必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Bangladesh

运营商(isp): Virgo Communication Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbots
1588670417 - 05/05/2020 11:20:17 Host: 106.0.55.146/106.0.55.146 Port: 445 TCP Blocked
2020-05-05 18:20:33
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.0.55.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.0.55.146.			IN	A

;; AUTHORITY SECTION:
.			562	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050500 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 18:20:28 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
Host 146.55.0.106.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 146.55.0.106.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.50.159.131 attack
Oct 12 18:23:00 vpn01 sshd[15979]: Failed password for root from 198.50.159.131 port 38982 ssh2
...
2019-10-13 06:18:57
40.112.248.127 attackspam
Oct 12 15:28:34 game-panel sshd[13039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.248.127
Oct 12 15:28:36 game-panel sshd[13039]: Failed password for invalid user 0okm(IJN8uhb from 40.112.248.127 port 49792 ssh2
Oct 12 15:32:13 game-panel sshd[13156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.248.127
2019-10-13 06:04:30
92.242.44.146 attackbotsspam
2019-10-12T17:36:44.655328abusebot-2.cloudsearch.cf sshd\[23124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.44.146  user=root
2019-10-13 06:21:31
193.70.37.140 attack
Oct 12 06:18:01 eddieflores sshd\[23378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.ip-193-70-37.eu  user=root
Oct 12 06:18:03 eddieflores sshd\[23378\]: Failed password for root from 193.70.37.140 port 55192 ssh2
Oct 12 06:22:14 eddieflores sshd\[23708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.ip-193-70-37.eu  user=root
Oct 12 06:22:16 eddieflores sshd\[23708\]: Failed password for root from 193.70.37.140 port 38012 ssh2
Oct 12 06:26:13 eddieflores sshd\[24818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.ip-193-70-37.eu  user=root
2019-10-13 05:55:06
51.83.32.232 attackspambots
Automatic report - Banned IP Access
2019-10-13 06:16:15
119.250.50.63 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/119.250.50.63/ 
 CN - 1H : (436)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 119.250.50.63 
 
 CIDR : 119.248.0.0/14 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 WYKRYTE ATAKI Z ASN4837 :  
  1H - 4 
  3H - 20 
  6H - 36 
 12H - 77 
 24H - 167 
 
 DateTime : 2019-10-12 16:05:04 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-13 05:58:30
185.195.237.117 attackbots
Oct 12 23:02:59 vpn01 sshd[6513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.195.237.117
Oct 12 23:03:00 vpn01 sshd[6513]: Failed password for invalid user cirros from 185.195.237.117 port 34200 ssh2
...
2019-10-13 06:22:44
185.136.207.194 attackspam
WordPress wp-login brute force :: 185.136.207.194 0.120 BYPASS [13/Oct/2019:01:04:12  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-13 06:24:58
110.136.165.7 attack
110.136.165.7 - Admin1 \[12/Oct/2019:07:04:30 -0700\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 25110.136.165.7 - - \[12/Oct/2019:07:04:30 -0700\] "POST /index.php/admin HTTP/1.1" 404 20595110.136.165.7 - - \[12/Oct/2019:07:04:30 -0700\] "POST /index.php/admin/sales_order/ HTTP/1.1" 404 20647
...
2019-10-13 06:17:14
42.159.121.111 attack
Oct 12 09:34:28 home sshd[31667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.121.111  user=root
Oct 12 09:34:31 home sshd[31667]: Failed password for root from 42.159.121.111 port 45560 ssh2
Oct 12 09:45:10 home sshd[31732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.121.111  user=root
Oct 12 09:45:13 home sshd[31732]: Failed password for root from 42.159.121.111 port 11786 ssh2
Oct 12 09:50:09 home sshd[31785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.121.111  user=root
Oct 12 09:50:10 home sshd[31785]: Failed password for root from 42.159.121.111 port 48678 ssh2
Oct 12 09:55:01 home sshd[31845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.121.111  user=root
Oct 12 09:55:02 home sshd[31845]: Failed password for root from 42.159.121.111 port 21572 ssh2
Oct 12 09:59:39 home sshd[31914]: pam_unix(sshd:auth
2019-10-13 06:03:51
120.29.57.199 attackspam
Oct 12 14:04:16 system,error,critical: login failure for user admin from 120.29.57.199 via telnet
Oct 12 14:04:21 system,error,critical: login failure for user root from 120.29.57.199 via telnet
Oct 12 14:04:23 system,error,critical: login failure for user admin from 120.29.57.199 via telnet
Oct 12 14:04:26 system,error,critical: login failure for user root from 120.29.57.199 via telnet
Oct 12 14:04:27 system,error,critical: login failure for user root from 120.29.57.199 via telnet
Oct 12 14:04:29 system,error,critical: login failure for user root from 120.29.57.199 via telnet
Oct 12 14:04:32 system,error,critical: login failure for user root from 120.29.57.199 via telnet
Oct 12 14:04:34 system,error,critical: login failure for user root from 120.29.57.199 via telnet
Oct 12 14:04:35 system,error,critical: login failure for user admin from 120.29.57.199 via telnet
Oct 12 14:04:39 system,error,critical: login failure for user root from 120.29.57.199 via telnet
2019-10-13 06:12:16
77.52.212.76 attackbots
Port 1433 Scan
2019-10-13 06:16:57
51.38.176.147 attackbotsspam
Oct 11 08:24:42 mail sshd[22290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.176.147  user=root
Oct 11 08:24:44 mail sshd[22290]: Failed password for root from 51.38.176.147 port 58370 ssh2
Oct 11 08:31:58 mail sshd[1212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.176.147  user=root
Oct 11 08:31:59 mail sshd[1212]: Failed password for root from 51.38.176.147 port 59709 ssh2
Oct 11 08:35:32 mail sshd[6959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.176.147  user=root
Oct 11 08:35:34 mail sshd[6959]: Failed password for root from 51.38.176.147 port 50858 ssh2
...
2019-10-13 06:26:43
43.245.223.179 attackspam
WordPress brute force
2019-10-13 06:09:47
89.16.134.68 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/89.16.134.68/ 
 DE - 1H : (60)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DE 
 NAME ASN : ASN20880 
 
 IP : 89.16.134.68 
 
 CIDR : 89.16.128.0/19 
 
 PREFIX COUNT : 12 
 
 UNIQUE IP COUNT : 140288 
 
 
 WYKRYTE ATAKI Z ASN20880 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-10-12 16:05:04 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-13 06:02:10

最近上报的IP列表

176.103.108.239 104.201.114.62 183.89.238.224 161.35.43.46
112.135.79.110 98.144.22.81 114.113.227.162 81.28.104.4
112.212.168.31 103.82.81.110 23.236.217.19 183.88.17.10
103.99.17.119 78.128.40.156 5.36.92.36 198.54.125.78
92.39.54.249 6.198.41.234 62.78.85.127 14.51.29.46