必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.5.48.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.5.48.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 09:07:34 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
55.48.5.211.in-addr.arpa domain name pointer J048055.ppp.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.48.5.211.in-addr.arpa	name = J048055.ppp.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.166.99.131 attack
Brute force SMTP login attempts.
2019-07-09 15:23:27
102.165.52.163 attackbotsspam
\[2019-07-09 02:36:59\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-09T02:36:59.789-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441613941075",SessionID="0x7f02f8515208",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.52.163/49890",ACLName="no_extension_match"
\[2019-07-09 02:37:13\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-09T02:37:13.335-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00442038078794",SessionID="0x7f02f81c5a28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.52.163/53566",ACLName="no_extension_match"
\[2019-07-09 02:37:34\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-09T02:37:34.547-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441217900504",SessionID="0x7f02f8515208",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.52.163/61512",ACLName="n
2019-07-09 14:53:15
125.64.94.212 attackspam
09.07.2019 07:28:47 Connection to port 8887 blocked by firewall
2019-07-09 15:47:30
94.137.9.242 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 12:43:41,772 INFO [shellcode_manager] (94.137.9.242) no match, writing hexdump (cb433886e24940dc865eac7932fd3454 :2108215) - MS17010 (EternalBlue)
2019-07-09 14:53:51
36.7.69.5 attack
Jul  8 23:19:20 xb3 sshd[2690]: Failed password for invalid user db2fenc1 from 36.7.69.5 port 33128 ssh2
Jul  8 23:19:20 xb3 sshd[2690]: Received disconnect from 36.7.69.5: 11: Bye Bye [preauth]
Jul  8 23:36:45 xb3 sshd[21820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.7.69.5  user=r.r
Jul  8 23:36:48 xb3 sshd[21820]: Failed password for r.r from 36.7.69.5 port 58060 ssh2
Jul  8 23:36:48 xb3 sshd[21820]: Received disconnect from 36.7.69.5: 11: Bye Bye [preauth]
Jul  8 23:38:26 xb3 sshd[25431]: Failed password for invalid user developer from 36.7.69.5 port 45178 ssh2
Jul  8 23:38:26 xb3 sshd[25431]: Received disconnect from 36.7.69.5: 11: Bye Bye [preauth]
Jul  8 23:39:59 xb3 sshd[26700]: Failed password for invalid user cc from 36.7.69.5 port 60526 ssh2
Jul  8 23:39:59 xb3 sshd[26700]: Received disconnect from 36.7.69.5: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=36.7.69.5
2019-07-09 15:13:14
134.119.221.7 attack
\[2019-07-09 02:45:05\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-09T02:45:05.202-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00015441519470391",SessionID="0x7f02f8515208",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/59170",ACLName="no_extension_match"
\[2019-07-09 02:47:04\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-09T02:47:04.783-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0021441519470391",SessionID="0x7f02f876b078",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/61421",ACLName="no_extension_match"
\[2019-07-09 02:49:06\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-09T02:49:06.023-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="001441519470391",SessionID="0x7f02f876b078",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.119.221.7/49509",ACLName="
2019-07-09 14:57:43
45.67.14.153 attack
Scanning random ports - tries to find possible vulnerable services
2019-07-09 15:44:28
212.129.55.152 attack
Jul  9 07:46:40 [HOSTNAME] sshd[25551]: User **removed** from 212.129.55.152 not allowed because not listed in AllowUsers
Jul  9 07:46:40 [HOSTNAME] sshd[25555]: Invalid user admin from 212.129.55.152 port 1657
Jul  9 07:46:41 [HOSTNAME] sshd[25560]: Invalid user default from 212.129.55.152 port 1767
...
2019-07-09 14:52:42
49.51.34.227 attack
NAME : TencentCloud CIDR : 49.51.34.227/16 | EMAIL - SPAM {Looking for resource vulnerabilities} DDoS Attack China - block certain countries :) IP: 49.51.34.227  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-07-09 15:37:07
151.233.49.226 attackspam
" "
2019-07-09 15:07:29
190.104.245.82 attackbots
Jul  9 06:32:30 v22018076622670303 sshd\[10415\]: Invalid user scan from 190.104.245.82 port 43822
Jul  9 06:32:30 v22018076622670303 sshd\[10415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.245.82
Jul  9 06:32:31 v22018076622670303 sshd\[10415\]: Failed password for invalid user scan from 190.104.245.82 port 43822 ssh2
...
2019-07-09 15:34:35
14.191.98.255 attack
Jul  9 05:29:48 vps65 sshd\[22907\]: Invalid user noc from 14.191.98.255 port 61107
Jul  9 05:29:49 vps65 sshd\[22907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.191.98.255
...
2019-07-09 14:51:27
177.130.163.51 attack
SMTP Fraud Orders
2019-07-09 14:55:33
104.199.174.199 attack
Jul  8 03:26:56 indra sshd[507090]: Invalid user be from 104.199.174.199
Jul  8 03:26:58 indra sshd[507090]: Failed password for invalid user be from 104.199.174.199 port 14460 ssh2
Jul  8 03:26:59 indra sshd[507090]: Received disconnect from 104.199.174.199: 11: Bye Bye [preauth]
Jul  8 03:29:53 indra sshd[507425]: Invalid user ciuser from 104.199.174.199


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.199.174.199
2019-07-09 15:46:47
165.22.112.87 attackbotsspam
Jul  8 00:41:58 h2040555 sshd[21489]: Invalid user aaa from 165.22.112.87
Jul  8 00:41:58 h2040555 sshd[21489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.87 
Jul  8 00:42:00 h2040555 sshd[21489]: Failed password for invalid user aaa from 165.22.112.87 port 59062 ssh2
Jul  8 00:42:00 h2040555 sshd[21489]: Received disconnect from 165.22.112.87: 11: Bye Bye [preauth]
Jul  8 00:45:02 h2040555 sshd[21492]: Invalid user iptv from 165.22.112.87
Jul  8 00:45:02 h2040555 sshd[21492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.112.87 
Jul  8 00:45:03 h2040555 sshd[21492]: Failed password for invalid user iptv from 165.22.112.87 port 37620 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.22.112.87
2019-07-09 15:10:55

最近上报的IP列表

133.148.135.163 53.215.197.201 202.137.86.224 50.32.161.157
17.15.209.229 243.252.25.195 3.244.13.79 199.42.170.171
172.15.108.63 23.92.203.58 163.40.151.200 131.244.60.73
173.210.132.211 136.73.238.218 8.232.21.73 187.9.1.250
2.254.20.149 25.138.79.90 218.77.32.119 67.127.70.221