必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Verizon

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.8.55.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38301
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.8.55.80.			IN	A

;; AUTHORITY SECTION:
.			549	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 08:10:39 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
80.55.8.108.in-addr.arpa domain name pointer pool-108-8-55-80.slsbmd.east.verizon.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.55.8.108.in-addr.arpa	name = pool-108-8-55-80.slsbmd.east.verizon.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
211.195.12.33 attack
Oct 24 10:11:26 localhost sshd\[125741\]: Invalid user steam from 211.195.12.33 port 53936
Oct 24 10:11:26 localhost sshd\[125741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33
Oct 24 10:11:28 localhost sshd\[125741\]: Failed password for invalid user steam from 211.195.12.33 port 53936 ssh2
Oct 24 10:16:17 localhost sshd\[125891\]: Invalid user user8 from 211.195.12.33 port 45413
Oct 24 10:16:17 localhost sshd\[125891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33
...
2019-10-24 19:03:06
94.23.198.73 attack
$f2bV_matches
2019-10-24 18:57:42
117.102.176.226 attackspam
Oct 24 08:20:28 giegler sshd[24612]: Invalid user 1qaz@WSX$RFV from 117.102.176.226 port 55950
2019-10-24 18:40:00
213.87.135.105 attack
Lines containing failures of 213.87.135.105
Oct 24 05:41:24 hwd04 sshd[18671]: Invalid user oracle from 213.87.135.105 port 19364
Oct 24 05:41:24 hwd04 sshd[18671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.135.105
Oct 24 05:41:26 hwd04 sshd[18671]: Failed password for invalid user oracle from 213.87.135.105 port 19364 ssh2
Oct 24 05:41:26 hwd04 sshd[18671]: Received disconnect from 213.87.135.105 port 19364:11: Bye Bye [preauth]
Oct 24 05:41:26 hwd04 sshd[18671]: Disconnected from invalid user oracle 213.87.135.105 port 19364 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.87.135.105
2019-10-24 18:42:47
42.56.236.201 attack
Automatic report - Port Scan Attack
2019-10-24 18:50:58
66.198.240.8 attack
Automatic report - XMLRPC Attack
2019-10-24 19:03:24
91.121.172.194 attackbots
$f2bV_matches
2019-10-24 18:46:35
51.77.147.51 attackspambots
Oct 24 11:50:17 www sshd\[31530\]: Invalid user abrahamsen from 51.77.147.51 port 46116
...
2019-10-24 19:01:34
37.187.12.126 attack
2019-10-24T10:14:48.213212scmdmz1 sshd\[21821\]: Invalid user ffff from 37.187.12.126 port 49606
2019-10-24T10:14:48.215940scmdmz1 sshd\[21821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns370719.ip-37-187-12.eu
2019-10-24T10:14:50.021110scmdmz1 sshd\[21821\]: Failed password for invalid user ffff from 37.187.12.126 port 49606 ssh2
...
2019-10-24 18:29:57
31.184.215.236 attack
10/23/2019-23:45:06.526912 31.184.215.236 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 21
2019-10-24 18:55:35
36.255.253.89 attackspam
Oct 23 14:39:29 serwer sshd\[12825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.253.89  user=root
Oct 23 14:39:31 serwer sshd\[12825\]: Failed password for root from 36.255.253.89 port 49876 ssh2
Oct 23 14:44:10 serwer sshd\[13375\]: Invalid user odroid from 36.255.253.89 port 33152
Oct 23 14:44:10 serwer sshd\[13375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.253.89
Oct 23 14:44:12 serwer sshd\[13375\]: Failed password for invalid user odroid from 36.255.253.89 port 33152 ssh2
Oct 23 14:48:46 serwer sshd\[13819\]: Invalid user ali from 36.255.253.89 port 44660
Oct 23 14:48:46 serwer sshd\[13819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.255.253.89
Oct 23 14:48:48 serwer sshd\[13819\]: Failed password for invalid user ali from 36.255.253.89 port 44660 ssh2
Oct 23 14:53:14 serwer sshd\[14364\]: pam_unix\(sshd:auth\): authe
...
2019-10-24 18:55:04
104.168.243.80 attack
Oct 22 08:35:18 mxgate1 postfix/postscreen[29065]: CONNECT from [104.168.243.80]:45310 to [176.31.12.44]:25
Oct 22 08:35:18 mxgate1 postfix/dnsblog[29066]: addr 104.168.243.80 listed by domain b.barracudacentral.org as 127.0.0.2
Oct 22 08:35:24 mxgate1 postfix/postscreen[30288]: PASS NEW [104.168.243.80]:45310
Oct 22 08:35:27 mxgate1 postfix/smtpd[30333]: connect from slot0.violetpisces.com[104.168.243.80]
Oct x@x
Oct 22 08:35:28 mxgate1 postfix/smtpd[30333]: disconnect from slot0.violetpisces.com[104.168.243.80] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 commands=5/6
Oct 22 08:45:27 mxgate1 postfix/anvil[30340]: statistics: max connection rate 1/60s for (smtpd:104.168.243.80) at Oct 22 08:35:27
Oct 22 08:45:27 mxgate1 postfix/anvil[30340]: statistics: max connection count 1 for (smtpd:104.168.243.80) at Oct 22 08:35:27
Oct 22 08:45:27 mxgate1 postfix/anvil[30340]: statistics: max message rate 1/60s for (smtpd:104.168.243.80) at Oct 22 08:35:28
Oct 22 09:05:29 mxgat........
-------------------------------
2019-10-24 18:34:50
198.199.84.154 attackbots
Oct 24 07:09:27 firewall sshd[32395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154  user=root
Oct 24 07:09:29 firewall sshd[32395]: Failed password for root from 198.199.84.154 port 54656 ssh2
Oct 24 07:13:03 firewall sshd[32479]: Invalid user whipper from 198.199.84.154
...
2019-10-24 18:35:31
138.197.140.184 attackspambots
2019-10-24T10:49:22.411433abusebot-5.cloudsearch.cf sshd\[18700\]: Invalid user user1 from 138.197.140.184 port 59672
2019-10-24 18:49:26
189.169.132.105 attackspam
$f2bV_matches
2019-10-24 18:47:56

最近上报的IP列表

131.108.53.225 222.175.182.115 134.2.4.245 48.69.44.71
144.0.121.95 35.180.249.215 220.197.198.165 214.212.149.146
89.127.230.68 119.226.45.75 45.200.171.179 134.6.106.206
59.74.45.59 196.243.51.49 247.217.144.152 72.112.177.85
200.201.170.234 57.6.166.149 253.33.103.21 174.71.85.249