必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.137.55.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36231
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.137.55.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 10:39:51 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
113.55.137.118.in-addr.arpa domain name pointer fm-dyn-118-137-55-113.fast.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.55.137.118.in-addr.arpa	name = fm-dyn-118-137-55-113.fast.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.243.128.49 attackbotsspam
Tried our host z.
2020-09-21 08:04:56
66.154.79.242 attack
Port scan followed by SSH.
2020-09-21 08:01:05
106.12.16.2 attack
SSH Brute Force
2020-09-21 12:06:25
121.190.3.139 attack
Brute-force attempt banned
2020-09-21 08:03:13
2.57.122.214 attackbotsspam
SP-Scan 53551:23 detected 2020.09.20 01:41:02
blocked until 2020.11.08 17:43:49
2020-09-21 12:24:16
64.225.119.100 attackspam
Failed password for root from 64.225.119.100 port 36374 ssh2
2020-09-21 12:28:14
70.185.144.101 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-21 12:02:27
212.70.149.52 attackbotsspam
2020-09-21 05:35:48 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=gs@no-server.de\)
2020-09-21 05:36:13 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=test01@no-server.de\)
2020-09-21 05:36:39 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=oslo-gw7@no-server.de\)
2020-09-21 05:37:05 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=pxe@no-server.de\)
2020-09-21 05:37:56 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=firmy@no-server.de\)
2020-09-21 05:38:21 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=adams@no-server.de\)
...
2020-09-21 12:00:43
118.100.175.154 attackspambots
Automatic report - Port Scan Attack
2020-09-21 12:17:20
218.92.0.185 attack
Sep 21 00:01:36 ny01 sshd[17845]: Failed password for root from 218.92.0.185 port 55134 ssh2
Sep 21 00:01:39 ny01 sshd[17845]: Failed password for root from 218.92.0.185 port 55134 ssh2
Sep 21 00:01:43 ny01 sshd[17845]: Failed password for root from 218.92.0.185 port 55134 ssh2
Sep 21 00:01:46 ny01 sshd[17845]: Failed password for root from 218.92.0.185 port 55134 ssh2
2020-09-21 12:02:51
103.199.98.220 attackbotsspam
Invalid user webftp from 103.199.98.220 port 39014
2020-09-21 12:23:51
45.129.33.46 attack
ET DROP Dshield Block Listed Source group 1 - port: 15285 proto: tcp cat: Misc Attackbytes: 60
2020-09-21 12:09:45
162.243.128.224 attackbotsspam
Found on   Binary Defense     / proto=6  .  srcport=38015  .  dstport=47808  .     (2314)
2020-09-21 08:08:51
121.46.26.126 attack
Invalid user administracion from 121.46.26.126 port 53064
2020-09-21 08:00:13
185.39.11.109 attackspam
[Mon Sep 14 21:34:59 2020] - Syn Flood From IP: 185.39.11.109 Port: 52084
2020-09-21 12:23:06

最近上报的IP列表

148.196.54.43 87.47.86.139 214.95.59.71 71.172.241.139
218.37.46.72 164.209.19.35 61.24.236.34 8.227.180.143
144.81.196.207 86.98.220.247 71.12.232.115 174.78.215.23
5.32.20.227 215.118.11.101 31.126.15.131 198.50.83.178
83.223.11.212 78.208.10.136 151.166.29.131 219.216.202.223