必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.194.55.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45697
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.194.55.239.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:36:32 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 239.55.194.163.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 239.55.194.163.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
88.225.234.227 attackbots
Automatic report - Port Scan Attack
2019-07-29 23:40:47
45.169.22.161 attackbots
Automatic report - Port Scan Attack
2019-07-30 00:14:16
201.46.59.202 attackbots
failed_logins
2019-07-29 23:39:39
190.9.130.159 attackspambots
Jul 29 08:30:36 mail sshd\[853\]: Failed password for invalid user chp from 190.9.130.159 port 42105 ssh2
Jul 29 08:46:48 mail sshd\[1147\]: Invalid user 123 from 190.9.130.159 port 35608
...
2019-07-29 23:28:10
129.211.83.166 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-07-29 23:42:47
13.250.57.112 attack
SSH/22 MH Probe, BF, Hack -
2019-07-29 23:29:04
79.215.66.228 attack
Jul 29 08:15:35 majoron sshd[11307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.215.66.228  user=r.r
Jul 29 08:15:37 majoron sshd[11307]: Failed password for r.r from 79.215.66.228 port 42884 ssh2
Jul 29 08:15:37 majoron sshd[11307]: Received disconnect from 79.215.66.228 port 42884:11: Bye Bye [preauth]
Jul 29 08:15:37 majoron sshd[11307]: Disconnected from 79.215.66.228 port 42884 [preauth]
Jul 29 08:28:25 majoron sshd[11529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.215.66.228  user=r.r
Jul 29 08:28:27 majoron sshd[11529]: Failed password for r.r from 79.215.66.228 port 44884 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=79.215.66.228
2019-07-29 23:32:28
60.205.214.214 attackspambots
Port 1433 Scan
2019-07-30 00:11:19
49.83.118.120 attackspambots
Automatic report - Port Scan Attack
2019-07-29 23:56:21
68.183.219.43 attackbots
Jul 29 10:18:57 OPSO sshd\[20228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.219.43  user=root
Jul 29 10:18:59 OPSO sshd\[20228\]: Failed password for root from 68.183.219.43 port 54282 ssh2
Jul 29 10:23:16 OPSO sshd\[20910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.219.43  user=root
Jul 29 10:23:18 OPSO sshd\[20910\]: Failed password for root from 68.183.219.43 port 48644 ssh2
Jul 29 10:27:28 OPSO sshd\[21446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.219.43  user=root
2019-07-29 23:16:28
193.32.163.182 attackbots
29.07.2019 16:16:35 SSH access blocked by firewall
2019-07-30 00:28:29
111.67.199.161 attackbots
Jul 29 09:06:34 localhost sshd\[53821\]: Invalid user lemmein1 from 111.67.199.161 port 44404
Jul 29 09:06:34 localhost sshd\[53821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.199.161
...
2019-07-30 00:08:22
153.37.97.183 attack
Automatic report - Banned IP Access
2019-07-29 23:26:42
185.176.27.14 attack
29.07.2019 11:15:05 Connection to port 23581 blocked by firewall
2019-07-30 00:31:39
201.137.245.64 attackbotsspam
Jul 29 21:57:22 lcl-usvr-01 sshd[20686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.137.245.64  user=root
Jul 29 21:57:24 lcl-usvr-01 sshd[20686]: Failed password for root from 201.137.245.64 port 47694 ssh2
Jul 29 22:03:49 lcl-usvr-01 sshd[22330]: Invalid user ftpuser1 from 201.137.245.64
Jul 29 22:03:49 lcl-usvr-01 sshd[22330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.137.245.64 
Jul 29 22:03:49 lcl-usvr-01 sshd[22330]: Invalid user ftpuser1 from 201.137.245.64
Jul 29 22:03:51 lcl-usvr-01 sshd[22330]: Failed password for invalid user ftpuser1 from 201.137.245.64 port 51096 ssh2
2019-07-30 00:03:07

最近上报的IP列表

134.247.247.142 40.40.79.55 139.17.42.84 208.105.13.42
94.195.162.34 121.235.174.113 85.227.242.227 26.149.16.201
31.252.99.10 99.45.198.130 107.48.239.74 130.130.201.140
74.2.11.153 19.16.54.210 28.142.66.66 215.112.156.27
124.117.120.38 100.34.84.18 227.120.39.31 14.1.48.139