必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.196.249.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.196.249.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:51:59 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 19.249.196.55.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 55.196.249.19.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.247.108.14 attackbots
12/30/2019-21:38:08.923111 77.247.108.14 Protocol: 17 ET SCAN Sipvicious Scan
2019-12-31 04:40:06
222.186.175.155 attack
--- report ---
Dec 30 16:45:34 -0300 sshd: Connection from 222.186.175.155 port 44484
Dec 30 16:45:37 -0300 sshd: Failed password for root from 222.186.175.155 port 44484 ssh2
Dec 30 16:45:38 -0300 sshd: Received disconnect from 222.186.175.155: 11:  [preauth]
2019-12-31 04:05:57
222.186.175.182 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
2019-12-31 04:05:33
4.14.65.34 attack
Dec 30 20:26:04 zeus sshd[11129]: Failed password for root from 4.14.65.34 port 4032 ssh2
Dec 30 20:28:14 zeus sshd[11211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.14.65.34 
Dec 30 20:28:16 zeus sshd[11211]: Failed password for invalid user hydro from 4.14.65.34 port 50347 ssh2
Dec 30 20:30:27 zeus sshd[11294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.14.65.34
2019-12-31 04:38:06
158.69.226.107 attackbotsspam
Dec 30 15:21:45 node1 sshd[2347]: Received disconnect from 158.69.226.107: 11: Normal Shutdown, Thank you for playing [preauth]
Dec 30 15:21:48 node1 sshd[2354]: Received disconnect from 158.69.226.107: 11: Normal Shutdown, Thank you for playing [preauth]
Dec 30 15:21:51 node1 sshd[2358]: Received disconnect from 158.69.226.107: 11: Normal Shutdown, Thank you for playing [preauth]
Dec 30 15:21:55 node1 sshd[2365]: Received disconnect from 158.69.226.107: 11: Normal Shutdown, Thank you for playing [preauth]
Dec 30 15:21:59 node1 sshd[2371]: Received disconnect from 158.69.226.107: 11: Normal Shutdown, Thank you for playing [preauth]
Dec 30 15:22:03 node1 sshd[2424]: Received disconnect from 158.69.226.107: 11: Normal Shutdown, Thank you for playing [preauth]
Dec 30 15:22:13 node1 sshd[2468]: Received disconnect from 158.69.226.107: 11: Normal Shutdown, Thank you for playing [preauth]
Dec 30 15:22:59 node1 sshd[2509]: Received disconnect from 158.69.226.107: 11: Normal Sh........
-------------------------------
2019-12-31 04:08:45
190.202.109.244 attack
Dec 30 21:13:38 localhost sshd\[25347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.202.109.244  user=root
Dec 30 21:13:40 localhost sshd\[25347\]: Failed password for root from 190.202.109.244 port 59506 ssh2
Dec 30 21:14:43 localhost sshd\[25445\]: Invalid user foo from 190.202.109.244 port 40192
2019-12-31 04:20:01
222.186.175.150 attack
Dec 30 21:25:20 h2177944 sshd\[11936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Dec 30 21:25:23 h2177944 sshd\[11936\]: Failed password for root from 222.186.175.150 port 1218 ssh2
Dec 30 21:25:26 h2177944 sshd\[11936\]: Failed password for root from 222.186.175.150 port 1218 ssh2
Dec 30 21:25:30 h2177944 sshd\[11936\]: Failed password for root from 222.186.175.150 port 1218 ssh2
...
2019-12-31 04:29:19
189.209.218.146 attackbotsspam
Automatic report - Port Scan Attack
2019-12-31 04:24:50
61.76.175.195 attackspam
2019-09-06T13:20:40.893815-07:00 suse-nuc sshd[26359]: Invalid user postgres from 61.76.175.195 port 46222
...
2019-12-31 04:12:58
45.55.84.16 attack
2019-12-30T15:04:23.302420xentho-1 sshd[319490]: Invalid user bestin from 45.55.84.16 port 33439
2019-12-30T15:04:23.307208xentho-1 sshd[319490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.84.16
2019-12-30T15:04:23.302420xentho-1 sshd[319490]: Invalid user bestin from 45.55.84.16 port 33439
2019-12-30T15:04:25.304835xentho-1 sshd[319490]: Failed password for invalid user bestin from 45.55.84.16 port 33439 ssh2
2019-12-30T15:06:49.744326xentho-1 sshd[319501]: Invalid user studieveileder from 45.55.84.16 port 46600
2019-12-30T15:06:49.751613xentho-1 sshd[319501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.84.16
2019-12-30T15:06:49.744326xentho-1 sshd[319501]: Invalid user studieveileder from 45.55.84.16 port 46600
2019-12-30T15:06:51.126984xentho-1 sshd[319501]: Failed password for invalid user studieveileder from 45.55.84.16 port 46600 ssh2
2019-12-30T15:09:11.901445xentho-1 sshd[319542
...
2019-12-31 04:45:11
194.67.209.24 attackspambots
Lines containing failures of 194.67.209.24
Dec 30 08:45:55 supported sshd[30684]: Did not receive identification string from 194.67.209.24 port 52478
Dec 30 08:45:55 supported sshd[30685]: Invalid user logcheck-86.8.220.83 from 194.67.209.24 port 52564
Dec 30 08:45:55 supported sshd[30685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.67.209.24 
Dec 30 08:45:57 supported sshd[30685]: Failed password for invalid user logcheck-86.8.220.83 from 194.67.209.24 port 52564 ssh2
Dec 30 08:45:57 supported sshd[30685]: Connection closed by invalid user logcheck-86.8.220.83 194.67.209.24 port 52564 [preauth]
Dec 30 12:29:56 supported sshd[23826]: Invalid user 123 from 194.67.209.24 port 46774
Dec 30 12:29:57 supported sshd[23826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.67.209.24 
Dec 30 12:29:58 supported sshd[23826]: Failed password for invalid user 123 from 194.67.209.24 port 46774........
------------------------------
2019-12-31 04:04:15
77.38.96.119 attackbots
Unauthorized connection attempt detected from IP address 77.38.96.119 to port 22
2019-12-31 04:17:16
87.248.7.125 attack
Automatic report - Port Scan Attack
2019-12-31 04:32:51
222.64.152.115 attackspambots
Dec 30 15:14:37 plusreed sshd[13443]: Invalid user asterisk from 222.64.152.115
...
2019-12-31 04:24:29
118.190.119.120 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-12-31 04:31:10

最近上报的IP列表

134.173.188.13 169.63.55.12 159.82.213.211 134.60.97.121
177.54.18.195 217.44.14.93 174.244.11.86 104.251.148.53
208.72.157.193 139.192.69.106 21.164.227.22 158.129.3.247
13.115.42.69 58.113.242.255 31.62.90.65 138.132.138.79
92.165.86.20 2.83.92.106 245.193.118.12 87.67.193.90