2019-09-27 23:39:31
54.37.66.73 attackspambots
2019-09-27T14:51:37.855154abusebot-7.cloudsearch.cf sshd\[27935\]: Invalid user elza123 from 54.37.66.73 port 59246
2019-09-28 00:21:49
134.209.147.198 attack
Sep 23 21:58:55 pl1server sshd[10732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198  user=r.r
Sep 23 21:58:56 pl1server sshd[10732]: Failed password for r.r from 134.209.147.198 port 41346 ssh2
Sep 23 21:58:57 pl1server sshd[10732]: Received disconnect from 134.209.147.198: 11: Bye Bye [preauth]
Sep 23 22:09:37 pl1server sshd[13008]: Invalid user yangzhao from 134.209.147.198
Sep 23 22:09:37 pl1server sshd[13008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198
Sep 23 22:09:39 pl1server sshd[13008]: Failed password for invalid user yangzhao from 134.209.147.198 port 47378 ssh2
Sep 23 22:09:39 pl1server sshd[13008]: Received disconnect from 134.209.147.198: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.209.147.198
2019-09-28 00:11:04

最近上报的IP列表

179.56.121.186 36.92.137.153 36.90.40.88 172.104.126.241
223.204.191.164 218.102.242.3 180.195.248.234 117.111.1.222
103.160.133.101 115.196.86.237 205.164.162.28 111.248.161.207
186.224.43.196 168.167.90.115 181.94.226.213 42.225.238.147
186.122.179.80 177.213.49.46 200.194.9.28 162.158.233.14