必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Alexandria

省份(region): Al Iskandariyah

国家(country): Egypt

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.242.55.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.242.55.47.			IN	A

;; AUTHORITY SECTION:
.			271	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022121001 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 11 11:21:01 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 47.55.242.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 47.55.242.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.211.62.131 attackbots
2019-12-12T06:45:55.749889shield sshd\[30675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.62.131  user=root
2019-12-12T06:45:57.605621shield sshd\[30675\]: Failed password for root from 129.211.62.131 port 57478 ssh2
2019-12-12T06:54:00.287503shield sshd\[32182\]: Invalid user user3 from 129.211.62.131 port 58445
2019-12-12T06:54:00.292498shield sshd\[32182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.62.131
2019-12-12T06:54:02.062970shield sshd\[32182\]: Failed password for invalid user user3 from 129.211.62.131 port 58445 ssh2
2019-12-12 15:06:43
61.158.167.175 attack
REQUESTED PAGE: /tags.php
2019-12-12 15:10:20
210.217.24.254 attack
Dec 11 07:24:48 ast sshd[17056]: Invalid user robert from 210.217.24.254 port 43138
Dec 11 10:25:17 ast sshd[17330]: Invalid user robert from 210.217.24.254 port 60046
Dec 12 01:30:09 ast sshd[20007]: Invalid user robert from 210.217.24.254 port 51770
...
2019-12-12 14:51:13
113.141.70.199 attack
Dec 12 07:29:37 nextcloud sshd\[6377\]: Invalid user daisy from 113.141.70.199
Dec 12 07:29:37 nextcloud sshd\[6377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.70.199
Dec 12 07:29:39 nextcloud sshd\[6377\]: Failed password for invalid user daisy from 113.141.70.199 port 54588 ssh2
...
2019-12-12 15:23:13
116.203.8.63 attack
Dec 12 12:05:16 gw1 sshd[16773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.8.63
Dec 12 12:05:17 gw1 sshd[16773]: Failed password for invalid user ftp from 116.203.8.63 port 60016 ssh2
...
2019-12-12 15:17:35
222.186.175.182 attackspam
2019-12-12T07:48:49.269446ns386461 sshd\[3283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-12-12T07:48:50.678527ns386461 sshd\[3283\]: Failed password for root from 222.186.175.182 port 47786 ssh2
2019-12-12T07:48:53.950521ns386461 sshd\[3283\]: Failed password for root from 222.186.175.182 port 47786 ssh2
2019-12-12T07:48:57.090419ns386461 sshd\[3283\]: Failed password for root from 222.186.175.182 port 47786 ssh2
2019-12-12T07:49:00.658515ns386461 sshd\[3283\]: Failed password for root from 222.186.175.182 port 47786 ssh2
...
2019-12-12 14:49:35
106.12.114.173 attack
Dec 11 20:22:49 php1 sshd\[12636\]: Invalid user all-telme from 106.12.114.173
Dec 11 20:22:49 php1 sshd\[12636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.114.173
Dec 11 20:22:51 php1 sshd\[12636\]: Failed password for invalid user all-telme from 106.12.114.173 port 56597 ssh2
Dec 11 20:30:01 php1 sshd\[13425\]: Invalid user westad from 106.12.114.173
Dec 11 20:30:01 php1 sshd\[13425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.114.173
2019-12-12 14:57:20
200.85.48.30 attackspambots
Dec 12 03:44:35 ws19vmsma01 sshd[127021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.85.48.30
Dec 12 03:44:38 ws19vmsma01 sshd[127021]: Failed password for invalid user boicelli from 200.85.48.30 port 34765 ssh2
...
2019-12-12 14:52:04
117.121.214.50 attackspambots
Dec 12 06:23:25 hcbbdb sshd\[4151\]: Invalid user admin from 117.121.214.50
Dec 12 06:23:25 hcbbdb sshd\[4151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.214.50
Dec 12 06:23:27 hcbbdb sshd\[4151\]: Failed password for invalid user admin from 117.121.214.50 port 33882 ssh2
Dec 12 06:29:57 hcbbdb sshd\[5812\]: Invalid user zhz from 117.121.214.50
Dec 12 06:29:57 hcbbdb sshd\[5812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.214.50
2019-12-12 15:12:17
37.114.132.82 attack
Wordpress XMLRPC attack
2019-12-12 15:03:07
201.66.237.66 attack
Unauthorized connection attempt detected from IP address 201.66.237.66 to port 445
2019-12-12 15:14:51
51.178.25.125 attack
51.178.25.125 - - [12/Dec/2019:07:20:33 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.178.25.125 - - [12/Dec/2019:07:20:33 +0100] "POST /wp-login.php HTTP/1.1" 200 2294 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.178.25.125 - - [12/Dec/2019:07:28:08 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.178.25.125 - - [12/Dec/2019:07:28:09 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.178.25.125 - - [12/Dec/2019:07:30:00 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.178.25.125 - - [12/Dec/2019:07:30:00 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-12 15:01:00
182.176.97.49 attackspambots
Dec 12 07:29:49 amit sshd\[1800\]: Invalid user admin from 182.176.97.49
Dec 12 07:29:49 amit sshd\[1800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.176.97.49
Dec 12 07:29:52 amit sshd\[1800\]: Failed password for invalid user admin from 182.176.97.49 port 56228 ssh2
...
2019-12-12 15:14:02
45.143.220.112 attackspambots
45.143.220.112 was recorded 25 times by 25 hosts attempting to connect to the following ports: 5090. Incident counter (4h, 24h, all-time): 25, 55, 235
2019-12-12 15:08:08
51.255.161.25 attack
Dec 12 07:29:47 MK-Soft-VM5 sshd[7567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.161.25 
Dec 12 07:29:49 MK-Soft-VM5 sshd[7567]: Failed password for invalid user wwwrun from 51.255.161.25 port 33468 ssh2
...
2019-12-12 15:19:26

最近上报的IP列表

45.62.57.43 44.199.174.150 43.63.98.5 185.68.253.16
41.92.125.133 58.38.238.203 116.146.8.70 251.248.20.202
201.91.55.111 143.110.255.118 183.137.174.0 163.247.150.156
9.20.90.114 43.164.5.232 23.228.172.146 10.11.142.5
114.5.208.235 204.180.65.147 38.44.209.23 2001:470:1:332::121