必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.144.234.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.144.234.156.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 02:12:59 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 156.234.144.55.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 55.144.234.156.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.89.51.205 attack
Unauthorized connection attempt from IP address 36.89.51.205 on Port 445(SMB)
2020-04-01 02:21:46
118.70.190.25 attack
Mar 31 20:07:59 legacy sshd[23747]: Failed password for root from 118.70.190.25 port 57720 ssh2
Mar 31 20:12:40 legacy sshd[23876]: Failed password for root from 118.70.190.25 port 41962 ssh2
...
2020-04-01 02:18:59
103.129.222.135 attackbots
(sshd) Failed SSH login from 103.129.222.135 (ID/Indonesia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 21:04:37 srv sshd[26164]: Invalid user imai from 103.129.222.135 port 55255
Mar 31 21:04:39 srv sshd[26164]: Failed password for invalid user imai from 103.129.222.135 port 55255 ssh2
Mar 31 21:10:33 srv sshd[26443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.135  user=root
Mar 31 21:10:35 srv sshd[26443]: Failed password for root from 103.129.222.135 port 42077 ssh2
Mar 31 21:14:54 srv sshd[26612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.135  user=root
2020-04-01 02:16:42
201.49.127.212 attackspam
bruteforce detected
2020-04-01 02:18:29
46.242.15.5 attackspambots
Unauthorized connection attempt detected from IP address 46.242.15.5 to port 445
2020-04-01 01:51:46
190.25.235.184 attack
Unauthorized connection attempt detected from IP address 190.25.235.184 to port 23
2020-04-01 02:07:28
119.160.135.166 attackbots
Automatic report - WordPress Brute Force
2020-04-01 01:59:21
14.186.140.161 attackspambots
Unauthorized connection attempt from IP address 14.186.140.161 on Port 445(SMB)
2020-04-01 02:13:11
77.109.21.46 attack
Unauthorized connection attempt from IP address 77.109.21.46 on Port 445(SMB)
2020-04-01 01:51:29
139.167.142.218 attackspam
Unauthorized connection attempt from IP address 139.167.142.218 on Port 445(SMB)
2020-04-01 01:57:57
45.79.198.47 attackspam
Honeypot hit.
2020-04-01 02:24:56
103.123.65.35 attack
Automatic report BANNED IP
2020-04-01 02:05:38
13.69.97.37 attack
Brute forcing RDP port 3389
2020-04-01 01:52:19
175.24.4.159 attackbots
Mar 31 19:30:27 itv-usvr-01 sshd[25007]: Invalid user wujy from 175.24.4.159
2020-04-01 02:08:08
51.79.69.137 attackspam
5x Failed Password
2020-04-01 02:22:53

最近上报的IP列表

61.153.120.7 177.28.137.150 62.186.85.138 233.241.210.135
234.4.170.199 34.67.237.2 52.180.209.56 224.115.134.225
123.236.242.14 127.145.2.99 159.58.96.185 217.205.160.42
159.204.203.1 7.115.139.226 165.163.188.100 28.2.136.1
121.163.171.29 73.86.45.175 75.94.165.3 116.150.150.74