必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.145.94.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.145.94.97.			IN	A

;; AUTHORITY SECTION:
.			99	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041201 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 13 07:16:07 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 97.94.145.55.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 55.145.94.97.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
142.44.242.38 attackspambots
Aug 12 10:08:06 vibhu-HP-Z238-Microtower-Workstation sshd\[31280\]: Invalid user alexandre from 142.44.242.38
Aug 12 10:08:06 vibhu-HP-Z238-Microtower-Workstation sshd\[31280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.242.38
Aug 12 10:08:07 vibhu-HP-Z238-Microtower-Workstation sshd\[31280\]: Failed password for invalid user alexandre from 142.44.242.38 port 48109 ssh2
Aug 12 10:12:14 vibhu-HP-Z238-Microtower-Workstation sshd\[31463\]: Invalid user merje from 142.44.242.38
Aug 12 10:12:14 vibhu-HP-Z238-Microtower-Workstation sshd\[31463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.242.38
...
2019-08-12 12:47:27
198.23.139.22 attackspam
12.08.2019 02:44:00 Recursive DNS scan
2019-08-12 12:55:56
194.204.208.10 attack
2019-08-12T04:47:54.902189abusebot-8.cloudsearch.cf sshd\[27002\]: Invalid user vpnuser1 from 194.204.208.10 port 60654
2019-08-12 12:55:10
60.191.23.27 attack
$f2bV_matches
2019-08-12 12:53:37
43.229.134.40 attackbotsspam
2019-08-12T09:44:52.118607enmeeting.mahidol.ac.th sshd\[32652\]: User root from 43.229.134.40 not allowed because not listed in AllowUsers
2019-08-12T09:44:52.240270enmeeting.mahidol.ac.th sshd\[32652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.134.40  user=root
2019-08-12T09:44:53.989337enmeeting.mahidol.ac.th sshd\[32652\]: Failed password for invalid user root from 43.229.134.40 port 53410 ssh2
...
2019-08-12 12:27:57
117.173.67.119 attackbotsspam
Aug  7 17:08:21 cumulus sshd[25975]: Invalid user testtest from 117.173.67.119 port 2057
Aug  7 17:08:21 cumulus sshd[25975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119
Aug  7 17:08:23 cumulus sshd[25975]: Failed password for invalid user testtest from 117.173.67.119 port 2057 ssh2
Aug  7 17:08:23 cumulus sshd[25975]: Received disconnect from 117.173.67.119 port 2057:11: Bye Bye [preauth]
Aug  7 17:08:23 cumulus sshd[25975]: Disconnected from 117.173.67.119 port 2057 [preauth]
Aug  8 04:32:17 cumulus sshd[15453]: Invalid user bruce from 117.173.67.119 port 2058
Aug  8 04:32:17 cumulus sshd[15453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119
Aug  8 04:32:19 cumulus sshd[15453]: Failed password for invalid user bruce from 117.173.67.119 port 2058 ssh2
Aug  8 04:32:19 cumulus sshd[15453]: Received disconnect from 117.173.67.119 port 2058:11: Bye Bye [preau........
-------------------------------
2019-08-12 12:52:36
128.199.178.188 attackbots
Automatic report - Banned IP Access
2019-08-12 13:04:46
182.16.115.130 attackspambots
Aug 12 07:24:52 pkdns2 sshd\[53511\]: Invalid user djlhc111com from 182.16.115.130Aug 12 07:24:53 pkdns2 sshd\[53511\]: Failed password for invalid user djlhc111com from 182.16.115.130 port 58920 ssh2Aug 12 07:29:43 pkdns2 sshd\[53749\]: Invalid user zaleski from 182.16.115.130Aug 12 07:29:44 pkdns2 sshd\[53749\]: Failed password for invalid user zaleski from 182.16.115.130 port 47756 ssh2Aug 12 07:34:19 pkdns2 sshd\[53953\]: Invalid user cmc from 182.16.115.130Aug 12 07:34:21 pkdns2 sshd\[53953\]: Failed password for invalid user cmc from 182.16.115.130 port 36582 ssh2
...
2019-08-12 12:57:39
213.182.94.121 attackbots
Aug 12 06:20:24 vps647732 sshd[14006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.182.94.121
Aug 12 06:20:25 vps647732 sshd[14006]: Failed password for invalid user odpcache from 213.182.94.121 port 43540 ssh2
...
2019-08-12 12:29:42
106.12.76.91 attackbotsspam
Aug 12 04:26:27 host sshd[11468]: Invalid user fang from 106.12.76.91
Aug 12 04:26:27 host sshd[11468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.76.91
Aug 12 04:26:29 host sshd[11468]: Failed password for invalid user fang from 106.12.76.91 port 40898 ssh2
Aug 12 04:29:48 host sshd[12314]: Invalid user coin from 106.12.76.91
Aug 12 04:29:48 host sshd[12314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.76.91

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.12.76.91
2019-08-12 12:26:34
221.122.93.232 attackspam
Aug 12 00:26:14 xtremcommunity sshd\[25609\]: Invalid user matias from 221.122.93.232 port 42332
Aug 12 00:26:14 xtremcommunity sshd\[25609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.93.232
Aug 12 00:26:16 xtremcommunity sshd\[25609\]: Failed password for invalid user matias from 221.122.93.232 port 42332 ssh2
Aug 12 00:31:16 xtremcommunity sshd\[25739\]: Invalid user stephan from 221.122.93.232 port 60724
Aug 12 00:31:16 xtremcommunity sshd\[25739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.93.232
...
2019-08-12 12:32:10
218.92.0.204 attackspam
Aug 12 06:29:09 mail sshd\[5924\]: Failed password for root from 218.92.0.204 port 56418 ssh2
Aug 12 06:29:11 mail sshd\[5924\]: Failed password for root from 218.92.0.204 port 56418 ssh2
Aug 12 06:33:58 mail sshd\[6670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
Aug 12 06:34:00 mail sshd\[6670\]: Failed password for root from 218.92.0.204 port 55986 ssh2
Aug 12 06:34:02 mail sshd\[6670\]: Failed password for root from 218.92.0.204 port 55986 ssh2
2019-08-12 12:48:26
202.43.164.46 attack
Invalid user android from 202.43.164.46 port 48954
2019-08-12 13:08:14
51.83.76.139 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.76.139  user=root
Failed password for root from 51.83.76.139 port 49924 ssh2
Failed password for root from 51.83.76.139 port 49924 ssh2
Failed password for root from 51.83.76.139 port 49924 ssh2
Failed password for root from 51.83.76.139 port 49924 ssh2
2019-08-12 12:39:09
78.128.113.73 attackbots
Aug 12 06:06:23 mail postfix/smtpd\[31246\]: warning: unknown\[78.128.113.73\]: SASL PLAIN authentication failed:
Aug 12 06:06:39 mail postfix/smtpd\[2399\]: warning: unknown\[78.128.113.73\]: SASL PLAIN authentication failed:
Aug 12 06:09:30 mail postfix/smtpd\[2400\]: warning: unknown\[78.128.113.73\]: SASL PLAIN authentication failed:
2019-08-12 12:51:49

最近上报的IP列表

63.59.101.26 19.101.140.74 29.12.5.109 243.16.21.20
82.8.118.50 185.144.137.66 63.138.43.172 254.255.136.121
83.164.65.207 161.221.95.5 124.72.27.97 129.43.96.93
51.227.82.172 119.1.83.198 107.85.74.138 178.114.198.215
185.183.71.223 213.8.199.8 189.97.185.94 160.6.72.89