必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.122.55.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13896
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.122.55.172.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:26:33 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 172.55.122.41.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.55.122.41.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.123.116.174 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-27 19:46:29
91.209.65.98 attackbotsspam
2019-10-27T12:09:39.396545abusebot-6.cloudsearch.cf sshd\[20157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.209.65.98  user=root
2019-10-27 20:13:06
104.243.41.97 attackbots
Automatic report - Banned IP Access
2019-10-27 20:11:58
185.105.121.55 attack
2019-10-27T23:09:24.929986luisaranguren sshd[673390]: Connection from 185.105.121.55 port 30506 on 10.10.10.6 port 22
2019-10-27T23:09:27.128910luisaranguren sshd[673390]: Invalid user beast from 185.105.121.55 port 30506
2019-10-27T23:09:27.138455luisaranguren sshd[673390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.105.121.55
2019-10-27T23:09:24.929986luisaranguren sshd[673390]: Connection from 185.105.121.55 port 30506 on 10.10.10.6 port 22
2019-10-27T23:09:27.128910luisaranguren sshd[673390]: Invalid user beast from 185.105.121.55 port 30506
2019-10-27T23:09:29.358262luisaranguren sshd[673390]: Failed password for invalid user beast from 185.105.121.55 port 30506 ssh2
...
2019-10-27 20:19:26
78.234.142.90 attackspam
2019-10-27T11:34:48.534978abusebot-5.cloudsearch.cf sshd\[459\]: Invalid user user from 78.234.142.90 port 44690
2019-10-27 19:45:28
190.13.129.34 attackspambots
Oct 27 01:34:37 friendsofhawaii sshd\[32667\]: Invalid user liuchang from 190.13.129.34
Oct 27 01:34:37 friendsofhawaii sshd\[32667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34
Oct 27 01:34:39 friendsofhawaii sshd\[32667\]: Failed password for invalid user liuchang from 190.13.129.34 port 54464 ssh2
Oct 27 01:40:08 friendsofhawaii sshd\[815\]: Invalid user contin from 190.13.129.34
Oct 27 01:40:08 friendsofhawaii sshd\[815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34
2019-10-27 19:46:14
106.13.181.68 attack
Oct 27 03:12:22 askasleikir sshd[1150403]: Failed password for root from 106.13.181.68 port 43000 ssh2
Oct 27 02:55:31 askasleikir sshd[1149962]: Failed password for invalid user xs from 106.13.181.68 port 59496 ssh2
2019-10-27 20:06:42
51.38.128.211 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-10-27 20:11:39
37.49.231.130 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 24 - port: 5038 proto: TCP cat: Misc Attack
2019-10-27 20:00:41
200.161.173.52 attackbotsspam
scan z
2019-10-27 20:05:51
36.22.187.34 attackspam
2019-10-27T03:20:52.0547171495-001 sshd\[21968\]: Invalid user san from 36.22.187.34 port 55626
2019-10-27T03:20:52.0582121495-001 sshd\[21968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22.187.34
2019-10-27T03:20:53.8945181495-001 sshd\[21968\]: Failed password for invalid user san from 36.22.187.34 port 55626 ssh2
2019-10-27T03:25:39.9664251495-001 sshd\[22228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22.187.34  user=root
2019-10-27T03:25:42.2072861495-001 sshd\[22228\]: Failed password for root from 36.22.187.34 port 34622 ssh2
2019-10-27T03:30:34.3332351495-001 sshd\[22840\]: Invalid user uirc from 36.22.187.34 port 41846
2019-10-27T03:30:34.3360691495-001 sshd\[22840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22.187.34
...
2019-10-27 20:01:26
23.247.98.142 attack
Oct 27 04:33:42 mxgate1 postfix/postscreen[27206]: CONNECT from [23.247.98.142]:44342 to [176.31.12.44]:25
Oct 27 04:33:42 mxgate1 postfix/dnsblog[27210]: addr 23.247.98.142 listed by domain zen.spamhaus.org as 127.0.0.3
Oct 27 04:33:42 mxgate1 postfix/dnsblog[27208]: addr 23.247.98.142 listed by domain b.barracudacentral.org as 127.0.0.2
Oct 27 04:33:48 mxgate1 postfix/postscreen[27206]: DNSBL rank 3 for [23.247.98.142]:44342
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=23.247.98.142
2019-10-27 20:06:18
45.82.32.178 attackspambots
Autoban   45.82.32.178 AUTH/CONNECT
2019-10-27 20:02:26
222.186.169.192 attackbotsspam
Oct 27 12:51:35 MK-Soft-VM5 sshd[3050]: Failed password for root from 222.186.169.192 port 53868 ssh2
Oct 27 12:51:39 MK-Soft-VM5 sshd[3050]: Failed password for root from 222.186.169.192 port 53868 ssh2
...
2019-10-27 19:52:17
217.182.220.124 attackspambots
Oct 27 07:16:27 ws19vmsma01 sshd[99239]: Failed password for root from 217.182.220.124 port 58772 ssh2
...
2019-10-27 20:09:24

最近上报的IP列表

130.239.29.48 34.147.54.177 7.156.103.152 116.36.19.182
44.54.90.27 84.84.88.208 149.143.14.73 6.175.188.165
161.207.27.219 17.12.8.170 226.69.39.83 211.8.131.78
156.118.242.24 171.94.52.231 51.193.46.118 195.109.106.244
40.59.203.236 36.100.117.153 24.192.9.77 254.4.234.48