必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.242.121.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6076
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.242.121.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 08:50:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 80.121.242.55.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 55.242.121.80.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.232.160.213 attackspambots
Jun 22 16:35:47 l02a sshd[29444]: Invalid user lol from 14.232.160.213
Jun 22 16:35:47 l02a sshd[29444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.160.213 
Jun 22 16:35:47 l02a sshd[29444]: Invalid user lol from 14.232.160.213
Jun 22 16:35:49 l02a sshd[29444]: Failed password for invalid user lol from 14.232.160.213 port 39786 ssh2
2020-06-23 01:32:57
112.85.42.195 attack
Jun 22 17:09:52 onepixel sshd[813239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
Jun 22 17:09:54 onepixel sshd[813239]: Failed password for root from 112.85.42.195 port 40563 ssh2
Jun 22 17:09:52 onepixel sshd[813239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
Jun 22 17:09:54 onepixel sshd[813239]: Failed password for root from 112.85.42.195 port 40563 ssh2
Jun 22 17:09:59 onepixel sshd[813239]: Failed password for root from 112.85.42.195 port 40563 ssh2
2020-06-23 01:10:22
121.229.19.200 attack
Jun 22 15:05:12 vpn01 sshd[4102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.19.200
Jun 22 15:05:14 vpn01 sshd[4102]: Failed password for invalid user deploy from 121.229.19.200 port 41692 ssh2
...
2020-06-23 01:18:02
209.126.103.170 attack
Scanned 333 unique addresses for 1 unique TCP port in 24 hours (port 3389)
2020-06-23 01:24:18
222.186.42.7 attackbots
prod8
...
2020-06-23 01:18:33
113.125.98.206 attackspam
Jun 22 14:17:18 srv-ubuntu-dev3 sshd[114139]: Invalid user user1 from 113.125.98.206
Jun 22 14:17:18 srv-ubuntu-dev3 sshd[114139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.98.206
Jun 22 14:17:18 srv-ubuntu-dev3 sshd[114139]: Invalid user user1 from 113.125.98.206
Jun 22 14:17:20 srv-ubuntu-dev3 sshd[114139]: Failed password for invalid user user1 from 113.125.98.206 port 60678 ssh2
Jun 22 14:22:06 srv-ubuntu-dev3 sshd[114836]: Invalid user bea from 113.125.98.206
Jun 22 14:22:06 srv-ubuntu-dev3 sshd[114836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.98.206
Jun 22 14:22:06 srv-ubuntu-dev3 sshd[114836]: Invalid user bea from 113.125.98.206
Jun 22 14:22:08 srv-ubuntu-dev3 sshd[114836]: Failed password for invalid user bea from 113.125.98.206 port 48170 ssh2
Jun 22 14:26:31 srv-ubuntu-dev3 sshd[115452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser
...
2020-06-23 01:22:05
180.76.114.61 attack
Jun 22 14:48:02 vps647732 sshd[1076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.114.61
Jun 22 14:48:04 vps647732 sshd[1076]: Failed password for invalid user daniel from 180.76.114.61 port 39300 ssh2
...
2020-06-23 01:17:36
54.190.131.39 attackspambots
2020-06-22T11:53:25.266997abusebot-6.cloudsearch.cf sshd[14525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-54-190-131-39.us-west-2.compute.amazonaws.com  user=root
2020-06-22T11:53:28.190817abusebot-6.cloudsearch.cf sshd[14525]: Failed password for root from 54.190.131.39 port 37902 ssh2
2020-06-22T12:00:19.120697abusebot-6.cloudsearch.cf sshd[14862]: Invalid user ftpuser from 54.190.131.39 port 48190
2020-06-22T12:00:19.132833abusebot-6.cloudsearch.cf sshd[14862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-54-190-131-39.us-west-2.compute.amazonaws.com
2020-06-22T12:00:19.120697abusebot-6.cloudsearch.cf sshd[14862]: Invalid user ftpuser from 54.190.131.39 port 48190
2020-06-22T12:00:21.559442abusebot-6.cloudsearch.cf sshd[14862]: Failed password for invalid user ftpuser from 54.190.131.39 port 48190 ssh2
2020-06-22T12:03:24.349677abusebot-6.cloudsearch.cf sshd[15030]: Invalid user teamspe
...
2020-06-23 01:14:05
89.206.59.83 attackbotsspam
Automatic report - Banned IP Access
2020-06-23 01:11:53
94.102.51.58 attackspam
TCP ports : 35908 / 35982 / 35988 / 36009 / 36047 / 36049 / 36056 / 36073 / 36078 / 36084
2020-06-23 01:08:59
14.142.143.138 attackspam
Jun 22 16:03:22 scw-tender-jepsen sshd[12703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.143.138
Jun 22 16:03:24 scw-tender-jepsen sshd[12703]: Failed password for invalid user gis from 14.142.143.138 port 55038 ssh2
2020-06-23 00:57:29
106.12.56.126 attackbotsspam
2020-06-22T10:32:12.474239linuxbox-skyline sshd[91421]: Invalid user naman from 106.12.56.126 port 45550
...
2020-06-23 01:14:54
190.210.182.179 attackbots
Triggered by Fail2Ban at Ares web server
2020-06-23 01:33:21
104.223.197.142 attackspam
Invalid user mongod from 104.223.197.142 port 54166
2020-06-23 01:19:52
85.26.165.100 attackbotsspam
Automatic report - Port Scan Attack
2020-06-23 01:06:24

最近上报的IP列表

78.181.39.216 15.20.50.221 170.68.91.184 118.211.235.96
126.125.172.70 250.189.253.218 175.132.12.113 184.88.43.199
93.170.145.158 175.136.224.94 94.20.229.15 150.217.85.9
198.202.123.104 38.189.134.8 196.75.158.47 148.101.159.251
241.216.9.159 218.75.235.80 189.185.150.200 62.137.182.242