必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.180.189.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.180.189.75.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021201 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 04:40:07 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 75.189.180.55.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 55.180.189.75.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
64.227.65.97 attackbots
Automatic report - XMLRPC Attack
2020-06-06 00:49:34
156.213.13.124 attackbots
xmlrpc attack
2020-06-06 00:51:30
41.223.142.211 attackspambots
2020-06-05T16:10:10.885438vps751288.ovh.net sshd\[28553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211  user=root
2020-06-05T16:10:12.886229vps751288.ovh.net sshd\[28553\]: Failed password for root from 41.223.142.211 port 32837 ssh2
2020-06-05T16:14:15.891918vps751288.ovh.net sshd\[28603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211  user=root
2020-06-05T16:14:17.858779vps751288.ovh.net sshd\[28603\]: Failed password for root from 41.223.142.211 port 58860 ssh2
2020-06-05T16:18:27.598837vps751288.ovh.net sshd\[28651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.142.211  user=root
2020-06-06 00:46:53
95.216.38.186 attackbotsspam
20 attempts against mh-misbehave-ban on ice
2020-06-06 00:45:37
181.231.83.162 attack
Jun  5 17:13:58 ns382633 sshd\[2382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.231.83.162  user=root
Jun  5 17:14:00 ns382633 sshd\[2382\]: Failed password for root from 181.231.83.162 port 50731 ssh2
Jun  5 17:38:05 ns382633 sshd\[6998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.231.83.162  user=root
Jun  5 17:38:06 ns382633 sshd\[6998\]: Failed password for root from 181.231.83.162 port 57158 ssh2
Jun  5 17:44:12 ns382633 sshd\[8037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.231.83.162  user=root
2020-06-06 00:42:18
77.42.86.36 attackbots
Automatic report - Port Scan Attack
2020-06-06 01:03:19
49.234.158.131 attack
Jun  5 18:27:08 abendstille sshd\[32619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.158.131  user=root
Jun  5 18:27:10 abendstille sshd\[32619\]: Failed password for root from 49.234.158.131 port 39392 ssh2
Jun  5 18:30:28 abendstille sshd\[3257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.158.131  user=root
Jun  5 18:30:29 abendstille sshd\[3257\]: Failed password for root from 49.234.158.131 port 47118 ssh2
Jun  5 18:37:04 abendstille sshd\[9533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.158.131  user=root
...
2020-06-06 00:50:02
124.244.116.219 attackspam
124.244.116.219 - - [05/Jun/2020:17:21:13 +0200] "GET /wp-login.php HTTP/1.1" 200 6302 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
124.244.116.219 - - [05/Jun/2020:17:21:14 +0200] "POST /wp-login.php HTTP/1.1" 200 6469 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
124.244.116.219 - - [05/Jun/2020:17:21:16 +0200] "GET /wp-login.php HTTP/1.1" 200 6302 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-06 00:40:29
114.119.167.52 attackspam
Automatic report - Banned IP Access
2020-06-06 00:53:15
85.175.4.21 attackspambots
Probing for vulnerable services
2020-06-06 01:08:41
106.12.174.111 attack
reported through recidive - multiple failed attempts(SSH)
2020-06-06 01:07:43
94.159.47.198 attack
Jun  5 12:44:13 NPSTNNYC01T sshd[18804]: Failed password for root from 94.159.47.198 port 55930 ssh2
Jun  5 12:47:44 NPSTNNYC01T sshd[19061]: Failed password for root from 94.159.47.198 port 58094 ssh2
...
2020-06-06 00:56:05
121.162.131.223 attack
Jun  5 14:46:44 roki-contabo sshd\[3079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.131.223  user=root
Jun  5 14:46:46 roki-contabo sshd\[3079\]: Failed password for root from 121.162.131.223 port 50533 ssh2
Jun  5 14:54:13 roki-contabo sshd\[3259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.131.223  user=root
Jun  5 14:54:15 roki-contabo sshd\[3259\]: Failed password for root from 121.162.131.223 port 51813 ssh2
Jun  5 15:00:02 roki-contabo sshd\[3354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.131.223  user=root
...
2020-06-06 00:48:04
222.252.118.47 attackspambots
Invalid user admin from 222.252.118.47 port 53914
2020-06-06 01:09:25
77.42.120.248 attackbotsspam
Port probing on unauthorized port 23
2020-06-06 01:06:48

最近上报的IP列表

21.249.18.161 6.64.32.105 98.210.92.5 107.74.161.65
232.247.34.113 128.97.220.121 153.149.22.191 250.203.157.238
231.31.189.107 131.152.159.136 56.230.181.181 199.151.60.30
22.210.80.60 138.79.3.102 101.16.35.176 150.177.43.148
167.72.237.97 27.15.246.81 170.118.105.238 176.35.246.136