必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.119.34.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.119.34.55.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 14:10:43 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 55.34.119.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.34.119.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.55.225.121 attackspam
Jul2610:52:07server4dovecot:imap-login:Disconnected\(authfailed\,1attemptsin6secs\):user=\\,method=PLAIN\,rip=213.55.225.121\,lip=148.251.104.70\,TLS\,session=\Jul2610:52:17server4dovecot:imap-login:Disconnected\(authfailed\,1attemptsin2secs\):user=\\,method=PLAIN\,rip=213.55.225.121\,lip=148.251.104.70\,TLS\,session=\Jul2610:52:20server4dovecot:imap-login:Disconnected\(authfailed\,1attemptsin2secs\):user=\\,method=PLAIN\,rip=213.55.225.121\,lip=148.251.104.70\,TLS\,session=\Jul2610:52:20server4dovecot:imap-login:Disconnected\(authfailed\,1attemptsin12secs\):user=\\,method=PLAIN\,rip=213.55.225.121\,lip=148.251.104.70\,TLS:read\(size=344\)failed:Connectionresetbypeer\,session=\Jul2610:52:20server4dovecot:imap-login:Disconnected\(authfailed\,1attemptsin22secs\):user=\\,method=PLAIN\,rip=213.55.225.121\,lip=1
2019-07-26 17:21:38
62.182.201.103 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 22:04:58,484 INFO [amun_request_handler] PortScan Detected on Port: 445 (62.182.201.103)
2019-07-26 16:28:48
110.92.118.195 attackbotsspam
firewall-block, port(s): 445/tcp
2019-07-26 16:56:42
51.77.148.57 attackbots
2019-07-26T00:59:23.840620centos sshd\[17265\]: Invalid user nan from 51.77.148.57 port 47924
2019-07-26T00:59:23.846720centos sshd\[17265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=57.ip-51-77-148.eu
2019-07-26T00:59:25.031476centos sshd\[17265\]: Failed password for invalid user nan from 51.77.148.57 port 47924 ssh2
2019-07-26 16:37:35
78.189.187.108 attackbotsspam
Automatic report - Port Scan Attack
2019-07-26 17:07:51
179.184.217.83 attack
SSH Brute-Force reported by Fail2Ban
2019-07-26 16:41:02
159.89.177.46 attack
Jul 26 03:50:41 aat-srv002 sshd[9031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.177.46
Jul 26 03:50:42 aat-srv002 sshd[9031]: Failed password for invalid user nagios from 159.89.177.46 port 54522 ssh2
Jul 26 03:54:53 aat-srv002 sshd[9169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.177.46
Jul 26 03:54:55 aat-srv002 sshd[9169]: Failed password for invalid user gal from 159.89.177.46 port 48634 ssh2
...
2019-07-26 17:07:16
185.22.60.82 attack
Jul 26 00:56:16 xb3 sshd[5242]: reveeclipse mapping checking getaddrinfo for 185-22-60-82.flops.ru [185.22.60.82] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 26 00:56:19 xb3 sshd[5242]: Failed password for invalid user harry from 185.22.60.82 port 49006 ssh2
Jul 26 00:56:19 xb3 sshd[5242]: Received disconnect from 185.22.60.82: 11: Bye Bye [preauth]
Jul 26 01:02:55 xb3 sshd[21573]: reveeclipse mapping checking getaddrinfo for 185-22-60-82.flops.ru [185.22.60.82] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 26 01:02:57 xb3 sshd[21573]: Failed password for invalid user tomek from 185.22.60.82 port 40536 ssh2
Jul 26 01:02:57 xb3 sshd[21573]: Received disconnect from 185.22.60.82: 11: Bye Bye [preauth]
Jul 26 01:11:32 xb3 sshd[16239]: reveeclipse mapping checking getaddrinfo for 185-22-60-82.flops.ru [185.22.60.82] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 26 01:11:34 xb3 sshd[16239]: Failed password for invalid user demo from 185.22.60.82 port 33086 ssh2
Jul 26 01:11:34 xb3 sshd[1623........
-------------------------------
2019-07-26 16:52:06
134.209.155.245 attackspambots
Honeypot triggered via portsentry
2019-07-26 17:19:43
49.88.112.56 attackbotsspam
Jul 26 10:00:37 s1 sshd\[15043\]: User root from 49.88.112.56 not allowed because not listed in AllowUsers
Jul 26 10:00:37 s1 sshd\[15043\]: Failed password for invalid user root from 49.88.112.56 port 18568 ssh2
Jul 26 10:00:38 s1 sshd\[15043\]: Failed password for invalid user root from 49.88.112.56 port 18568 ssh2
Jul 26 10:00:39 s1 sshd\[15043\]: Failed password for invalid user root from 49.88.112.56 port 18568 ssh2
Jul 26 10:00:40 s1 sshd\[15043\]: Failed password for invalid user root from 49.88.112.56 port 18568 ssh2
Jul 26 10:00:41 s1 sshd\[15043\]: Failed password for invalid user root from 49.88.112.56 port 18568 ssh2
...
2019-07-26 16:35:50
153.36.240.126 attackbots
Jul 26 16:08:14 webhost01 sshd[20673]: Failed password for root from 153.36.240.126 port 36180 ssh2
...
2019-07-26 17:14:52
184.105.247.220 attack
3389BruteforceFW21
2019-07-26 17:27:21
49.88.112.64 attackspambots
Jul 26 02:34:04 plusreed sshd[9075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.64  user=root
Jul 26 02:34:06 plusreed sshd[9075]: Failed password for root from 49.88.112.64 port 34508 ssh2
Jul 26 02:34:09 plusreed sshd[9075]: Failed password for root from 49.88.112.64 port 34508 ssh2
Jul 26 02:34:04 plusreed sshd[9075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.64  user=root
Jul 26 02:34:06 plusreed sshd[9075]: Failed password for root from 49.88.112.64 port 34508 ssh2
Jul 26 02:34:09 plusreed sshd[9075]: Failed password for root from 49.88.112.64 port 34508 ssh2
Jul 26 02:34:04 plusreed sshd[9075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.64  user=root
Jul 26 02:34:06 plusreed sshd[9075]: Failed password for root from 49.88.112.64 port 34508 ssh2
Jul 26 02:34:09 plusreed sshd[9075]: Failed password for root from 49.88.112.64 port 34508 ssh2
J
2019-07-26 16:41:33
107.77.248.114 attackspambots
Jul 26 10:52:24 mxgate1 postfix/postscreen[20768]: CONNECT from [107.77.248.114]:6175 to [176.31.12.44]:25
Jul 26 10:52:24 mxgate1 postfix/dnsblog[21012]: addr 107.77.248.114 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 26 10:52:24 mxgate1 postfix/dnsblog[21009]: addr 107.77.248.114 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 26 10:52:24 mxgate1 postfix/dnsblog[21009]: addr 107.77.248.114 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 26 10:52:24 mxgate1 postfix/dnsblog[21011]: addr 107.77.248.114 listed by domain bl.spamcop.net as 127.0.0.2
Jul 26 10:52:24 mxgate1 postfix/dnsblog[20886]: addr 107.77.248.114 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 26 10:52:30 mxgate1 postfix/postscreen[20768]: DNSBL rank 5 for [107.77.248.114]:6175
Jul x@x
Jul 26 10:52:31 mxgate1 postfix/postscreen[20768]: HANGUP after 0.96 from [107.77.248.114]:6175 in tests after SMTP handshake
Jul 26 10:52:31 mxgate1 postfix/postscreen[20768]: DISCONNECT [107.77.248.........
-------------------------------
2019-07-26 17:23:17
31.17.27.67 attack
Jul 26 10:29:43 srv03 sshd\[9427\]: Invalid user search from 31.17.27.67 port 46790
Jul 26 10:29:43 srv03 sshd\[9427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.17.27.67
Jul 26 10:29:46 srv03 sshd\[9427\]: Failed password for invalid user search from 31.17.27.67 port 46790 ssh2
2019-07-26 16:53:57

最近上报的IP列表

245.249.42.12 66.127.83.20 56.239.8.194 59.113.232.246
215.100.229.251 185.212.209.253 202.202.82.20 44.113.111.43
216.174.215.255 19.79.72.118 160.4.175.5 216.63.185.40
132.61.96.165 218.192.134.124 243.219.152.246 146.85.119.161
52.162.45.64 230.35.114.25 94.214.63.201 142.194.238.71