必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.125.158.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.125.158.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:21:05 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 91.158.125.55.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 55.125.158.91.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
67.207.83.127 attackbotsspam
Fail2Ban Ban Triggered
2019-12-23 08:31:38
51.77.147.51 attackspam
Dec 23 01:08:24 meumeu sshd[5738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.147.51 
Dec 23 01:08:25 meumeu sshd[5738]: Failed password for invalid user yeh from 51.77.147.51 port 54768 ssh2
Dec 23 01:13:26 meumeu sshd[6509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.147.51 
...
2019-12-23 08:26:35
1.221.192.149 attackspam
IMAP/SMTP Authentication Failure
2019-12-23 08:52:31
87.140.6.227 attackbotsspam
Dec 23 05:23:53 gw1 sshd[20277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.140.6.227
Dec 23 05:23:55 gw1 sshd[20277]: Failed password for invalid user idc from 87.140.6.227 port 57978 ssh2
...
2019-12-23 08:38:23
107.170.249.243 attack
Dec 22 14:44:31 sachi sshd\[25506\]: Invalid user heinrich from 107.170.249.243
Dec 22 14:44:31 sachi sshd\[25506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.243
Dec 22 14:44:32 sachi sshd\[25506\]: Failed password for invalid user heinrich from 107.170.249.243 port 54728 ssh2
Dec 22 14:54:29 sachi sshd\[26540\]: Invalid user magdalen from 107.170.249.243
Dec 22 14:54:29 sachi sshd\[26540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.243
2019-12-23 08:58:52
94.180.245.1 attack
Forged login request.
2019-12-23 08:28:41
104.236.228.46 attack
Invalid user prueba from 104.236.228.46 port 45660
2019-12-23 09:01:43
222.186.173.142 attackspambots
Dec 23 01:28:25 minden010 sshd[9088]: Failed password for root from 222.186.173.142 port 17654 ssh2
Dec 23 01:28:28 minden010 sshd[9088]: Failed password for root from 222.186.173.142 port 17654 ssh2
Dec 23 01:28:31 minden010 sshd[9088]: Failed password for root from 222.186.173.142 port 17654 ssh2
Dec 23 01:28:35 minden010 sshd[9088]: Failed password for root from 222.186.173.142 port 17654 ssh2
...
2019-12-23 08:43:11
45.93.20.190 attack
Unauthorized connection attempt detected from IP address 45.93.20.190 to port 6724
2019-12-23 08:47:35
178.128.22.249 attackspam
Dec 23 00:51:38 * sshd[21964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.22.249
Dec 23 00:51:40 * sshd[21964]: Failed password for invalid user tanerykah from 178.128.22.249 port 48813 ssh2
2019-12-23 08:29:03
180.76.246.38 attackspambots
Dec 23 01:51:09 vps691689 sshd[7533]: Failed password for root from 180.76.246.38 port 51052 ssh2
Dec 23 01:56:26 vps691689 sshd[7646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.38
...
2019-12-23 09:04:23
74.101.225.208 attackspam
" "
2019-12-23 08:44:20
124.205.103.66 attack
Dec 23 00:35:33 vtv3 sshd[27011]: Failed password for root from 124.205.103.66 port 57150 ssh2
Dec 23 00:39:50 vtv3 sshd[28597]: Failed password for root from 124.205.103.66 port 47611 ssh2
Dec 23 00:44:09 vtv3 sshd[30718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.103.66 
Dec 23 00:56:42 vtv3 sshd[4271]: Failed password for root from 124.205.103.66 port 37738 ssh2
Dec 23 01:00:55 vtv3 sshd[6229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.103.66 
Dec 23 01:00:57 vtv3 sshd[6229]: Failed password for invalid user yosih from 124.205.103.66 port 56440 ssh2
Dec 23 01:13:18 vtv3 sshd[11652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.103.66 
Dec 23 01:13:20 vtv3 sshd[11652]: Failed password for invalid user kryn from 124.205.103.66 port 56076 ssh2
Dec 23 01:17:35 vtv3 sshd[13660]: Failed password for root from 124.205.103.66 port 46549 ssh2
Dec 23 01:30:04
2019-12-23 08:37:45
185.153.197.162 attack
Scanning random ports - tries to find possible vulnerable services
2019-12-23 08:46:06
104.236.66.128 attack
Dec 23 05:28:25 gw1 sshd[20466]: Failed password for mysql from 104.236.66.128 port 52410 ssh2
...
2019-12-23 08:36:13

最近上报的IP列表

8.122.211.110 166.249.72.134 47.190.154.81 221.171.160.9
251.218.49.213 50.85.246.42 233.195.28.23 108.230.59.119
81.89.70.35 231.76.164.77 126.13.156.40 132.210.1.59
35.26.175.53 40.242.52.80 201.234.97.113 15.243.63.211
100.205.198.78 27.255.247.93 147.41.237.193 195.77.217.245