必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.141.112.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.141.112.55.			IN	A

;; AUTHORITY SECTION:
.			469	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 01:38:48 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
55.112.141.122.in-addr.arpa domain name pointer 55.112.141.122.adsl-pool.jlccptt.net.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.112.141.122.in-addr.arpa	name = 55.112.141.122.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.69.234.227 attackspam
1593229786 - 06/27/2020 05:49:46 Host: 118.69.234.227/118.69.234.227 Port: 445 TCP Blocked
2020-06-27 18:35:22
159.89.194.103 attackbots
Jun 27 12:03:52  sshd\[1678\]: Invalid user nexus from 159.89.194.103Jun 27 12:03:54  sshd\[1678\]: Failed password for invalid user nexus from 159.89.194.103 port 34494 ssh2
...
2020-06-27 19:08:12
209.141.49.184 attackbots
Automatic report - Banned IP Access
2020-06-27 18:40:45
124.240.197.238 attackbotsspam
Hits on port : 445
2020-06-27 19:00:27
37.59.36.210 attackspam
Jun 27 09:17:59 onepixel sshd[101566]: Invalid user suporte from 37.59.36.210 port 54406
Jun 27 09:17:59 onepixel sshd[101566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.36.210 
Jun 27 09:17:59 onepixel sshd[101566]: Invalid user suporte from 37.59.36.210 port 54406
Jun 27 09:18:01 onepixel sshd[101566]: Failed password for invalid user suporte from 37.59.36.210 port 54406 ssh2
Jun 27 09:21:54 onepixel sshd[103638]: Invalid user pwa from 37.59.36.210 port 39800
2020-06-27 18:45:09
139.170.150.254 attack
Jun 27 10:52:32 roki-contabo sshd\[7482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.254  user=root
Jun 27 10:52:34 roki-contabo sshd\[7482\]: Failed password for root from 139.170.150.254 port 22449 ssh2
Jun 27 10:59:19 roki-contabo sshd\[7539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.254  user=root
Jun 27 10:59:21 roki-contabo sshd\[7539\]: Failed password for root from 139.170.150.254 port 46069 ssh2
Jun 27 11:26:39 roki-contabo sshd\[8083\]: Invalid user fernandazgouridi from 139.170.150.254
Jun 27 11:26:39 roki-contabo sshd\[8083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.170.150.254
...
2020-06-27 18:42:41
134.209.30.155 attackbotsspam
PHI,DEF GET /wordpress/wp-login.php
2020-06-27 18:29:29
180.167.126.126 attackbotsspam
Invalid user ftpuser from 180.167.126.126 port 60874
2020-06-27 19:05:24
110.185.104.186 attackspambots
web-1 [ssh_2] SSH Attack
2020-06-27 18:43:08
222.186.173.154 attackspambots
2020-06-27T13:01:03.659531vps751288.ovh.net sshd\[29598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2020-06-27T13:01:05.313744vps751288.ovh.net sshd\[29598\]: Failed password for root from 222.186.173.154 port 12248 ssh2
2020-06-27T13:01:08.335621vps751288.ovh.net sshd\[29598\]: Failed password for root from 222.186.173.154 port 12248 ssh2
2020-06-27T13:01:13.008580vps751288.ovh.net sshd\[29598\]: Failed password for root from 222.186.173.154 port 12248 ssh2
2020-06-27T13:01:16.227162vps751288.ovh.net sshd\[29598\]: Failed password for root from 222.186.173.154 port 12248 ssh2
2020-06-27 19:07:41
103.216.48.245 attackspam
103.216.48.245 - - [27/Jun/2020:11:31:38 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
103.216.48.245 - - [27/Jun/2020:11:31:39 +0100] "POST /wp-login.php HTTP/1.1" 200 5429 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
103.216.48.245 - - [27/Jun/2020:11:51:09 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-06-27 19:03:36
222.186.30.218 attack
Jun 27 12:34:18 abendstille sshd\[10983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
Jun 27 12:34:20 abendstille sshd\[10983\]: Failed password for root from 222.186.30.218 port 51461 ssh2
Jun 27 12:34:22 abendstille sshd\[10983\]: Failed password for root from 222.186.30.218 port 51461 ssh2
Jun 27 12:34:23 abendstille sshd\[10983\]: Failed password for root from 222.186.30.218 port 51461 ssh2
Jun 27 12:34:27 abendstille sshd\[11182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
...
2020-06-27 18:39:48
112.133.204.98 attack
1593229750 - 06/27/2020 05:49:10 Host: 112.133.204.98/112.133.204.98 Port: 445 TCP Blocked
2020-06-27 19:02:16
54.37.232.108 attackspam
Jun 27 12:15:19 ovpn sshd\[3351\]: Invalid user ginger from 54.37.232.108
Jun 27 12:15:19 ovpn sshd\[3351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.232.108
Jun 27 12:15:22 ovpn sshd\[3351\]: Failed password for invalid user ginger from 54.37.232.108 port 51514 ssh2
Jun 27 12:24:05 ovpn sshd\[28032\]: Invalid user test from 54.37.232.108
Jun 27 12:24:05 ovpn sshd\[28032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.232.108
2020-06-27 18:54:22
106.13.228.21 attack
Invalid user kkc from 106.13.228.21 port 56390
2020-06-27 18:51:33

最近上报的IP列表

122.141.112.52 122.141.112.63 122.141.112.64 122.141.112.66
122.141.112.69 122.141.112.7 122.141.112.76 122.141.112.78
122.141.112.89 122.141.112.91 122.141.112.93 122.141.112.94
122.141.112.98 122.141.114.103 122.141.114.130 122.141.114.133
122.141.114.138 122.141.114.14 122.141.114.175 122.141.114.186