必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Birmingham

省份(region): Alabama

国家(country): United States

运营商(isp): RTC Communications LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.55.55.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.55.55.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025103101 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 01 10:02:56 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
6.55.55.139.in-addr.arpa domain name pointer h6.55.55.139.dynamic.ip.windstream.net.
NSLOOKUP信息:
b'6.55.55.139.in-addr.arpa	name = h6.55.55.139.dynamic.ip.windstream.net.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.58.181.234 attackbotsspam
Feb 20 07:53:55 hpm sshd\[17481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.58.181.234  user=lp
Feb 20 07:53:57 hpm sshd\[17481\]: Failed password for lp from 41.58.181.234 port 32685 ssh2
Feb 20 07:57:11 hpm sshd\[17764\]: Invalid user postgres from 41.58.181.234
Feb 20 07:57:11 hpm sshd\[17764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.58.181.234
Feb 20 07:57:13 hpm sshd\[17764\]: Failed password for invalid user postgres from 41.58.181.234 port 44404 ssh2
2020-02-21 02:12:36
212.47.238.207 attack
Feb 20 20:25:43 webhost01 sshd[1506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.238.207
Feb 20 20:25:46 webhost01 sshd[1506]: Failed password for invalid user tmpu02 from 212.47.238.207 port 36644 ssh2
...
2020-02-21 01:45:21
222.186.31.135 attackbotsspam
Feb 20 19:03:30 ucs sshd\[17058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Feb 20 19:03:32 ucs sshd\[17056\]: error: PAM: User not known to the underlying authentication module for root from 222.186.31.135
Feb 20 19:03:33 ucs sshd\[17059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
...
2020-02-21 02:05:39
61.180.77.193 attackspam
Unauthorized connection attempt from IP address 61.180.77.193
2020-02-21 02:21:08
46.164.143.82 attack
Feb 20 07:41:52 php1 sshd\[3928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.164.143.82  user=gnats
Feb 20 07:41:54 php1 sshd\[3928\]: Failed password for gnats from 46.164.143.82 port 37896 ssh2
Feb 20 07:44:48 php1 sshd\[4195\]: Invalid user at from 46.164.143.82
Feb 20 07:44:48 php1 sshd\[4195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.164.143.82
Feb 20 07:44:50 php1 sshd\[4195\]: Failed password for invalid user at from 46.164.143.82 port 37940 ssh2
2020-02-21 02:11:24
86.98.216.234 attackspambots
X-Originating-IP: [193.0.225.34]
Received: from 10.220.163.139  (EHLO nessie.cs.ubbcluj.ro) (193.0.225.34)
  by mta4170.mail.ne1.yahoo.com with SMTP; Thu, 20 Feb 2020 11:31:37 +0000
Received: by nessie.cs.ubbcluj.ro (Postfix, from userid 48)
	id 722F2481781; Thu, 20 Feb 2020 13:31:20 +0200 (EET)
Received: from 86.98.216.234
        (SquirrelMail authenticated user pblaga)
        by www.cs.ubbcluj.ro with HTTP;
        Thu, 20 Feb 2020 13:31:20 +0200
Message-ID: <63e27939c016b7ce39c9fd6816f5e619.squirrel@www.cs.ubbcluj.ro>
Date: Thu, 20 Feb 2020 13:31:20 +0200
Subject: Hello Beautiful
From: "WILFRED" <7838@scarlet.be>
Reply-To: atiworks@yeah.net
User-Agent: SquirrelMail/1.4.22-5.el6
MIME-Version: 1.0
Content-Type: text/plain;charset=utf-8
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
To: undisclosed-recipients:;
Content-Length: 225
2020-02-21 01:53:29
71.105.251.198 attackspambots
suspicious action Thu, 20 Feb 2020 10:25:39 -0300
2020-02-21 01:52:42
192.241.219.194 attackbotsspam
7777/tcp 2077/tcp 5631/tcp...
[2020-02-14/20]9pkt,8pt.(tcp),1pt.(udp)
2020-02-21 02:19:46
198.167.140.152 attack
Invalid user qichen from 198.167.140.152 port 51669
2020-02-21 01:45:39
191.211.120.7 attackspambots
Feb 20 14:18:41 twattle sshd[22040]: reveeclipse mapping checking getaddrin=
fo for 191-211-120-7.user.vivozap.com.br [191.211.120.7] failed - POSSI=
BLE BREAK-IN ATTEMPT!
Feb 20 14:18:42 twattle sshd[22040]: Received disconnect from 191.211.1=
20.7: 11: Bye Bye [preauth]
Feb 20 14:18:43 twattle sshd[22042]: reveeclipse mapping checking getaddrin=
fo for 191-211-120-7.user.vivozap.com.br [191.211.120.7] failed - POSSI=
BLE BREAK-IN ATTEMPT!
Feb 20 14:18:44 twattle sshd[22042]: Received disconnect from 191.211.1=
20.7: 11: Bye Bye [preauth]
Feb 20 14:18:46 twattle sshd[22044]: reveeclipse mapping checking getaddrin=
fo for 191-211-120-7.user.vivozap.com.br [191.211.120.7] failed - POSSI=
BLE BREAK-IN ATTEMPT!
Feb 20 14:18:46 twattle sshd[22044]: Invalid user ubnt from 191.211.120=
.7
Feb 20 14:18:46 twattle sshd[22044]: Received disconnect from 191.211.1=
20.7: 11: Bye Bye [preauth]
Feb 20 14:18:48 twattle sshd[22046]: reveeclipse mapping checking getaddrin=
fo for 191-2........
-------------------------------
2020-02-21 02:09:16
88.91.241.209 attackbots
suspicious action Thu, 20 Feb 2020 10:25:52 -0300
2020-02-21 01:43:08
31.209.59.165 attack
Feb 20 13:58:39 nxxxxxxx sshd[18772]: Invalid user rstudio-server from 31.209.59.165
Feb 20 13:58:41 nxxxxxxx sshd[18772]: Failed password for invalid user rstudio-server from 31.209.59.165 port 38278 ssh2
Feb 20 14:11:51 nxxxxxxx sshd[20336]: Invalid user sonarqube from 31.209.59.165


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=31.209.59.165
2020-02-21 01:50:45
155.4.70.10 attackbots
$f2bV_matches
2020-02-21 02:20:44
106.13.199.71 attack
Feb 20 10:23:40 firewall sshd[17707]: Invalid user Michelle from 106.13.199.71
Feb 20 10:23:42 firewall sshd[17707]: Failed password for invalid user Michelle from 106.13.199.71 port 58570 ssh2
Feb 20 10:25:24 firewall sshd[17773]: Invalid user deploy from 106.13.199.71
...
2020-02-21 02:01:38
121.173.113.169 attackspam
Automatic report - Port Scan Attack
2020-02-21 02:06:35

最近上报的IP列表

199.120.48.200 36.41.64.187 113.215.188.107 198.235.24.254
45.230.66.99 162.216.149.12 162.243.231.186 64.188.31.24
109.105.210.75 38.246.224.0 45.148.10.238 60.204.2.236
182.92.118.165 138.68.77.240 18.236.242.58 180.153.236.216
35.90.188.229 10.44.240.116 51.158.180.252 100.24.38.94