必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.142.83.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.142.83.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 04:01:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 197.83.142.55.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 55.142.83.197.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.55.80.72 attackbotsspam
Automatic report - Port Scan Attack
2020-08-06 04:44:31
201.105.122.55 attackbots
Port probing on unauthorized port 445
2020-08-06 05:01:53
51.75.66.92 attackspambots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-06 04:34:42
37.59.47.61 attackbots
37.59.47.61 - - [05/Aug/2020:21:27:29 +0100] "POST /wp-login.php HTTP/1.1" 200 6981 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.47.61 - - [05/Aug/2020:21:28:31 +0100] "POST /wp-login.php HTTP/1.1" 200 6981 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.47.61 - - [05/Aug/2020:21:30:23 +0100] "POST /wp-login.php HTTP/1.1" 200 6981 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-06 04:31:28
212.70.149.82 attackbotsspam
Postfix Brute-Force reported by Fail2Ban
2020-08-06 05:00:39
92.62.131.106 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 2948 proto: tcp cat: Misc Attackbytes: 60
2020-08-06 04:24:50
93.86.224.157 attack
93.86.224.157 - - [05/Aug/2020:22:14:13 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
93.86.224.157 - - [05/Aug/2020:22:41:19 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-08-06 05:00:01
5.232.116.115 attack
20/8/5@08:10:16: FAIL: Alarm-Network address from=5.232.116.115
20/8/5@08:10:16: FAIL: Alarm-Network address from=5.232.116.115
...
2020-08-06 04:25:27
106.52.40.48 attackbots
Aug  5 22:28:27 OPSO sshd\[21650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.40.48  user=root
Aug  5 22:28:30 OPSO sshd\[21650\]: Failed password for root from 106.52.40.48 port 37272 ssh2
Aug  5 22:30:29 OPSO sshd\[22152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.40.48  user=root
Aug  5 22:30:31 OPSO sshd\[22152\]: Failed password for root from 106.52.40.48 port 38628 ssh2
Aug  5 22:32:35 OPSO sshd\[22465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.40.48  user=root
2020-08-06 04:33:15
185.18.133.35 attackbots
(smtpauth) Failed SMTP AUTH login from 185.18.133.35 (PL/Poland/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-05 16:39:57 plain authenticator failed for ([185.18.133.35]) [185.18.133.35]: 535 Incorrect authentication data (set_id=reta.reta5246@iwnt.com)
2020-08-06 04:37:43
198.12.156.214 attackbotsspam
198.12.156.214 - - [05/Aug/2020:17:47:22 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.12.156.214 - - [05/Aug/2020:17:47:24 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.12.156.214 - - [05/Aug/2020:17:47:25 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-06 04:26:01
202.168.205.181 attackspambots
Aug  5 22:38:50 piServer sshd[1009]: Failed password for root from 202.168.205.181 port 15028 ssh2
Aug  5 22:41:48 piServer sshd[1478]: Failed password for root from 202.168.205.181 port 6410 ssh2
...
2020-08-06 05:02:22
51.255.131.231 attack
2020-08-05T22:42:41.353944hz01.yumiweb.com sshd\[3904\]: Invalid user ubnt from 51.255.131.231 port 37444
2020-08-05T22:42:41.582633hz01.yumiweb.com sshd\[3906\]: Invalid user admin from 51.255.131.231 port 37898
2020-08-05T22:42:42.006153hz01.yumiweb.com sshd\[3910\]: Invalid user 1234 from 51.255.131.231 port 38774
...
2020-08-06 04:51:05
187.237.91.218 attackbotsspam
Aug  5 22:36:45 abendstille sshd\[23126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.237.91.218  user=root
Aug  5 22:36:48 abendstille sshd\[23126\]: Failed password for root from 187.237.91.218 port 49908 ssh2
Aug  5 22:39:08 abendstille sshd\[25553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.237.91.218  user=root
Aug  5 22:39:10 abendstille sshd\[25553\]: Failed password for root from 187.237.91.218 port 60438 ssh2
Aug  5 22:41:28 abendstille sshd\[27865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.237.91.218  user=root
...
2020-08-06 04:47:04
106.53.20.166 attackspam
Failed password for root from 106.53.20.166 port 33048 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.20.166  user=root
Failed password for root from 106.53.20.166 port 37826 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.20.166  user=root
Failed password for root from 106.53.20.166 port 42672 ssh2
2020-08-06 04:39:26

最近上报的IP列表

84.55.182.107 204.24.58.193 24.71.122.224 156.230.49.156
101.131.35.202 100.213.47.196 210.65.197.74 62.238.111.226
20.173.130.81 91.109.14.96 251.56.174.144 143.243.36.144
199.229.6.211 248.124.17.82 204.228.92.226 130.71.117.95
251.25.75.172 231.161.204.13 166.30.78.153 68.85.42.106