必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Heilongjiang

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): CHINA UNICOM China169 Backbone

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.3.55.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37408
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.3.55.52.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071400 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 15 03:50:27 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 52.55.3.113.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 52.55.3.113.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.248.147.77 attackbotsspam
leo_www
2019-09-16 09:37:50
85.104.121.76 attackbotsspam
Automatic report - Port Scan Attack
2019-09-16 09:55:57
192.241.141.151 attackspam
Sep 14 02:26:34 xxxxxxx0 sshd[30773]: Invalid user ubnt from 192.241.141.151 port 49836
Sep 14 02:26:36 xxxxxxx0 sshd[30773]: Failed password for invalid user ubnt from 192.241.141.151 port 49836 ssh2
Sep 14 02:30:21 xxxxxxx0 sshd[31418]: Invalid user squid from 192.241.141.151 port 39760
Sep 14 02:30:24 xxxxxxx0 sshd[31418]: Failed password for invalid user squid from 192.241.141.151 port 39760 ssh2
Sep 14 02:34:04 xxxxxxx0 sshd[31989]: Invalid user willshao from 192.241.141.151 port 57496

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=192.241.141.151
2019-09-16 09:19:20
115.213.139.221 attackbots
Lines containing failures of 115.213.139.221
Sep 14 02:57:04 myhost sshd[27483]: User r.r from 115.213.139.221 not allowed because not listed in AllowUsers
Sep 14 02:57:04 myhost sshd[27483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.213.139.221  user=r.r
Sep 14 02:57:06 myhost sshd[27483]: Failed password for invalid user r.r from 115.213.139.221 port 58259 ssh2
Sep 14 02:57:18 myhost sshd[27483]: message repeated 5 serveres: [ Failed password for invalid user r.r from 115.213.139.221 port 58259 ssh2]
Sep 14 02:57:18 myhost sshd[27483]: error: maximum authentication attempts exceeded for invalid user r.r from 115.213.139.221 port 58259 ssh2 [preauth]
Sep 14 02:57:18 myhost sshd[27483]: Disconnecting invalid user r.r 115.213.139.221 port 58259: Too many authentication failures [preauth]
Sep 14 02:57:18 myhost sshd[27483]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.213.139.221  user=........
------------------------------
2019-09-16 09:25:39
106.243.162.3 attack
Sep 16 03:51:19 tux-35-217 sshd\[16096\]: Invalid user admin from 106.243.162.3 port 47079
Sep 16 03:51:19 tux-35-217 sshd\[16096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3
Sep 16 03:51:21 tux-35-217 sshd\[16096\]: Failed password for invalid user admin from 106.243.162.3 port 47079 ssh2
Sep 16 03:56:04 tux-35-217 sshd\[16111\]: Invalid user ve from 106.243.162.3 port 60063
Sep 16 03:56:04 tux-35-217 sshd\[16111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3
...
2019-09-16 10:00:04
49.234.56.201 attackspam
DATE:2019-09-16 03:13:37,IP:49.234.56.201,MATCHES:10,PORT:ssh
2019-09-16 09:32:19
54.191.124.86 attack
Automated report - ssh fail2ban:
Sep 16 02:23:30 authentication failure 
Sep 16 02:23:32 wrong password, user=zhouh, port=36119, ssh2
Sep 16 02:28:02 authentication failure
2019-09-16 09:24:18
185.53.168.160 attack
Rude login attack (16 tries in 1d)
2019-09-16 09:57:23
187.74.122.134 attack
Sep 16 03:06:58 markkoudstaal sshd[16809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.74.122.134
Sep 16 03:07:00 markkoudstaal sshd[16809]: Failed password for invalid user alex from 187.74.122.134 port 44764 ssh2
Sep 16 03:11:46 markkoudstaal sshd[17341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.74.122.134
2019-09-16 09:28:43
51.68.47.45 attack
Sep 16 02:59:01 [host] sshd[483]: Invalid user user from 51.68.47.45
Sep 16 02:59:01 [host] sshd[483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.47.45
Sep 16 02:59:03 [host] sshd[483]: Failed password for invalid user user from 51.68.47.45 port 39890 ssh2
2019-09-16 09:46:55
51.91.36.28 attackspam
Sep 15 23:15:19 XXX sshd[30569]: Invalid user mati from 51.91.36.28 port 56830
2019-09-16 09:42:02
109.194.174.78 attackspam
Sep 16 01:19:09 herz-der-gamer sshd[4451]: Invalid user kh from 109.194.174.78 port 45963
...
2019-09-16 09:45:22
221.4.223.212 attackbotsspam
Sep 16 02:59:02 microserver sshd[29869]: Invalid user canna from 221.4.223.212 port 38455
Sep 16 02:59:02 microserver sshd[29869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.4.223.212
Sep 16 02:59:04 microserver sshd[29869]: Failed password for invalid user canna from 221.4.223.212 port 38455 ssh2
Sep 16 03:04:10 microserver sshd[30550]: Invalid user butter from 221.4.223.212 port 48325
Sep 16 03:04:10 microserver sshd[30550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.4.223.212
Sep 16 03:14:20 microserver sshd[31914]: Invalid user upload1 from 221.4.223.212 port 43073
Sep 16 03:14:20 microserver sshd[31914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.4.223.212
Sep 16 03:14:22 microserver sshd[31914]: Failed password for invalid user upload1 from 221.4.223.212 port 43073 ssh2
Sep 16 03:19:26 microserver sshd[32563]: Invalid user tyson from 221.4.223.212 port 52847
2019-09-16 09:33:51
106.13.87.170 attackspambots
Sep 15 19:18:37 Tower sshd[31792]: Connection from 106.13.87.170 port 43866 on 192.168.10.220 port 22
Sep 15 19:18:38 Tower sshd[31792]: Invalid user sftp from 106.13.87.170 port 43866
Sep 15 19:18:38 Tower sshd[31792]: error: Could not get shadow information for NOUSER
Sep 15 19:18:38 Tower sshd[31792]: Failed password for invalid user sftp from 106.13.87.170 port 43866 ssh2
Sep 15 19:18:38 Tower sshd[31792]: Received disconnect from 106.13.87.170 port 43866:11: Bye Bye [preauth]
Sep 15 19:18:38 Tower sshd[31792]: Disconnected from invalid user sftp 106.13.87.170 port 43866 [preauth]
2019-09-16 09:59:19
54.36.150.42 attackspam
Automatic report - Banned IP Access
2019-09-16 09:52:41

最近上报的IP列表

39.73.95.118 203.170.229.34 118.167.110.47 79.131.5.151
82.179.77.79 158.58.1.214 154.242.210.121 109.129.235.51
191.53.220.168 181.251.34.58 5.231.157.105 124.211.229.99
136.247.17.84 87.123.97.29 238.7.42.189 97.255.100.190
37.123.109.228 222.76.241.253 139.134.104.113 114.231.189.31