必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.145.80.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.145.80.55.			IN	A

;; AUTHORITY SECTION:
.			473	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 11:58:32 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 55.80.145.38.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.80.145.38.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.158 attack
fail2ban -- 218.92.0.158
...
2020-05-02 13:28:04
190.104.135.241 attackspam
trying to access non-authorized port
2020-05-02 13:37:29
161.35.138.226 attack
05/01/2020-23:57:03.749277 161.35.138.226 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-02 13:24:31
80.85.156.55 attackspambots
80.85.156.55 - - [02/May/2020:05:57:06 +0200] "GET /wp-login.php HTTP/1.1" 200 6124 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
80.85.156.55 - - [02/May/2020:05:57:11 +0200] "POST /wp-login.php HTTP/1.1" 200 6354 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
80.85.156.55 - - [02/May/2020:05:57:18 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-02 13:11:41
103.199.162.153 attack
Invalid user ses from 103.199.162.153 port 48270
2020-05-02 13:36:02
122.225.200.114 attackspambots
CPHulk brute force detection (a)
2020-05-02 13:38:34
51.38.129.74 attackbots
" "
2020-05-02 13:08:38
51.68.94.177 attack
$f2bV_matches
2020-05-02 13:38:04
185.186.247.189 attackspambots
2020-05-02T06:59:20.774601vps751288.ovh.net sshd\[22305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.186.247.189  user=root
2020-05-02T06:59:22.933961vps751288.ovh.net sshd\[22305\]: Failed password for root from 185.186.247.189 port 43222 ssh2
2020-05-02T07:03:32.883580vps751288.ovh.net sshd\[22365\]: Invalid user webadmin from 185.186.247.189 port 55646
2020-05-02T07:03:32.894969vps751288.ovh.net sshd\[22365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.186.247.189
2020-05-02T07:03:35.315340vps751288.ovh.net sshd\[22365\]: Failed password for invalid user webadmin from 185.186.247.189 port 55646 ssh2
2020-05-02 13:23:08
164.132.47.67 attackbotsspam
Invalid user ubuntu from 164.132.47.67 port 57248
2020-05-02 12:58:31
113.172.200.209 attackspam
2020-05-0205:57:081jUjH1-0000n9-EF\<=info@whatsup2013.chH=\(localhost\)[113.172.173.254]:54775P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3079id=002690c3c8e3c9c15d58ee42a5517b6784f9b8@whatsup2013.chT="Youtrulymakemysoulhot"forsimonhoare2@gmail.compansonjsanchez@gmail.com2020-05-0205:54:081jUjE7-0000Z5-DJ\<=info@whatsup2013.chH=\(localhost\)[113.172.126.84]:35547P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3201id=afde45161d36e3efc88d3b689c5b515d6e23de65@whatsup2013.chT="Youmakemysoulcomfy"forkinnu1234@gmail.comcplmcbride0811@gmail.com2020-05-0205:54:161jUjEF-0000Zz-6K\<=info@whatsup2013.chH=\(localhost\)[222.252.43.174]:33660P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3149id=02ad1b484368424ad6d365c92edaf0ec8acdb9@whatsup2013.chT="Younodoubtknow\,Isacrificedhappiness"formodeymkh@gmail.comalando1996@gmail.com2020-05-0205:54:261jUjEP-0000av-A2\<=info@whatsup2013.chH=\(l
2020-05-02 13:11:16
37.59.48.181 attackspam
2020-05-02T05:03:33.038573shield sshd\[14552\]: Invalid user andy from 37.59.48.181 port 51722
2020-05-02T05:03:33.045206shield sshd\[14552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3001311.ip-37-59-48.eu
2020-05-02T05:03:35.277749shield sshd\[14552\]: Failed password for invalid user andy from 37.59.48.181 port 51722 ssh2
2020-05-02T05:07:02.455457shield sshd\[14871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3001311.ip-37-59-48.eu  user=root
2020-05-02T05:07:04.706951shield sshd\[14871\]: Failed password for root from 37.59.48.181 port 34688 ssh2
2020-05-02 13:27:12
51.75.16.138 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-05-02 13:31:14
49.36.58.37 attackbotsspam
1588391823 - 05/02/2020 05:57:03 Host: 49.36.58.37/49.36.58.37 Port: 445 TCP Blocked
2020-05-02 13:23:33
201.69.28.75 attack
Invalid user sc from 201.69.28.75 port 51328
2020-05-02 13:30:16

最近上报的IP列表

38.140.212.0 38.145.82.147 38.145.81.119 38.143.1.237
38.135.241.96 38.135.241.132 38.135.241.222 38.135.240.56
137.226.111.167 137.226.107.209 137.226.106.79 137.226.182.154
94.102.63.93 38.135.233.13 36.85.133.21 142.252.198.182
183.81.32.198 122.166.158.56 126.142.9.125 183.48.26.99