必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
45.55.47.149 attackspambots
Dec 15 16:00:22 pi sshd\[28520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149
Dec 15 16:00:25 pi sshd\[28520\]: Failed password for invalid user guest from 45.55.47.149 port 43554 ssh2
Dec 15 16:08:29 pi sshd\[28765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=root
Dec 15 16:08:30 pi sshd\[28765\]: Failed password for root from 45.55.47.149 port 47598 ssh2
Dec 15 16:17:04 pi sshd\[29131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=sync
...
2019-12-16 00:25:35
45.55.47.149 attack
Dec  7 10:24:18 game-panel sshd[10536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149
Dec  7 10:24:19 game-panel sshd[10536]: Failed password for invalid user svartberg from 45.55.47.149 port 57197 ssh2
Dec  7 10:32:59 game-panel sshd[10920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149
2019-12-07 18:47:54
45.55.47.149 attackspam
$f2bV_matches
2019-12-05 15:00:22
45.55.47.149 attack
Nov 19 07:48:52 124388 sshd[13533]: Invalid user hank from 45.55.47.149 port 36055
Nov 19 07:48:52 124388 sshd[13533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149
Nov 19 07:48:52 124388 sshd[13533]: Invalid user hank from 45.55.47.149 port 36055
Nov 19 07:48:54 124388 sshd[13533]: Failed password for invalid user hank from 45.55.47.149 port 36055 ssh2
Nov 19 07:53:50 124388 sshd[13547]: Invalid user syncg from 45.55.47.149 port 54566
2019-11-19 16:39:22
45.55.47.128 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-12 07:51:12
45.55.47.128 attackbots
Automatic report - Banned IP Access
2019-11-11 05:03:20
45.55.47.149 attackspambots
2019-11-07T19:19:28.092897abusebot-7.cloudsearch.cf sshd\[28541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=root
2019-11-08 03:21:47
45.55.47.149 attackspambots
Nov  7 05:27:28 srv2 sshd\[17891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=root
Nov  7 05:27:29 srv2 sshd\[17891\]: Failed password for root from 45.55.47.149 port 39744 ssh2
Nov  7 05:33:06 srv2 sshd\[17898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=root
...
2019-11-07 20:29:54
45.55.47.149 attackspambots
failed root login
2019-10-27 17:20:45
45.55.47.149 attackspambots
2019-10-20T08:03:45.098641ns525875 sshd\[10510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=root
2019-10-20T08:03:47.526676ns525875 sshd\[10510\]: Failed password for root from 45.55.47.149 port 46499 ssh2
2019-10-20T08:09:42.532210ns525875 sshd\[17742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=root
2019-10-20T08:09:43.972927ns525875 sshd\[17742\]: Failed password for root from 45.55.47.149 port 38157 ssh2
...
2019-10-20 20:16:03
45.55.47.149 attackspam
Oct 14 01:59:26 auw2 sshd\[3793\]: Invalid user Reset@2017 from 45.55.47.149
Oct 14 01:59:26 auw2 sshd\[3793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149
Oct 14 01:59:28 auw2 sshd\[3793\]: Failed password for invalid user Reset@2017 from 45.55.47.149 port 47776 ssh2
Oct 14 02:04:52 auw2 sshd\[4275\]: Invalid user P@ssw0rt1! from 45.55.47.149
Oct 14 02:04:52 auw2 sshd\[4275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149
2019-10-14 23:57:06
45.55.47.149 attackspambots
Oct 13 09:30:42 lanister sshd[12587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=root
Oct 13 09:30:44 lanister sshd[12587]: Failed password for root from 45.55.47.149 port 41940 ssh2
Oct 13 09:36:26 lanister sshd[12632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.47.149  user=root
Oct 13 09:36:28 lanister sshd[12632]: Failed password for root from 45.55.47.149 port 33776 ssh2
...
2019-10-13 23:42:45
45.55.47.149 attackbotsspam
Oct  7 07:36:19 MK-Soft-VM6 sshd[22338]: Failed password for root from 45.55.47.149 port 49233 ssh2
...
2019-10-07 14:07:33
45.55.47.128 attackbots
Automatic report generated by Wazuh
2019-10-03 06:19:50
45.55.47.128 attackbots
Automatic report - Banned IP Access
2019-10-03 02:48:31
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.55.47.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.55.47.122.			IN	A

;; AUTHORITY SECTION:
.			485	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:16:07 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
122.47.55.45.in-addr.arpa domain name pointer 45.55.47.122.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.47.55.45.in-addr.arpa	name = 45.55.47.122.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.202.203.102 attack
Unauthorized connection attempt detected from IP address 112.202.203.102 to port 5555 [J]
2020-01-07 18:27:48
221.120.236.50 attackspam
Unauthorized connection attempt detected from IP address 221.120.236.50 to port 2220 [J]
2020-01-07 18:16:07
203.146.26.105 attackbots
Unauthorized connection attempt detected from IP address 203.146.26.105 to port 1433 [J]
2020-01-07 18:48:37
37.142.207.244 attackbots
Unauthorized connection attempt detected from IP address 37.142.207.244 to port 23 [J]
2020-01-07 18:43:02
196.52.43.89 attackspam
Unauthorized connection attempt detected from IP address 196.52.43.89 to port 502 [J]
2020-01-07 18:49:56
206.189.146.13 attackspam
Unauthorized connection attempt detected from IP address 206.189.146.13 to port 2220 [J]
2020-01-07 18:48:07
95.133.49.187 attack
Unauthorized connection attempt detected from IP address 95.133.49.187 to port 80 [J]
2020-01-07 18:35:31
157.97.95.219 attack
unauthorized connection attempt
2020-01-07 18:54:02
118.69.32.167 attackbots
Unauthorized connection attempt detected from IP address 118.69.32.167 to port 2220 [J]
2020-01-07 18:26:18
110.52.215.89 attackspam
SSH/22 MH Probe, BF, Hack -
2020-01-07 18:28:41
114.33.131.9 attackbots
Unauthorized connection attempt detected from IP address 114.33.131.9 to port 23 [J]
2020-01-07 18:27:10
112.111.163.9 attackbots
Unauthorized connection attempt detected from IP address 112.111.163.9 to port 5555 [J]
2020-01-07 18:28:13
177.95.108.156 attackspambots
Unauthorized connection attempt detected from IP address 177.95.108.156 to port 23 [J]
2020-01-07 18:52:25
1.36.217.90 attackspambots
Unauthorized connection attempt detected from IP address 1.36.217.90 to port 5555 [J]
2020-01-07 18:44:57
35.220.222.65 attackbots
Lines containing failures of 35.220.222.65
Jan  7 05:42:58 kmh-vmh-001-fsn05 sshd[10811]: Invalid user frk from 35.220.222.65 port 49038
Jan  7 05:42:58 kmh-vmh-001-fsn05 sshd[10811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.220.222.65 
Jan  7 05:43:00 kmh-vmh-001-fsn05 sshd[10811]: Failed password for invalid user frk from 35.220.222.65 port 49038 ssh2
Jan  7 05:43:01 kmh-vmh-001-fsn05 sshd[10811]: Received disconnect from 35.220.222.65 port 49038:11: Bye Bye [preauth]
Jan  7 05:43:01 kmh-vmh-001-fsn05 sshd[10811]: Disconnected from invalid user frk 35.220.222.65 port 49038 [preauth]
Jan  7 05:59:53 kmh-vmh-001-fsn05 sshd[13744]: Invalid user monhostnameor from 35.220.222.65 port 59144
Jan  7 05:59:53 kmh-vmh-001-fsn05 sshd[13744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.220.222.65 
Jan  7 05:59:55 kmh-vmh-001-fsn05 sshd[13744]: Failed password for invalid user monhostna........
------------------------------
2020-01-07 18:43:58

最近上报的IP列表

42.239.235.201 193.233.230.54 63.40.216.130 122.4.50.49
201.238.154.92 54.163.217.43 218.71.88.92 45.169.128.14
101.35.251.190 77.242.110.131 95.101.239.59 128.199.147.56
85.239.59.166 89.44.241.129 154.209.125.30 104.144.210.244
178.147.118.194 103.43.5.83 112.4.54.184 190.109.171.5