必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.55.245.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.55.245.194.			IN	A

;; AUTHORITY SECTION:
.			216	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 20:16:11 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
194.245.55.162.in-addr.arpa domain name pointer prod1.bitwerft.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.245.55.162.in-addr.arpa	name = prod1.bitwerft.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
158.69.222.121 attack
Jul 29 02:35:06 mail sshd\[27397\]: Invalid user kongzi2000 from 158.69.222.121 port 50090
Jul 29 02:35:06 mail sshd\[27397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.121
...
2019-07-29 10:48:47
77.232.128.87 attackspambots
$f2bV_matches
2019-07-29 10:24:00
58.144.151.8 attackspambots
Jul 27 02:50:19 *** sshd[14228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.8  user=r.r
Jul 27 02:50:21 *** sshd[14228]: Failed password for r.r from 58.144.151.8 port 36578 ssh2
Jul 27 02:50:21 *** sshd[14228]: Received disconnect from 58.144.151.8: 11: Bye Bye [preauth]
Jul 27 03:08:48 *** sshd[16882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.8  user=r.r
Jul 27 03:08:50 *** sshd[16882]: Failed password for r.r from 58.144.151.8 port 56428 ssh2
Jul 27 03:08:51 *** sshd[16882]: Received disconnect from 58.144.151.8: 11: Bye Bye [preauth]
Jul 27 03:12:37 *** sshd[17586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.8  user=r.r
Jul 27 03:12:39 *** sshd[17586]: Failed password for r.r from 58.144.151.8 port 33076 ssh2
Jul 27 03:12:40 *** sshd[17586]: Received disconnect from 58.144.151.8: 11: Bye Bye [preaut........
-------------------------------
2019-07-29 09:57:08
113.190.242.144 attackbots
*Port Scan* detected from 113.190.242.144 (VN/Vietnam/static.vnpt.vn). 4 hits in the last 205 seconds
2019-07-29 10:22:32
1.163.44.172 attackbotsspam
Honeypot attack, port: 23, PTR: 1-163-44-172.dynamic-ip.hinet.net.
2019-07-29 10:45:16
91.121.55.150 attack
Jul 27 14:33:07 b2b-pharm sshd[28021]: Did not receive identification string from 91.121.55.150 port 64621
Jul 27 14:33:10 b2b-pharm sshd[28022]: Invalid user adminixxxr from 91.121.55.150 port 64633
Jul 27 14:53:11 b2b-pharm sshd[28124]: Did not receive identification string from 91.121.55.150 port 57122


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.121.55.150
2019-07-29 10:19:09
162.243.145.81 attack
Honeypot hit.
2019-07-29 10:21:28
45.225.92.3 attackbotsspam
Jul 29 01:32:05 bouncer sshd\[30473\]: Invalid user gripper from 45.225.92.3 port 39931
Jul 29 01:32:05 bouncer sshd\[30473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.92.3 
Jul 29 01:32:07 bouncer sshd\[30473\]: Failed password for invalid user gripper from 45.225.92.3 port 39931 ssh2
...
2019-07-29 10:35:01
187.185.70.10 attackspam
Feb 19 11:25:53 vtv3 sshd\[19330\]: Invalid user seller from 187.185.70.10 port 57480
Feb 19 11:25:53 vtv3 sshd\[19330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.185.70.10
Feb 19 11:25:55 vtv3 sshd\[19330\]: Failed password for invalid user seller from 187.185.70.10 port 57480 ssh2
Feb 19 11:31:15 vtv3 sshd\[20823\]: Invalid user nexus from 187.185.70.10 port 47476
Feb 19 11:31:15 vtv3 sshd\[20823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.185.70.10
Feb 19 16:44:47 vtv3 sshd\[8644\]: Invalid user charles from 187.185.70.10 port 37614
Feb 19 16:44:47 vtv3 sshd\[8644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.185.70.10
Feb 19 16:44:48 vtv3 sshd\[8644\]: Failed password for invalid user charles from 187.185.70.10 port 37614 ssh2
Feb 19 16:50:54 vtv3 sshd\[10920\]: Invalid user bot from 187.185.70.10 port 56514
Feb 19 16:50:54 vtv3 sshd\[10920\]: pam_
2019-07-29 10:11:29
119.1.35.249 attackspam
1564349070 - 07/28/2019 23:24:30 Host: 119.1.35.249/119.1.35.249 Port: 8080 UDP Blocked
2019-07-29 10:42:08
219.84.203.57 attackbotsspam
Jul 29 04:24:34 mintao sshd\[1090\]: Address 219.84.203.57 maps to zhan-yang.com.tw, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!\
Jul 29 04:24:34 mintao sshd\[1090\]: Invalid user aldo from 219.84.203.57\
2019-07-29 10:26:49
42.6.137.128 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-29 10:46:04
183.2.202.41 attackspam
*Port Scan* detected from 183.2.202.41 (CN/China/-). 4 hits in the last 180 seconds
2019-07-29 10:20:48
120.52.9.102 attackspambots
Jul 28 22:26:29 xtremcommunity sshd\[22269\]: Invalid user saviour from 120.52.9.102 port 56056
Jul 28 22:26:29 xtremcommunity sshd\[22269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.9.102
Jul 28 22:26:32 xtremcommunity sshd\[22269\]: Failed password for invalid user saviour from 120.52.9.102 port 56056 ssh2
Jul 28 22:31:55 xtremcommunity sshd\[22385\]: Invalid user chinanet from 120.52.9.102 port 9049
Jul 28 22:31:55 xtremcommunity sshd\[22385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.9.102
...
2019-07-29 10:41:34
106.13.46.123 attack
Jul 28 23:46:34 mail sshd\[26096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.46.123
Jul 28 23:46:36 mail sshd\[26096\]: Failed password for invalid user PASSWORG\* from 106.13.46.123 port 35138 ssh2
Jul 28 23:51:10 mail sshd\[26751\]: Invalid user blue08 from 106.13.46.123 port 49784
Jul 28 23:51:10 mail sshd\[26751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.46.123
Jul 28 23:51:12 mail sshd\[26751\]: Failed password for invalid user blue08 from 106.13.46.123 port 49784 ssh2
2019-07-29 10:08:02

最近上报的IP列表

162.55.2.89 162.55.244.55 162.55.239.113 162.55.237.231
162.55.236.162 162.55.245.30 162.55.245.69 162.55.244.58
162.55.238.114 162.55.245.182 162.55.242.145 162.55.239.50
162.55.255.100 162.55.255.85 162.55.255.81 162.55.255.74
162.55.36.244 162.55.39.135 162.55.33.101 162.55.34.162