必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): San Antonio

省份(region): Texas

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.64.105.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.64.105.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110101 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 02 05:32:23 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
55.105.64.20.in-addr.arpa domain name pointer azpdsg49032m.stretchoid.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.105.64.20.in-addr.arpa	name = azpdsg49032m.stretchoid.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.82.65.90 attack
Jan  7 16:12:54 debian-2gb-nbg1-2 kernel: \[669291.704513\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.90 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=60119 PROTO=TCP SPT=57395 DPT=3780 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-07 23:20:37
222.186.52.86 attack
Jan  7 09:24:36 ny01 sshd[2692]: Failed password for root from 222.186.52.86 port 13597 ssh2
Jan  7 09:25:59 ny01 sshd[3539]: Failed password for root from 222.186.52.86 port 51928 ssh2
2020-01-07 22:47:35
14.246.95.87 attackspambots
Unauthorized connection attempt from IP address 14.246.95.87 on Port 445(SMB)
2020-01-07 22:56:44
79.166.118.213 attackspam
Telnet Server BruteForce Attack
2020-01-07 22:58:59
94.23.70.116 attackspambots
Jan  7 04:55:09 eddieflores sshd\[13763\]: Invalid user uqg from 94.23.70.116
Jan  7 04:55:09 eddieflores sshd\[13763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.70.116
Jan  7 04:55:12 eddieflores sshd\[13763\]: Failed password for invalid user uqg from 94.23.70.116 port 59287 ssh2
Jan  7 05:04:48 eddieflores sshd\[14542\]: Invalid user cuigj from 94.23.70.116
Jan  7 05:04:48 eddieflores sshd\[14542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.70.116
2020-01-07 23:17:23
222.186.175.154 attackbotsspam
01/07/2020-10:11:48.706977 222.186.175.154 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-07 23:15:13
200.151.126.130 attack
Unauthorized connection attempt from IP address 200.151.126.130 on Port 445(SMB)
2020-01-07 23:07:35
114.119.135.194 attackbotsspam
badbot
2020-01-07 23:03:13
194.146.43.172 attackbotsspam
Jan  7 07:48:47 neweola sshd[18948]: Did not receive identification string from 194.146.43.172 port 42580
Jan  7 07:58:17 neweola sshd[19172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.146.43.172  user=bin
Jan  7 07:58:19 neweola sshd[19172]: Failed password for bin from 194.146.43.172 port 59546 ssh2
Jan  7 07:58:20 neweola sshd[19172]: Received disconnect from 194.146.43.172 port 59546:11: Normal Shutdown, Thank you for playing [preauth]
Jan  7 07:58:20 neweola sshd[19172]: Disconnected from authenticating user bin 194.146.43.172 port 59546 [preauth]
Jan  7 08:00:14 neweola sshd[19209]: Invalid user daemond from 194.146.43.172 port 60476
Jan  7 08:00:14 neweola sshd[19209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.146.43.172 
Jan  7 08:00:15 neweola sshd[19209]: Failed password for invalid user daemond from 194.146.43.172 port 60476 ssh2
Jan  7 08:00:17 neweola sshd[19........
-------------------------------
2020-01-07 22:54:16
190.151.105.182 attackspambots
Unauthorized connection attempt detected from IP address 190.151.105.182 to port 2220 [J]
2020-01-07 23:16:14
125.164.112.186 attackbotsspam
Unauthorized connection attempt from IP address 125.164.112.186 on Port 445(SMB)
2020-01-07 23:28:09
103.52.216.52 attack
Unauthorized connection attempt detected from IP address 103.52.216.52 to port 81
2020-01-07 23:04:58
46.38.144.146 attackbots
Jan  7 16:07:21 relay postfix/smtpd\[1009\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  7 16:07:46 relay postfix/smtpd\[20274\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  7 16:08:12 relay postfix/smtpd\[16524\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  7 16:08:15 relay postfix/smtpd\[32726\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  7 16:08:42 relay postfix/smtpd\[3977\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-07 23:10:46
117.194.111.162 attackspambots
Automatic report - Port Scan Attack
2020-01-07 22:49:35
203.94.229.131 attackspam
Unauthorized connection attempt from IP address 203.94.229.131 on Port 445(SMB)
2020-01-07 22:45:15

最近上报的IP列表

162.216.149.11 103.98.149.80 114.98.179.20 54.160.134.0
44.206.232.169 34.238.249.239 34.141.254.56 185.247.137.55
62.210.7.249 91.205.206.93 116.138.244.219 194.68.26.182
200.59.88.2 149.40.53.5 59.82.83.194 223.72.102.1
128.1.132.111 20.169.83.214 82.165.93.136 179.60.172.135