必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tashkent

省份(region): Toshkent city

国家(country): Uzbekistan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.154.128.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.154.128.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 174 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 18:43:01 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 164.128.154.94.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.128.154.94.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.159.39.30 attackbotsspam
Invalid user xiong from 115.159.39.30 port 37566
2019-07-13 14:21:31
45.55.41.232 attack
Invalid user wolf from 45.55.41.232 port 43848
2019-07-13 14:31:53
144.217.203.148 attackspambots
Invalid user phpmyadmin from 144.217.203.148 port 31628
2019-07-13 14:51:02
106.251.239.244 attackbotsspam
2019-07-13T06:09:05.059803abusebot-2.cloudsearch.cf sshd\[18774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.251.239.244  user=root
2019-07-13 14:23:49
193.70.43.220 attack
Invalid user jira from 193.70.43.220 port 60610
2019-07-13 14:39:58
47.47.72.68 attack
Invalid user testuser from 47.47.72.68 port 35642
2019-07-13 15:09:34
104.248.255.118 attack
Jul 13 06:57:32 sshgateway sshd\[20859\]: Invalid user karen from 104.248.255.118
Jul 13 06:57:32 sshgateway sshd\[20859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.255.118
Jul 13 06:57:34 sshgateway sshd\[20859\]: Failed password for invalid user karen from 104.248.255.118 port 54246 ssh2
2019-07-13 15:00:05
187.85.9.154 attack
Invalid user testtest from 187.85.9.154 port 47879
2019-07-13 14:42:49
131.117.215.84 attackbots
Invalid user teamspeak3 from 131.117.215.84 port 36372
2019-07-13 14:53:06
79.2.138.202 attack
Jul 13 08:54:01 MK-Soft-Root1 sshd\[19134\]: Invalid user user from 79.2.138.202 port 65001
Jul 13 08:54:01 MK-Soft-Root1 sshd\[19134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.2.138.202
Jul 13 08:54:02 MK-Soft-Root1 sshd\[19134\]: Failed password for invalid user user from 79.2.138.202 port 65001 ssh2
...
2019-07-13 15:05:52
46.101.163.220 attackspambots
Jul 13 08:46:57 nextcloud sshd\[1960\]: Invalid user card from 46.101.163.220
Jul 13 08:46:57 nextcloud sshd\[1960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.163.220
Jul 13 08:46:59 nextcloud sshd\[1960\]: Failed password for invalid user card from 46.101.163.220 port 46382 ssh2
...
2019-07-13 15:10:30
121.152.165.213 attack
2019-07-13T05:53:53.165412abusebot-3.cloudsearch.cf sshd\[22522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.152.165.213  user=root
2019-07-13 14:54:15
134.175.39.108 attackspam
Invalid user management from 134.175.39.108 port 49208
2019-07-13 14:15:08
1.9.46.177 attackspambots
Invalid user weblogic from 1.9.46.177 port 59748
2019-07-13 14:35:35
179.49.57.154 attack
Jul 13 07:25:40 icinga sshd[27669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.49.57.154
Jul 13 07:25:41 icinga sshd[27669]: Failed password for invalid user enterprise from 179.49.57.154 port 41380 ssh2
...
2019-07-13 14:46:07

最近上报的IP列表

198.236.228.51 101.216.102.33 59.180.186.228 6.211.226.66
195.116.224.225 193.105.28.131 189.164.143.96 223.110.21.217
238.167.130.249 16.194.223.238 143.229.46.97 67.252.233.4
221.247.110.152 101.170.75.244 190.81.226.117 55.137.154.177
178.102.177.67 5.1.225.27 67.217.246.195 205.199.242.24