必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 209.109.55.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;209.109.55.45.			IN	A

;; AUTHORITY SECTION:
.			102	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010301 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 04 02:26:45 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 45.55.109.209.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.55.109.209.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.123.8.99 attackbots
Jul 12 21:49:56 rigel postfix/smtpd[6019]: connect from unknown[45.123.8.99]
Jul 12 21:49:59 rigel postfix/smtpd[6019]: warning: unknown[45.123.8.99]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 12 21:49:59 rigel postfix/smtpd[6019]: warning: unknown[45.123.8.99]: SASL PLAIN authentication failed: authentication failure
Jul 12 21:50:00 rigel postfix/smtpd[6019]: warning: unknown[45.123.8.99]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.123.8.99
2019-07-13 06:03:59
94.176.76.230 attackbotsspam
(Jul 12)  LEN=40 TTL=244 ID=39679 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 12)  LEN=40 TTL=244 ID=32568 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 12)  LEN=40 TTL=244 ID=27142 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 12)  LEN=40 TTL=244 ID=12171 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 12)  LEN=40 TTL=244 ID=52972 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 12)  LEN=40 TTL=244 ID=59112 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 12)  LEN=40 TTL=244 ID=33219 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 12)  LEN=40 TTL=244 ID=23701 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 12)  LEN=40 TTL=244 ID=8284 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 11)  LEN=40 TTL=244 ID=735 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 11)  LEN=40 TTL=244 ID=36329 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 11)  LEN=40 TTL=244 ID=176 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 11)  LEN=40 TTL=244 ID=1251 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 11)  LEN=40 TTL=244 ID=17879 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jul 11)  LEN=40 TTL=244 ID=40380 DF TCP DPT=23 WINDOW=14600 SYN 
 ...
2019-07-13 06:25:52
94.60.177.85 attackbotsspam
Jul 12 21:51:42 tux postfix/smtpd[31571]: connect from 85.177.60.94.rev.vodafone.pt[94.60.177.85]
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.60.177.85
2019-07-13 06:10:33
51.91.18.121 attack
Jul 13 05:05:09 lcl-usvr-02 sshd[16005]: Invalid user admin from 51.91.18.121 port 40338
Jul 13 05:05:09 lcl-usvr-02 sshd[16005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.18.121
Jul 13 05:05:09 lcl-usvr-02 sshd[16005]: Invalid user admin from 51.91.18.121 port 40338
Jul 13 05:05:11 lcl-usvr-02 sshd[16005]: Failed password for invalid user admin from 51.91.18.121 port 40338 ssh2
Jul 13 05:05:09 lcl-usvr-02 sshd[16005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.18.121
Jul 13 05:05:09 lcl-usvr-02 sshd[16005]: Invalid user admin from 51.91.18.121 port 40338
Jul 13 05:05:11 lcl-usvr-02 sshd[16005]: Failed password for invalid user admin from 51.91.18.121 port 40338 ssh2
Jul 13 05:05:13 lcl-usvr-02 sshd[16005]: Failed password for invalid user admin from 51.91.18.121 port 40338 ssh2
...
2019-07-13 06:18:23
219.233.49.39 attackspam
Unauthorized SSH login attempts
2019-07-13 05:43:59
178.6.217.19 attackspam
Jul 12 21:46:53 mxgate1 postfix/postscreen[21604]: CONNECT from [178.6.217.19]:17538 to [176.31.12.44]:25
Jul 12 21:46:53 mxgate1 postfix/dnsblog[21797]: addr 178.6.217.19 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 12 21:46:53 mxgate1 postfix/dnsblog[21798]: addr 178.6.217.19 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 12 21:46:59 mxgate1 postfix/postscreen[21604]: DNSBL rank 3 for [178.6.217.19]:17538
Jul x@x
Jul 12 21:47:00 mxgate1 postfix/postscreen[21604]: HANGUP after 0.63 from [178.6.217.19]:17538 in tests after SMTP handshake
Jul 12 21:47:00 mxgate1 postfix/postscreen[21604]: DISCONNECT [178.6.217.19]:17538


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.6.217.19
2019-07-13 05:57:02
185.53.88.53 attack
\[2019-07-12 17:48:44\] SECURITY\[22794\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-12T17:48:44.895-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="5011442038077039",SessionID="0x7f75440192b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.53/61470",ACLName="no_extension_match"
\[2019-07-12 17:49:45\] SECURITY\[22794\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-12T17:49:45.836-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1011442038077039",SessionID="0x7f75440de058",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.53/61293",ACLName="no_extension_match"
\[2019-07-12 17:51:00\] SECURITY\[22794\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-12T17:51:00.709-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="2011442038077039",SessionID="0x7f75440192b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.53/65211",ACLName="no_
2019-07-13 05:54:32
106.12.134.23 attackbots
Jul 12 23:09:45 * sshd[10702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.134.23
Jul 12 23:09:47 * sshd[10702]: Failed password for invalid user kettle from 106.12.134.23 port 46167 ssh2
2019-07-13 05:50:26
80.110.91.32 attack
Jul 12 21:52:33 mxgate1 postfix/postscreen[21604]: CONNECT from [80.110.91.32]:45269 to [176.31.12.44]:25
Jul 12 21:52:33 mxgate1 postfix/dnsblog[21959]: addr 80.110.91.32 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 12 21:52:33 mxgate1 postfix/dnsblog[21959]: addr 80.110.91.32 listed by domain zen.spamhaus.org as 127.0.0.10
Jul 12 21:52:33 mxgate1 postfix/dnsblog[21961]: addr 80.110.91.32 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 12 21:52:33 mxgate1 postfix/dnsblog[21958]: addr 80.110.91.32 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 12 21:52:39 mxgate1 postfix/postscreen[21604]: DNSBL rank 4 for [80.110.91.32]:45269
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=80.110.91.32
2019-07-13 06:15:38
174.138.6.123 attack
Jul 12 20:26:35 MK-Soft-VM6 sshd\[21829\]: Invalid user www from 174.138.6.123 port 35034
Jul 12 20:26:35 MK-Soft-VM6 sshd\[21829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.6.123
Jul 12 20:26:36 MK-Soft-VM6 sshd\[21829\]: Failed password for invalid user www from 174.138.6.123 port 35034 ssh2
...
2019-07-13 06:03:32
223.27.234.253 attackbotsspam
Jul 12 22:16:35 MK-Soft-VM4 sshd\[30112\]: Invalid user lis from 223.27.234.253 port 44066
Jul 12 22:16:35 MK-Soft-VM4 sshd\[30112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.27.234.253
Jul 12 22:16:37 MK-Soft-VM4 sshd\[30112\]: Failed password for invalid user lis from 223.27.234.253 port 44066 ssh2
...
2019-07-13 06:17:49
197.248.16.118 attackbotsspam
Jul 12 22:07:31 MK-Soft-Root1 sshd\[16777\]: Invalid user johan from 197.248.16.118 port 40362
Jul 12 22:07:31 MK-Soft-Root1 sshd\[16777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118
Jul 12 22:07:33 MK-Soft-Root1 sshd\[16777\]: Failed password for invalid user johan from 197.248.16.118 port 40362 ssh2
...
2019-07-13 06:13:21
201.174.182.159 attackspam
Jul 12 22:54:14 localhost sshd\[12544\]: Invalid user prashant from 201.174.182.159 port 34760
Jul 12 22:54:14 localhost sshd\[12544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.182.159
...
2019-07-13 05:57:51
37.59.114.113 attack
Jul 12 15:55:18 localhost sshd[19518]: Failed password for root from 37.59.114.113 port 60884 ssh2
Jul 12 16:03:26 localhost sshd[19540]: Failed password for root from 37.59.114.113 port 47588 ssh2
Jul 12 16:08:03 localhost sshd[19548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.114.113
...
2019-07-13 05:49:38
137.74.26.179 attackbots
Jul 12 22:03:17 tux-35-217 sshd\[7031\]: Invalid user alberto from 137.74.26.179 port 35786
Jul 12 22:03:17 tux-35-217 sshd\[7031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.26.179
Jul 12 22:03:19 tux-35-217 sshd\[7031\]: Failed password for invalid user alberto from 137.74.26.179 port 35786 ssh2
Jul 12 22:08:07 tux-35-217 sshd\[7090\]: Invalid user invoices from 137.74.26.179 port 37592
Jul 12 22:08:07 tux-35-217 sshd\[7090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.26.179
...
2019-07-13 05:49:06

最近上报的IP列表

2.240.130.84 82.203.92.80 144.37.115.202 157.133.56.193
1.1.136.130 245.134.229.134 177.42.90.231 252.120.30.158
195.252.148.36 249.124.195.125 100.245.227.39 206.198.177.179
202.176.182.34 238.23.63.195 250.111.109.160 2.192.142.79
237.195.217.228 243.125.102.82 218.225.135.24 48.202.148.150