必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.55.80.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.55.80.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 13:55:50 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
116.80.55.108.in-addr.arpa domain name pointer pool-108-55-80-116.hrbgpa.east.verizon.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.80.55.108.in-addr.arpa	name = pool-108-55-80-116.hrbgpa.east.verizon.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.112.121.63 attackspambots
Oct 30 23:19:13 localhost sshd\[29731\]: Invalid user oracle from 193.112.121.63 port 41442
Oct 30 23:19:13 localhost sshd\[29731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.121.63
Oct 30 23:19:16 localhost sshd\[29731\]: Failed password for invalid user oracle from 193.112.121.63 port 41442 ssh2
Oct 30 23:23:57 localhost sshd\[29829\]: Invalid user mike from 193.112.121.63 port 52482
Oct 30 23:23:57 localhost sshd\[29829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.121.63
...
2019-10-31 07:34:47
185.216.140.252 attackspam
10/30/2019-19:17:13.117711 185.216.140.252 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-31 07:19:47
121.67.246.141 attackspambots
2019-10-30T22:56:50.403742shield sshd\[19859\]: Invalid user incubus from 121.67.246.141 port 57550
2019-10-30T22:56:50.407948shield sshd\[19859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.246.141
2019-10-30T22:56:52.073524shield sshd\[19859\]: Failed password for invalid user incubus from 121.67.246.141 port 57550 ssh2
2019-10-30T23:01:28.215002shield sshd\[21121\]: Invalid user oirausu from 121.67.246.141 port 39990
2019-10-30T23:01:28.221015shield sshd\[21121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.246.141
2019-10-31 07:01:50
106.12.40.53 attack
Invalid user smtpuser from 106.12.40.53 port 25686
2019-10-31 07:11:32
157.230.57.112 attackspam
Oct 30 22:25:02 icinga sshd[24539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.57.112
Oct 30 22:25:05 icinga sshd[24539]: Failed password for invalid user et from 157.230.57.112 port 44910 ssh2
...
2019-10-31 07:33:32
46.50.83.73 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/46.50.83.73/ 
 
 PT - 1H : (14)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PT 
 NAME ASN : ASN42863 
 
 IP : 46.50.83.73 
 
 CIDR : 46.50.0.0/17 
 
 PREFIX COUNT : 9 
 
 UNIQUE IP COUNT : 254976 
 
 
 ATTACKS DETECTED ASN42863 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-10-30 21:25:05 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-31 07:26:28
106.13.71.133 attackbotsspam
Oct 31 01:22:43 hosting sshd[22798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.71.133  user=root
Oct 31 01:22:44 hosting sshd[22798]: Failed password for root from 106.13.71.133 port 38592 ssh2
...
2019-10-31 07:10:43
161.202.196.81 attackbotsspam
Oct 30 23:23:44 v22019058497090703 sshd[17581]: Failed password for root from 161.202.196.81 port 59366 ssh2
Oct 30 23:28:41 v22019058497090703 sshd[17914]: Failed password for root from 161.202.196.81 port 42638 ssh2
...
2019-10-31 07:36:46
159.203.201.165 attackbotsspam
10/30/2019-21:24:53.650543 159.203.201.165 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-31 07:35:59
185.24.233.168 attackbotsspam
2019-10-30T23:37:17.296427mail01 postfix/smtpd[11430]: warning: 168-233-24-185.static.servebyte.com[185.24.233.168]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T23:38:07.398130mail01 postfix/smtpd[12246]: warning: 168-233-24-185.static.servebyte.com[185.24.233.168]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T23:38:20.097230mail01 postfix/smtpd[11430]: warning: 168-233-24-185.static.servebyte.com[185.24.233.168]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-31 07:00:26
95.217.76.85 attackspam
Automatic report - Banned IP Access
2019-10-31 07:24:39
45.55.15.134 attackbotsspam
2019-10-30T23:02:22.359613abusebot-3.cloudsearch.cf sshd\[2270\]: Invalid user connie from 45.55.15.134 port 35302
2019-10-31 07:31:17
216.10.246.39 attackbots
XMLRPC script access attempt: "GET /xmlrpc.php"
2019-10-31 07:26:44
47.196.188.39 attackbots
scan z
2019-10-31 07:37:51
39.110.250.69 attackspam
2019-10-30T22:54:05.929191abusebot-4.cloudsearch.cf sshd\[1499\]: Invalid user chase from 39.110.250.69 port 38812
2019-10-31 07:02:07

最近上报的IP列表

222.111.168.234 118.68.206.49 27.68.168.97 235.13.213.231
20.60.240.238 7.77.144.162 64.228.86.91 251.211.147.228
68.209.255.145 240.244.150.110 168.151.68.66 251.224.71.3
140.22.183.184 174.61.44.196 79.112.113.22 208.192.132.107
250.78.160.65 70.245.196.204 173.252.87.11 91.124.184.73