必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.119.241.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57706
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.119.241.163.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:18:58 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 163.241.119.55.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
server can't find 55.119.241.163.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.222.181.58 attackbots
2020-06-07T15:18:44.201642vps773228.ovh.net sshd[18348]: Failed password for root from 89.222.181.58 port 49888 ssh2
2020-06-07T15:24:04.802154vps773228.ovh.net sshd[18412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.222.181.58  user=root
2020-06-07T15:24:06.506537vps773228.ovh.net sshd[18412]: Failed password for root from 89.222.181.58 port 46878 ssh2
2020-06-07T15:29:28.727923vps773228.ovh.net sshd[18498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.222.181.58  user=root
2020-06-07T15:29:30.913664vps773228.ovh.net sshd[18498]: Failed password for root from 89.222.181.58 port 43872 ssh2
...
2020-06-08 02:29:32
218.92.0.145 attack
Jun  7 14:10:50 NPSTNNYC01T sshd[16987]: Failed password for root from 218.92.0.145 port 65001 ssh2
Jun  7 14:11:02 NPSTNNYC01T sshd[16987]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 65001 ssh2 [preauth]
Jun  7 14:11:15 NPSTNNYC01T sshd[17004]: Failed password for root from 218.92.0.145 port 23769 ssh2
...
2020-06-08 02:32:17
79.124.62.38 attack
RDP Brute-Force (honeypot 7)
2020-06-08 02:08:53
46.218.7.227 attackspam
Jun  7 14:11:03 v22019038103785759 sshd\[5796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227  user=root
Jun  7 14:11:04 v22019038103785759 sshd\[5796\]: Failed password for root from 46.218.7.227 port 38135 ssh2
Jun  7 14:16:01 v22019038103785759 sshd\[6130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227  user=root
Jun  7 14:16:04 v22019038103785759 sshd\[6130\]: Failed password for root from 46.218.7.227 port 39741 ssh2
Jun  7 14:21:02 v22019038103785759 sshd\[6415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227  user=root
...
2020-06-08 02:33:58
45.12.220.202 attackspam
honeypot forum registration (user=KevinFap; email=elama-16057964@yandex.ru)
2020-06-08 02:29:16
121.204.208.167 attack
Jun  7 12:15:13 vps46666688 sshd[9430]: Failed password for root from 121.204.208.167 port 39368 ssh2
...
2020-06-08 02:21:28
106.12.215.244 attack
Jun  7 20:22:34 localhost sshd\[20545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.244  user=root
Jun  7 20:22:37 localhost sshd\[20545\]: Failed password for root from 106.12.215.244 port 49416 ssh2
Jun  7 20:24:16 localhost sshd\[20609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.244  user=root
Jun  7 20:24:17 localhost sshd\[20609\]: Failed password for root from 106.12.215.244 port 45522 ssh2
Jun  7 20:26:00 localhost sshd\[20856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.244  user=root
...
2020-06-08 02:26:07
112.85.42.178 attackbotsspam
2020-06-07T20:11:53.095536vps751288.ovh.net sshd\[19936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178  user=root
2020-06-07T20:11:54.868062vps751288.ovh.net sshd\[19936\]: Failed password for root from 112.85.42.178 port 61258 ssh2
2020-06-07T20:11:57.731768vps751288.ovh.net sshd\[19936\]: Failed password for root from 112.85.42.178 port 61258 ssh2
2020-06-07T20:12:01.010781vps751288.ovh.net sshd\[19936\]: Failed password for root from 112.85.42.178 port 61258 ssh2
2020-06-07T20:12:04.366069vps751288.ovh.net sshd\[19936\]: Failed password for root from 112.85.42.178 port 61258 ssh2
2020-06-08 02:14:14
117.71.171.208 attack
Jun  7 13:58:17 georgia postfix/smtpd[13302]: connect from unknown[117.71.171.208]
Jun  7 13:58:18 georgia postfix/smtpd[13302]: warning: unknown[117.71.171.208]: SASL LOGIN authentication failed: authentication failure
Jun  7 13:58:18 georgia postfix/smtpd[13302]: lost connection after AUTH from unknown[117.71.171.208]
Jun  7 13:58:18 georgia postfix/smtpd[13302]: disconnect from unknown[117.71.171.208] ehlo=1 auth=0/1 commands=1/2
Jun  7 13:58:18 georgia postfix/smtpd[13302]: connect from unknown[117.71.171.208]
Jun  7 13:58:19 georgia postfix/smtpd[13302]: warning: unknown[117.71.171.208]: SASL LOGIN authentication failed: authentication failure
Jun  7 13:58:20 georgia postfix/smtpd[13302]: lost connection after AUTH from unknown[117.71.171.208]
Jun  7 13:58:20 georgia postfix/smtpd[13302]: disconnect from unknown[117.71.171.208] ehlo=1 auth=0/1 commands=1/2
Jun  7 13:58:21 georgia postfix/smtpd[13305]: connect from unknown[117.71.171.208]
Jun  7 13:58:22 georgia pos........
-------------------------------
2020-06-08 02:00:52
74.208.250.167 attackspambots
74.208.250.167 - - [07/Jun/2020:20:14:25 +0200] "POST /wp-login.php HTTP/1.1" 200 5545 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
74.208.250.167 - - [07/Jun/2020:20:14:27 +0200] "POST /wp-login.php HTTP/1.1" 200 5523 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
74.208.250.167 - - [07/Jun/2020:20:14:30 +0200] "POST /wp-login.php HTTP/1.1" 200 5521 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
74.208.250.167 - - [07/Jun/2020:20:14:32 +0200] "POST /wp-login.php HTTP/1.1" 200 5524 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
74.208.250.167 - - [07/Jun/2020:20:14:34 +0200] "POST /wp-login.php HTTP/1.1" 200 5521 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-08 02:20:01
101.89.117.55 attackbotsspam
Jun  7 18:10:16 lukav-desktop sshd\[16111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.117.55  user=root
Jun  7 18:10:18 lukav-desktop sshd\[16111\]: Failed password for root from 101.89.117.55 port 45626 ssh2
Jun  7 18:17:06 lukav-desktop sshd\[8493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.117.55  user=root
Jun  7 18:17:07 lukav-desktop sshd\[8493\]: Failed password for root from 101.89.117.55 port 51510 ssh2
Jun  7 18:19:39 lukav-desktop sshd\[8538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.117.55  user=root
2020-06-08 02:29:47
42.119.201.40 attack
Unauthorised access (Jun  7) SRC=42.119.201.40 LEN=52 TTL=108 ID=20495 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-08 02:31:18
45.113.69.153 attack
45.113.69.153 (CA/Canada/-), 13 distributed sshd attacks on account [root] in the last 3600 secs
2020-06-08 02:36:50
106.75.55.123 attackspam
Jun  7 20:02:26 mail sshd[2086]: Failed password for root from 106.75.55.123 port 45154 ssh2
Jun  7 20:12:12 mail sshd[3298]: Failed password for root from 106.75.55.123 port 39978 ssh2
Jun  7 20:14:02 mail sshd[3508]: Failed password for root from 106.75.55.123 port 37600 ssh2
...
2020-06-08 02:25:39
128.199.44.102 attackbotsspam
2020-06-07T18:37:43.150145rocketchat.forhosting.nl sshd[10190]: Failed password for root from 128.199.44.102 port 45939 ssh2
2020-06-07T18:41:04.346386rocketchat.forhosting.nl sshd[10249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.44.102  user=root
2020-06-07T18:41:06.400061rocketchat.forhosting.nl sshd[10249]: Failed password for root from 128.199.44.102 port 46465 ssh2
...
2020-06-08 02:02:02

最近上报的IP列表

52.23.94.1 115.129.188.12 249.200.154.157 83.28.24.1
164.34.242.68 138.109.204.149 50.179.39.112 153.165.166.58
117.90.211.17 250.212.153.38 220.130.36.7 69.237.177.203
92.120.116.3 131.153.174.77 150.217.204.174 16.89.220.191
193.37.33.228 178.130.201.158 159.38.47.253 251.200.7.211