必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Kenya

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.55.78.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5141
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.55.78.2.			IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011900 1800 900 604800 86400

;; Query time: 317 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 19:20:52 CST 2020
;; MSG SIZE  rcvd: 115
HOST信息:
Host 2.78.55.105.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.78.55.105.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.80.98.153 attackspambots
Telnet Server BruteForce Attack
2019-11-19 22:55:43
51.254.210.53 attackbots
Nov 19 15:40:41 server sshd\[11258\]: Invalid user hosting from 51.254.210.53
Nov 19 15:40:41 server sshd\[11258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=53.ip-51-254-210.eu 
Nov 19 15:40:43 server sshd\[11258\]: Failed password for invalid user hosting from 51.254.210.53 port 56142 ssh2
Nov 19 16:03:24 server sshd\[16713\]: Invalid user server from 51.254.210.53
Nov 19 16:03:24 server sshd\[16713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=53.ip-51-254-210.eu 
...
2019-11-19 23:04:22
46.153.81.72 attack
Nov 19 13:56:11 mxgate1 postfix/postscreen[7608]: CONNECT from [46.153.81.72]:20017 to [176.31.12.44]:25
Nov 19 13:56:11 mxgate1 postfix/dnsblog[7629]: addr 46.153.81.72 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 19 13:56:11 mxgate1 postfix/dnsblog[7629]: addr 46.153.81.72 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 13:56:11 mxgate1 postfix/dnsblog[7629]: addr 46.153.81.72 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 13:56:11 mxgate1 postfix/dnsblog[7610]: addr 46.153.81.72 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 13:56:17 mxgate1 postfix/postscreen[7608]: DNSBL rank 3 for [46.153.81.72]:20017
Nov x@x
Nov 19 13:56:19 mxgate1 postfix/postscreen[7608]: HANGUP after 1.9 from [46.153.81.72]:20017 in tests after SMTP handshake
Nov 19 13:56:19 mxgate1 postfix/postscreen[7608]: DISCONNECT [46.153.81.72]:20017


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.153.81.72
2019-11-19 23:17:16
168.121.97.209 attackspam
Automatic report - Port Scan Attack
2019-11-19 23:19:14
151.80.75.127 attack
Nov 19 14:19:44  postfix/smtpd: warning: unknown[151.80.75.127]: SASL LOGIN authentication failed
2019-11-19 22:44:56
190.188.100.169 attack
Nov 19 13:48:27 mxgate1 postfix/postscreen[7608]: CONNECT from [190.188.100.169]:13356 to [176.31.12.44]:25
Nov 19 13:48:27 mxgate1 postfix/dnsblog[7610]: addr 190.188.100.169 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 13:48:27 mxgate1 postfix/dnsblog[7610]: addr 190.188.100.169 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 13:48:27 mxgate1 postfix/dnsblog[7611]: addr 190.188.100.169 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 13:48:27 mxgate1 postfix/dnsblog[7612]: addr 190.188.100.169 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 13:48:33 mxgate1 postfix/postscreen[7608]: DNSBL rank 4 for [190.188.100.169]:13356
Nov x@x
Nov 19 13:48:35 mxgate1 postfix/postscreen[7608]: HANGUP after 1.1 from [190.188.100.169]:13356 in tests after SMTP handshake
Nov 19 13:48:35 mxgate1 postfix/postscreen[7608]: DISCONNECT [190.188.100.169]:13356


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.188.100.169
2019-11-19 23:00:06
41.33.205.10 attackspambots
IMAP brute force
...
2019-11-19 23:19:58
58.71.213.75 attackspambots
Automatic report - Port Scan Attack
2019-11-19 23:14:56
5.53.125.32 attackbotsspam
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.53.125.32
2019-11-19 22:54:52
139.155.45.196 attackspam
Nov  9 05:55:26 vtv3 sshd[6681]: Invalid user unix123456 from 139.155.45.196 port 36464
Nov  9 05:55:26 vtv3 sshd[6681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.45.196
Nov  9 05:55:28 vtv3 sshd[6681]: Failed password for invalid user unix123456 from 139.155.45.196 port 36464 ssh2
Nov  9 05:59:46 vtv3 sshd[8670]: Invalid user zeidc112233 from 139.155.45.196 port 37430
Nov  9 05:59:46 vtv3 sshd[8670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.45.196
Nov 19 12:55:06 vtv3 sshd[656]: Failed password for backup from 139.155.45.196 port 50234 ssh2
Nov 19 13:01:54 vtv3 sshd[2748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.45.196 
Nov 19 13:01:56 vtv3 sshd[2748]: Failed password for invalid user vadnais from 139.155.45.196 port 40956 ssh2
Nov 19 13:16:04 vtv3 sshd[6639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost
2019-11-19 23:04:43
140.143.198.170 attack
Nov 19 13:31:49 venus sshd\[12220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.198.170  user=root
Nov 19 13:31:50 venus sshd\[12220\]: Failed password for root from 140.143.198.170 port 48918 ssh2
Nov 19 13:37:31 venus sshd\[12312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.198.170  user=games
...
2019-11-19 22:54:08
109.60.62.29 attackspambots
Nov 19 13:47:47 mxgate1 postfix/postscreen[7608]: CONNECT from [109.60.62.29]:13104 to [176.31.12.44]:25
Nov 19 13:47:47 mxgate1 postfix/dnsblog[7610]: addr 109.60.62.29 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 13:47:47 mxgate1 postfix/dnsblog[7610]: addr 109.60.62.29 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 13:47:47 mxgate1 postfix/dnsblog[7629]: addr 109.60.62.29 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 13:47:47 mxgate1 postfix/dnsblog[7611]: addr 109.60.62.29 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 13:47:53 mxgate1 postfix/postscreen[7608]: DNSBL rank 4 for [109.60.62.29]:13104
Nov x@x
Nov 19 13:47:54 mxgate1 postfix/postscreen[7608]: HANGUP after 0.42 from [109.60.62.29]:13104 in tests after SMTP handshake
Nov 19 13:47:54 mxgate1 postfix/postscreen[7608]: DISCONNECT [109.60.62.29]:13104


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=109.60.62.29
2019-11-19 22:56:49
117.196.6.39 attack
Nov 19 13:03:34 netserv300 sshd[16305]: Connection from 117.196.6.39 port 61543 on 178.63.236.21 port 22
Nov 19 13:03:34 netserv300 sshd[16306]: Connection from 117.196.6.39 port 61541 on 178.63.236.19 port 22
Nov 19 13:03:34 netserv300 sshd[16307]: Connection from 117.196.6.39 port 61542 on 178.63.236.20 port 22
Nov 19 13:03:34 netserv300 sshd[16308]: Connection from 117.196.6.39 port 61544 on 178.63.236.22 port 22
Nov 19 13:03:34 netserv300 sshd[16309]: Connection from 117.196.6.39 port 61539 on 178.63.236.17 port 22
Nov 19 13:03:34 netserv300 sshd[16310]: Connection from 117.196.6.39 port 61538 on 178.63.236.16 port 22
Nov 19 13:03:48 netserv300 sshd[16311]: Connection from 117.196.6.39 port 49242 on 178.63.236.22 port 22
Nov 19 13:03:48 netserv300 sshd[16312]: Connection from 117.196.6.39 port 49250 on 178.63.236.20 port 22
Nov 19 13:03:48 netserv300 sshd[16313]: Connection from 117.196.6.39 port 49252 on 178.63.236.16 port 22
Nov 19 13:03:51 netserv300 sshd[16314]: ........
------------------------------
2019-11-19 22:54:32
68.183.160.63 attack
2019-11-19T15:06:26.583052shield sshd\[31374\]: Invalid user localhost from 68.183.160.63 port 60982
2019-11-19T15:06:26.587237shield sshd\[31374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-19T15:06:28.226192shield sshd\[31374\]: Failed password for invalid user localhost from 68.183.160.63 port 60982 ssh2
2019-11-19T15:10:29.203806shield sshd\[31693\]: Invalid user huangkun from 68.183.160.63 port 48918
2019-11-19T15:10:29.208273shield sshd\[31693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-19 23:22:05
139.155.33.169 attackspambots
Nov 19 02:57:57 sachi sshd\[924\]: Invalid user ned from 139.155.33.169
Nov 19 02:57:57 sachi sshd\[924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.33.169
Nov 19 02:57:59 sachi sshd\[924\]: Failed password for invalid user ned from 139.155.33.169 port 42930 ssh2
Nov 19 03:03:21 sachi sshd\[1371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.33.169  user=root
Nov 19 03:03:23 sachi sshd\[1371\]: Failed password for root from 139.155.33.169 port 51224 ssh2
2019-11-19 23:03:34

最近上报的IP列表

68.28.31.30 137.6.186.187 27.214.82.236 213.4.137.100
14.170.212.23 72.63.205.149 60.101.228.225 129.18.195.121
2.179.111.242 79.218.191.76 26.82.215.211 210.217.103.96
54.96.9.227 4.53.126.98 84.122.95.51 221.181.197.226
221.2.136.7 217.165.85.231 190.1.137.18 104.145.204.14