必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.55.167.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.55.167.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 10:15:25 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 48.167.55.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.167.55.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.111.135.193 attack
*Port Scan* detected from 41.111.135.193 (DZ/Algeria/Algiers/Belcourt (Algiers)/-). 4 hits in the last 240 seconds
2020-08-03 04:58:22
122.51.41.109 attackbotsspam
$f2bV_matches
2020-08-03 04:53:36
218.92.0.138 attack
$f2bV_matches
2020-08-03 05:15:07
191.235.103.6 attackspam
Aug  1 11:18:58 ahost sshd[1877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.103.6  user=r.r
Aug  1 11:18:59 ahost sshd[1877]: Failed password for r.r from 191.235.103.6 port 41360 ssh2
Aug  1 11:18:59 ahost sshd[1877]: Received disconnect from 191.235.103.6: 11: Bye Bye [preauth]
Aug  1 12:00:35 ahost sshd[8854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.103.6  user=r.r
Aug  1 12:00:37 ahost sshd[8854]: Failed password for r.r from 191.235.103.6 port 56290 ssh2
Aug  1 12:00:39 ahost sshd[8854]: Received disconnect from 191.235.103.6: 11: Bye Bye [preauth]
Aug  1 12:09:00 ahost sshd[12300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.103.6  user=r.r
Aug  1 12:09:03 ahost sshd[12300]: Failed password for r.r from 191.235.103.6 port 44554 ssh2
Aug  1 12:09:03 ahost sshd[12300]: Received disconnect from 191.235.103.6:........
------------------------------
2020-08-03 05:00:44
182.151.34.106 attackspambots
2020-08-02T22:27:16.725307vps751288.ovh.net sshd\[28652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.34.106  user=root
2020-08-02T22:27:19.027848vps751288.ovh.net sshd\[28652\]: Failed password for root from 182.151.34.106 port 36374 ssh2
2020-08-02T22:29:34.076173vps751288.ovh.net sshd\[28670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.34.106  user=root
2020-08-02T22:29:36.655015vps751288.ovh.net sshd\[28670\]: Failed password for root from 182.151.34.106 port 52589 ssh2
2020-08-02T22:31:42.002560vps751288.ovh.net sshd\[28685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.34.106  user=root
2020-08-03 05:21:53
49.88.112.111 attack
Aug  2 14:09:44 dignus sshd[20582]: Failed password for root from 49.88.112.111 port 36128 ssh2
Aug  2 14:09:46 dignus sshd[20582]: Failed password for root from 49.88.112.111 port 36128 ssh2
Aug  2 14:09:48 dignus sshd[20582]: Failed password for root from 49.88.112.111 port 36128 ssh2
Aug  2 14:10:21 dignus sshd[20682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Aug  2 14:10:23 dignus sshd[20682]: Failed password for root from 49.88.112.111 port 50790 ssh2
...
2020-08-03 05:19:41
152.170.65.133 attackspambots
$f2bV_matches
2020-08-03 05:18:02
103.210.236.105 attackspam
Aug  3 03:18:28 itv-usvr-02 sshd[13184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.236.105  user=root
Aug  3 03:23:38 itv-usvr-02 sshd[13379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.236.105  user=root
Aug  3 03:25:14 itv-usvr-02 sshd[13442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.236.105  user=root
2020-08-03 04:54:16
110.77.235.190 attackbots
Aug  2 22:49:25 lnxmysql61 sshd[16033]: Failed password for root from 110.77.235.190 port 59730 ssh2
Aug  2 22:49:25 lnxmysql61 sshd[16033]: Failed password for root from 110.77.235.190 port 59730 ssh2
2020-08-03 05:16:03
103.114.221.16 attackbots
Aug  2 22:46:46 lnxded63 sshd[21437]: Failed password for root from 103.114.221.16 port 60132 ssh2
Aug  2 22:46:46 lnxded63 sshd[21437]: Failed password for root from 103.114.221.16 port 60132 ssh2
2020-08-03 04:57:57
36.68.11.162 attackbots
Unauthorized IMAP connection attempt
2020-08-03 04:50:58
123.18.245.202 attackbots
Automatic report - Port Scan Attack
2020-08-03 05:15:37
139.199.12.83 attack
Aug  2 21:10:49 jumpserver sshd[360780]: Failed password for root from 139.199.12.83 port 33848 ssh2
Aug  2 21:13:47 jumpserver sshd[360829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.12.83  user=root
Aug  2 21:13:49 jumpserver sshd[360829]: Failed password for root from 139.199.12.83 port 37864 ssh2
...
2020-08-03 05:18:55
193.32.161.141 attack
08/02/2020-16:24:56.193928 193.32.161.141 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-08-03 05:17:19
92.19.248.152 attack
(sshd) Failed SSH login from 92.19.248.152 (GB/United Kingdom/host-92-19-248-152.static.as13285.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  2 22:20:51 elude sshd[18280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.19.248.152  user=root
Aug  2 22:20:53 elude sshd[18280]: Failed password for root from 92.19.248.152 port 47726 ssh2
Aug  2 22:51:15 elude sshd[22954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.19.248.152  user=root
Aug  2 22:51:17 elude sshd[22954]: Failed password for root from 92.19.248.152 port 46154 ssh2
Aug  2 22:52:13 elude sshd[23091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.19.248.152  user=root
2020-08-03 05:06:05

最近上报的IP列表

32.191.181.120 41.175.174.254 221.43.63.211 197.244.5.151
51.219.221.250 34.120.158.68 12.254.52.70 180.151.13.184
253.107.31.14 31.165.115.83 172.208.74.205 200.185.47.102
36.66.177.106 72.237.142.46 175.92.40.212 140.20.231.150
3.23.214.71 54.201.56.63 92.183.3.4 25.111.181.135