必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.58.82.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.58.82.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 13:12:11 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
55.82.58.219.in-addr.arpa domain name pointer softbank219058082055.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.82.58.219.in-addr.arpa	name = softbank219058082055.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.204.15.121 attackspambots
SSH invalid-user multiple login try
2020-04-12 08:14:14
106.13.140.52 attackbots
$f2bV_matches
2020-04-12 07:56:16
111.19.162.80 attackspambots
$f2bV_matches
2020-04-12 08:08:26
222.84.254.139 attackspam
Invalid user ervisor from 222.84.254.139 port 40846
2020-04-12 08:07:41
149.202.55.18 attackbots
Apr 12 00:07:14 ip-172-31-62-245 sshd\[29874\]: Invalid user phpbb from 149.202.55.18\
Apr 12 00:07:15 ip-172-31-62-245 sshd\[29874\]: Failed password for invalid user phpbb from 149.202.55.18 port 59376 ssh2\
Apr 12 00:09:32 ip-172-31-62-245 sshd\[29967\]: Failed password for root from 149.202.55.18 port 44416 ssh2\
Apr 12 00:11:47 ip-172-31-62-245 sshd\[29982\]: Failed password for root from 149.202.55.18 port 57672 ssh2\
Apr 12 00:14:05 ip-172-31-62-245 sshd\[30012\]: Failed password for root from 149.202.55.18 port 42706 ssh2\
2020-04-12 08:30:36
192.241.235.199 attackspam
" "
2020-04-12 07:55:58
51.77.151.147 attackbots
Apr 12 02:41:28 gw1 sshd[14878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.151.147
Apr 12 02:41:30 gw1 sshd[14878]: Failed password for invalid user bot from 51.77.151.147 port 58232 ssh2
...
2020-04-12 08:02:39
91.230.153.121 attack
Apr 12 02:00:17 debian-2gb-nbg1-2 kernel: \[8908618.852755\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=91.230.153.121 DST=195.201.40.59 LEN=40 TOS=0x10 PREC=0x60 TTL=245 ID=44007 PROTO=TCP SPT=44680 DPT=58013 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-12 08:01:07
222.169.185.234 attackspam
Apr 12 00:37:06 markkoudstaal sshd[23449]: Failed password for root from 222.169.185.234 port 49898 ssh2
Apr 12 00:41:05 markkoudstaal sshd[23984]: Failed password for root from 222.169.185.234 port 48414 ssh2
2020-04-12 07:57:00
119.254.155.187 attackspambots
Apr 12 00:25:09 OPSO sshd\[28638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.155.187  user=root
Apr 12 00:25:11 OPSO sshd\[28638\]: Failed password for root from 119.254.155.187 port 27013 ssh2
Apr 12 00:28:40 OPSO sshd\[29058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.155.187  user=halt
Apr 12 00:28:42 OPSO sshd\[29058\]: Failed password for halt from 119.254.155.187 port 20772 ssh2
Apr 12 00:32:12 OPSO sshd\[30194\]: Invalid user oracle from 119.254.155.187 port 14539
Apr 12 00:32:12 OPSO sshd\[30194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.254.155.187
2020-04-12 08:10:04
211.36.151.184 attack
Automatic report - Port Scan Attack
2020-04-12 08:20:10
34.67.47.205 attack
Apr 11 23:48:05 host01 sshd[30861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.67.47.205 
Apr 11 23:48:07 host01 sshd[30861]: Failed password for invalid user lahman from 34.67.47.205 port 33344 ssh2
Apr 11 23:51:48 host01 sshd[31532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.67.47.205 
...
2020-04-12 08:16:40
58.20.129.46 attack
Lines containing failures of 58.20.129.46
Apr 12 00:56:22 shared11 sshd[15050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.20.129.46  user=r.r
Apr 12 00:56:24 shared11 sshd[15050]: Failed password for r.r from 58.20.129.46 port 50412 ssh2
Apr 12 00:56:25 shared11 sshd[15050]: Received disconnect from 58.20.129.46 port 50412:11: Bye Bye [preauth]
Apr 12 00:56:25 shared11 sshd[15050]: Disconnected from authenticating user r.r 58.20.129.46 port 50412 [preauth]
Apr 12 01:14:39 shared11 sshd[20941]: Invalid user comrades from 58.20.129.46 port 57336
Apr 12 01:14:39 shared11 sshd[20941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.20.129.46
Apr 12 01:14:41 shared11 sshd[20941]: Failed password for invalid user comrades from 58.20.129.46 port 57336 ssh2
Apr 12 01:14:42 shared11 sshd[20941]: Received disconnect from 58.20.129.46 port 57336:11: Bye Bye [preauth]
Apr 12 01:14:42 shared11........
------------------------------
2020-04-12 08:09:26
167.114.92.60 attack
Automatic report - XMLRPC Attack
2020-04-12 08:25:20
78.241.123.119 attackbots
Port scan on 1 port(s): 25565
2020-04-12 07:58:10

最近上报的IP列表

134.104.22.135 197.15.141.241 123.96.19.230 4.225.37.35
242.128.39.249 23.207.18.4 60.235.62.66 8.30.119.186
13.235.123.225 3.209.143.233 107.171.153.221 143.108.114.113
138.66.77.187 180.244.88.108 187.67.35.192 99.41.48.21
212.127.27.69 223.33.197.228 15.246.125.208 209.10.11.89