必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.168.146.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.168.146.125.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030201 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 04:04:01 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 125.146.168.55.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 55.168.146.125.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.79.249.222 attackspam
SSH Bruteforce attempt
2020-03-10 22:10:52
110.78.175.87 attackbotsspam
scan z
2020-03-10 21:52:38
92.118.37.74 attack
Mar 10 15:25:03 debian-2gb-nbg1-2 kernel: \[6109450.027875\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.74 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=26492 PROTO=TCP SPT=58558 DPT=5110 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-10 22:40:51
220.134.32.127 attackbotsspam
Automatic report - Port Scan Attack
2020-03-10 22:05:27
87.118.76.192 attack
Website administration hacking try
2020-03-10 22:26:09
185.36.81.23 attackbots
Mar 10 14:32:17 srv01 postfix/smtpd\[4288\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 14:35:53 srv01 postfix/smtpd\[4288\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 14:36:58 srv01 postfix/smtpd\[4288\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 14:38:22 srv01 postfix/smtpd\[7450\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 14:38:52 srv01 postfix/smtpd\[7450\]: warning: unknown\[185.36.81.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-10 21:58:44
54.236.132.128 attackbots
Fail2Ban Ban Triggered
2020-03-10 22:07:00
103.200.22.217 attackspambots
Website administration hacking try
2020-03-10 21:53:13
173.208.236.218 attackspambots
spammed contact form
2020-03-10 21:59:14
144.91.116.48 attack
Hit on CMS login honeypot
2020-03-10 21:55:28
45.146.200.96 attackbotsspam
Lines containing failures of 45.146.200.96
Mar 10 10:06:50 omfg postfix/smtpd[13551]: connect from argue.ioflearning.com[45.146.200.96]
Mar x@x
Mar 10 10:07:00 omfg postfix/smtpd[13551]: disconnect from argue.ioflearning.com[45.146.200.96] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.146.200.96
2020-03-10 22:02:36
109.227.63.3 attackspam
Scan on closed tcp port 22  (ssh)
2020-03-10 22:33:53
171.224.181.220 attack
Port probing on unauthorized port 8291
2020-03-10 22:23:20
192.241.208.155 attack
404 NOT FOUND
2020-03-10 22:30:30
14.244.50.205 attack
2020-03-10T09:21:49.772Z CLOSE host=14.244.50.205 port=58537 fd=4 time=50.039 bytes=67
...
2020-03-10 22:41:26

最近上报的IP列表

169.104.187.156 149.115.5.91 64.187.251.178 241.78.45.156
168.5.211.17 196.29.208.152 252.249.101.43 168.222.251.254
18.38.66.170 29.215.224.200 56.247.8.178 76.76.154.104
152.11.231.231 151.102.101.116 17.99.152.158 206.202.82.160
83.124.34.71 198.80.221.32 198.123.152.110 100.54.172.123