必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.111.196.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.111.196.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 14:47:22 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 197.196.111.55.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 55.111.196.197.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.178.175.73 attackbotsspam
Aug 26 12:25:48 linuxrulz sshd[7768]: Invalid user 111 from 119.178.175.73 port 59454
Aug 26 12:25:48 linuxrulz sshd[7768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.178.175.73
Aug 26 12:25:50 linuxrulz sshd[7768]: Failed password for invalid user 111 from 119.178.175.73 port 59454 ssh2
Aug 26 12:25:51 linuxrulz sshd[7768]: Received disconnect from 119.178.175.73 port 59454:11: Bye Bye [preauth]
Aug 26 12:25:51 linuxrulz sshd[7768]: Disconnected from 119.178.175.73 port 59454 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.178.175.73
2019-08-27 06:52:42
140.143.45.22 attackbots
Aug 26 08:27:30 web9 sshd\[20229\]: Invalid user oracle from 140.143.45.22
Aug 26 08:27:30 web9 sshd\[20229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.45.22
Aug 26 08:27:32 web9 sshd\[20229\]: Failed password for invalid user oracle from 140.143.45.22 port 42110 ssh2
Aug 26 08:32:18 web9 sshd\[21188\]: Invalid user www from 140.143.45.22
Aug 26 08:32:18 web9 sshd\[21188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.45.22
2019-08-27 07:24:53
117.81.232.169 attackbots
Aug 26 20:31:27 eventyay sshd[4838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.81.232.169
Aug 26 20:31:29 eventyay sshd[4838]: Failed password for invalid user liorder from 117.81.232.169 port 42294 ssh2
Aug 26 20:36:34 eventyay sshd[4919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.81.232.169
...
2019-08-27 07:29:54
134.209.126.154 attack
Aug 26 12:56:22 tdfoods sshd\[17780\]: Invalid user anastacia from 134.209.126.154
Aug 26 12:56:22 tdfoods sshd\[17780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.126.154
Aug 26 12:56:24 tdfoods sshd\[17780\]: Failed password for invalid user anastacia from 134.209.126.154 port 36886 ssh2
Aug 26 13:00:26 tdfoods sshd\[18128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.126.154  user=root
Aug 26 13:00:28 tdfoods sshd\[18128\]: Failed password for root from 134.209.126.154 port 54320 ssh2
2019-08-27 07:10:06
119.187.25.211 attackspambots
Aug 26 14:38:04 linuxrulz sshd[25847]: Invalid user mis from 119.187.25.211 port 55160
Aug 26 14:38:04 linuxrulz sshd[25847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.187.25.211
Aug 26 14:38:07 linuxrulz sshd[25847]: Failed password for invalid user mis from 119.187.25.211 port 55160 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.187.25.211
2019-08-27 07:16:43
165.22.181.77 attackspam
SSH/22 MH Probe, BF, Hack -
2019-08-27 07:08:06
125.162.164.45 attackbotsspam
Automatic report - Port Scan Attack
2019-08-27 07:00:52
120.52.121.86 attackbotsspam
Aug 27 00:22:06 ubuntu-2gb-nbg1-dc3-1 sshd[28856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.121.86
Aug 27 00:22:08 ubuntu-2gb-nbg1-dc3-1 sshd[28856]: Failed password for invalid user myworkingcrack from 120.52.121.86 port 56677 ssh2
...
2019-08-27 07:14:20
118.143.198.3 attackspambots
Automatic report - Banned IP Access
2019-08-27 07:04:40
60.184.244.44 attackbots
fraudulent SSH attempt
2019-08-27 07:06:24
14.29.251.33 attackspam
Aug 26 15:06:13 hcbbdb sshd\[11386\]: Invalid user stars from 14.29.251.33
Aug 26 15:06:13 hcbbdb sshd\[11386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.251.33
Aug 26 15:06:14 hcbbdb sshd\[11386\]: Failed password for invalid user stars from 14.29.251.33 port 60682 ssh2
Aug 26 15:09:01 hcbbdb sshd\[11712\]: Invalid user monitor from 14.29.251.33
Aug 26 15:09:01 hcbbdb sshd\[11712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.251.33
2019-08-27 06:49:21
81.30.203.70 attackspambots
SSH Brute Force, server-1 sshd[6764]: Failed password for invalid user teamspeak-server from 81.30.203.70 port 42526 ssh2
2019-08-27 07:08:56
162.247.74.7 attackbots
Aug 27 00:49:12 MK-Soft-Root1 sshd\[28028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.7  user=sshd
Aug 27 00:49:14 MK-Soft-Root1 sshd\[28028\]: Failed password for sshd from 162.247.74.7 port 57098 ssh2
Aug 27 00:49:17 MK-Soft-Root1 sshd\[28028\]: Failed password for sshd from 162.247.74.7 port 57098 ssh2
...
2019-08-27 06:56:40
51.77.146.153 attackspam
Aug 26 18:51:34 SilenceServices sshd[20747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.153
Aug 26 18:51:36 SilenceServices sshd[20747]: Failed password for invalid user stack from 51.77.146.153 port 44018 ssh2
Aug 26 18:55:38 SilenceServices sshd[22185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.153
2019-08-27 06:47:51
95.59.137.133 attackbots
19/8/26@09:28:19: FAIL: Alarm-Intrusion address from=95.59.137.133
...
2019-08-27 07:25:23

最近上报的IP列表

17.0.199.220 247.137.163.215 21.181.190.157 136.51.27.227
233.134.237.222 162.63.217.225 168.226.225.220 38.185.249.215
52.84.41.162 67.144.142.34 34.129.116.215 248.211.66.109
6.81.91.59 84.19.58.12 175.114.12.151 75.186.184.132
27.239.156.108 138.230.199.13 211.239.28.175 4.27.38.68