必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.221.54.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54307
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.221.54.17.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 10:40:56 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
17.54.221.94.in-addr.arpa domain name pointer dslb-094-221-054-017.094.221.pools.vodafone-ip.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
17.54.221.94.in-addr.arpa	name = dslb-094-221-054-017.094.221.pools.vodafone-ip.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
189.213.109.57 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-07 17:49:59
180.247.157.186 attack
SMB Server BruteForce Attack
2019-11-07 17:49:25
40.73.59.55 attackspam
Nov  7 09:03:32 localhost sshd\[20233\]: Invalid user sequnce from 40.73.59.55
Nov  7 09:03:32 localhost sshd\[20233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.59.55
Nov  7 09:03:34 localhost sshd\[20233\]: Failed password for invalid user sequnce from 40.73.59.55 port 34320 ssh2
Nov  7 09:08:15 localhost sshd\[20576\]: Invalid user tabito from 40.73.59.55
Nov  7 09:08:15 localhost sshd\[20576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.59.55
...
2019-11-07 18:03:44
91.121.9.92 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-11-07 17:52:35
45.125.66.31 attackspambots
\[2019-11-07 04:54:23\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T04:54:23.113-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="719401148178599002",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.31/64487",ACLName="no_extension_match"
\[2019-11-07 04:54:43\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T04:54:43.061-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="389201148483829004",SessionID="0x7fdf2c6a6f18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.31/56339",ACLName="no_extension_match"
\[2019-11-07 04:55:20\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T04:55:20.163-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="49101148163072004",SessionID="0x7fdf2c6a6f18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.31/50605",ACLName="n
2019-11-07 17:57:07
85.154.119.106 attackbots
until 2019-11-06T21:38:19+00:00, observations: 2, bad account names: 1
2019-11-07 17:52:52
201.149.22.37 attackspambots
Nov  7 09:12:17 server sshd\[4807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.22.37  user=root
Nov  7 09:12:19 server sshd\[4807\]: Failed password for root from 201.149.22.37 port 37282 ssh2
Nov  7 09:22:28 server sshd\[7317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.22.37  user=root
Nov  7 09:22:30 server sshd\[7317\]: Failed password for root from 201.149.22.37 port 38542 ssh2
Nov  7 09:26:11 server sshd\[8409\]: Invalid user pi from 201.149.22.37
...
2019-11-07 17:52:23
35.158.31.154 attack
syn dos attack on port 443
2019-11-07 17:42:09
159.203.201.211 attackspambots
159.203.201.211 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5901,7001. Incident counter (4h, 24h, all-time): 5, 17, 27
2019-11-07 17:36:56
13.57.137.162 attackspambots
Nov  7 10:54:00 dedicated sshd[21472]: Invalid user raspberry from 13.57.137.162 port 32986
2019-11-07 18:01:26
107.161.91.46 attackspambots
Triggered by Fail2Ban at Ares web server
2019-11-07 18:14:38
159.203.201.26 attack
159.203.201.26 was recorded 5 times by 5 hosts attempting to connect to the following ports: 7001. Incident counter (4h, 24h, all-time): 5, 5, 12
2019-11-07 18:07:33
51.68.142.106 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/51.68.142.106/ 
 
 FR - 1H : (48)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN16276 
 
 IP : 51.68.142.106 
 
 CIDR : 51.68.0.0/16 
 
 PREFIX COUNT : 132 
 
 UNIQUE IP COUNT : 3052544 
 
 
 ATTACKS DETECTED ASN16276 :  
  1H - 4 
  3H - 5 
  6H - 7 
 12H - 14 
 24H - 25 
 
 DateTime : 2019-11-07 07:26:36 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-11-07 17:36:06
222.186.173.154 attack
Nov  6 23:44:10 web1 sshd\[23609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Nov  6 23:44:12 web1 sshd\[23609\]: Failed password for root from 222.186.173.154 port 49924 ssh2
Nov  6 23:44:16 web1 sshd\[23609\]: Failed password for root from 222.186.173.154 port 49924 ssh2
Nov  6 23:44:19 web1 sshd\[23609\]: Failed password for root from 222.186.173.154 port 49924 ssh2
Nov  6 23:44:23 web1 sshd\[23609\]: Failed password for root from 222.186.173.154 port 49924 ssh2
2019-11-07 17:46:02
80.151.61.108 attackbotsspam
2019-11-05T06:38:58.551315www.arvenenaske.de sshd[1061837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.61.108  user=r.r
2019-11-05T06:39:00.979832www.arvenenaske.de sshd[1061837]: Failed password for r.r from 80.151.61.108 port 19944 ssh2
2019-11-05T06:42:41.239090www.arvenenaske.de sshd[1061873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.61.108  user=r.r
2019-11-05T06:42:42.949739www.arvenenaske.de sshd[1061873]: Failed password for r.r from 80.151.61.108 port 28437 ssh2
2019-11-05T06:46:25.767273www.arvenenaske.de sshd[1061907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.61.108  user=r.r
2019-11-05T06:46:27.563225www.arvenenaske.de sshd[1061907]: Failed password for r.r from 80.151.61.108 port 19156 ssh2
2019-11-05T06:50:06.131044www.arvenenaske.de sshd[1061944]: Invalid user ic1 from 80.151.61.108 port 37133
2019-........
------------------------------
2019-11-07 18:10:22

最近上报的IP列表

171.157.56.141 99.65.156.12 186.131.102.245 7.188.249.177
233.183.181.203 225.158.182.198 210.37.79.2 200.183.222.211
67.81.19.247 142.116.129.145 63.194.34.156 227.44.245.120
116.28.78.4 119.109.229.119 219.29.8.122 93.81.27.247
57.48.75.149 113.97.200.176 48.141.166.155 96.5.91.125