必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 255.61.248.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;255.61.248.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 15:55:12 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 148.248.61.255.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.248.61.255.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.88.112.71 attack
2019-11-14T20:28:50.342344shield sshd\[16001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-11-14T20:28:52.169347shield sshd\[16001\]: Failed password for root from 49.88.112.71 port 21014 ssh2
2019-11-14T20:28:54.172188shield sshd\[16001\]: Failed password for root from 49.88.112.71 port 21014 ssh2
2019-11-14T20:28:56.120631shield sshd\[16001\]: Failed password for root from 49.88.112.71 port 21014 ssh2
2019-11-14T20:29:25.511200shield sshd\[16059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
2019-11-15 04:36:58
60.2.100.46 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-15 04:36:30
107.189.10.174 attackspam
Invalid user fake from 107.189.10.174 port 58830
2019-11-15 04:44:08
112.47.92.116 attackspam
Bad crawling causing excessive 404 errors
2019-11-15 04:26:44
183.134.212.25 attackbotsspam
Nov 12 00:48:40 shadeyouvpn sshd[631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.212.25  user=r.r
Nov 12 00:48:42 shadeyouvpn sshd[631]: Failed password for r.r from 183.134.212.25 port 46946 ssh2
Nov 12 00:48:42 shadeyouvpn sshd[631]: Received disconnect from 183.134.212.25: 11: Bye Bye [preauth]
Nov 12 01:07:15 shadeyouvpn sshd[11896]: Invalid user secretary from 183.134.212.25
Nov 12 01:07:15 shadeyouvpn sshd[11896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.212.25 
Nov 12 01:07:17 shadeyouvpn sshd[11896]: Failed password for invalid user secretary from 183.134.212.25 port 44871 ssh2
Nov 12 01:07:17 shadeyouvpn sshd[11896]: Received disconnect from 183.134.212.25: 11: Bye Bye [preauth]
Nov 12 01:12:31 shadeyouvpn sshd[15489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.212.25  user=r.r
Nov 12 01:12:33 shadeyou........
-------------------------------
2019-11-15 04:38:15
92.86.68.53 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/92.86.68.53/ 
 
 RO - 1H : (40)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RO 
 NAME ASN : ASN9050 
 
 IP : 92.86.68.53 
 
 CIDR : 92.86.0.0/16 
 
 PREFIX COUNT : 222 
 
 UNIQUE IP COUNT : 1518080 
 
 
 ATTACKS DETECTED ASN9050 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 8 
 
 DateTime : 2019-11-14 15:33:18 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-15 04:25:25
61.91.64.118 attackbots
Lines containing failures of 61.91.64.118
Nov 11 17:36:01 shared06 sshd[4804]: Invalid user admin from 61.91.64.118 port 63793
Nov 11 17:36:01 shared06 sshd[4804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.91.64.118
Nov 11 17:36:03 shared06 sshd[4804]: Failed password for invalid user admin from 61.91.64.118 port 63793 ssh2
Nov 11 17:36:03 shared06 sshd[4804]: error: Received disconnect from 61.91.64.118 port 63793:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
Nov 11 17:36:03 shared06 sshd[4804]: Disconnected from invalid user admin 61.91.64.118 port 63793 [preauth]
Nov 14 05:12:42 shared06 sshd[5255]: Invalid user admin from 61.91.64.118 port 50543
Nov 14 05:12:42 shared06 sshd[5255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.91.64.118
Nov 14 05:12:44 shared06 sshd[5255]: Failed password for invalid user admin from 61.91.64.118 port 50543 ssh2


........
-----------------------------------------------
ht
2019-11-15 04:55:51
218.61.41.7 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/218.61.41.7/ 
 
 CN - 1H : (1217)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 218.61.41.7 
 
 CIDR : 218.61.0.0/17 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 12 
  3H - 44 
  6H - 104 
 12H - 228 
 24H - 487 
 
 DateTime : 2019-11-14 15:32:32 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-15 04:49:46
185.43.209.210 attackspam
smtp attack
2019-11-15 04:20:54
102.132.231.235 attackspam
Port Scan: TCP/23
2019-11-15 04:36:16
91.23.33.175 attackbotsspam
Invalid user ts6 from 91.23.33.175 port 43555
2019-11-15 04:47:37
112.104.28.187 attack
" "
2019-11-15 04:42:06
117.119.84.34 attack
2019-11-14T16:41:57.044568shield sshd\[1845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34  user=games
2019-11-14T16:41:59.041739shield sshd\[1845\]: Failed password for games from 117.119.84.34 port 39005 ssh2
2019-11-14T16:47:23.462990shield sshd\[2300\]: Invalid user birte from 117.119.84.34 port 53739
2019-11-14T16:47:23.467655shield sshd\[2300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.119.84.34
2019-11-14T16:47:25.550398shield sshd\[2300\]: Failed password for invalid user birte from 117.119.84.34 port 53739 ssh2
2019-11-15 04:53:47
116.248.41.55 attackbotsspam
ILLEGAL ACCESS imap
2019-11-15 04:48:07
178.176.175.182 attackspambots
Brute force attempt
2019-11-15 04:30:13

最近上报的IP列表

247.81.196.153 24.45.135.212 214.177.241.143 134.87.171.98
5.51.165.221 68.243.39.170 38.188.162.152 5.182.160.180
153.84.94.115 193.92.51.237 86.13.199.64 211.95.252.171
223.107.37.204 239.68.204.181 155.51.164.161 84.78.186.185
233.114.13.218 97.200.177.178 163.36.83.42 88.96.45.153