必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.42.91.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.42.91.8.			IN	A

;; AUTHORITY SECTION:
.			18	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052800 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 28 14:13:07 CST 2023
;; MSG SIZE  rcvd: 103
HOST信息:
Host 8.91.42.55.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 55.42.91.8.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.116.77.90 attackspambots
Caught in portsentry honeypot
2019-09-04 08:51:20
193.169.252.83 attackspam
Brute force RDP, port 3389
2019-09-04 08:28:35
187.181.65.60 attackspam
Jul 16 17:33:17 Server10 sshd[29399]: Invalid user bart from 187.181.65.60 port 55677
Jul 16 17:33:17 Server10 sshd[29399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.181.65.60
Jul 16 17:33:19 Server10 sshd[29399]: Failed password for invalid user bart from 187.181.65.60 port 55677 ssh2
Aug 12 21:54:19 Server10 sshd[13061]: Invalid user testuser from 187.181.65.60 port 49453
Aug 12 21:54:19 Server10 sshd[13061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.181.65.60
Aug 12 21:54:22 Server10 sshd[13061]: Failed password for invalid user testuser from 187.181.65.60 port 49453 ssh2
2019-09-04 08:55:14
218.92.0.163 attackspam
Sep  3 23:16:32 tuxlinux sshd[19667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.163  user=root
Sep  3 23:16:34 tuxlinux sshd[19667]: Failed password for root from 218.92.0.163 port 4582 ssh2
Sep  3 23:16:32 tuxlinux sshd[19667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.163  user=root
Sep  3 23:16:34 tuxlinux sshd[19667]: Failed password for root from 218.92.0.163 port 4582 ssh2
Sep  3 23:16:32 tuxlinux sshd[19667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.163  user=root
Sep  3 23:16:34 tuxlinux sshd[19667]: Failed password for root from 218.92.0.163 port 4582 ssh2
Sep  3 23:16:38 tuxlinux sshd[19667]: Failed password for root from 218.92.0.163 port 4582 ssh2
...
2019-09-04 09:03:50
187.18.175.12 attackbotsspam
Automated report - ssh fail2ban:
Sep 4 02:03:58 authentication failure 
Sep 4 02:04:00 wrong password, user=black, port=42256, ssh2
Sep 4 02:08:35 authentication failure
2019-09-04 08:56:40
128.199.162.108 attackspambots
Sep  3 18:45:03 aat-srv002 sshd[3067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.108
Sep  3 18:45:05 aat-srv002 sshd[3067]: Failed password for invalid user python from 128.199.162.108 port 45728 ssh2
Sep  3 18:49:32 aat-srv002 sshd[3263]: Failed password for root from 128.199.162.108 port 33602 ssh2
Sep  3 18:54:06 aat-srv002 sshd[3448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.108
...
2019-09-04 08:46:36
187.188.169.123 attackspam
Sep  3 23:57:40 hcbbdb sshd\[25962\]: Invalid user uno8 from 187.188.169.123
Sep  3 23:57:40 hcbbdb sshd\[25962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-169-123.totalplay.net
Sep  3 23:57:43 hcbbdb sshd\[25962\]: Failed password for invalid user uno8 from 187.188.169.123 port 51096 ssh2
Sep  4 00:02:32 hcbbdb sshd\[26518\]: Invalid user sftptest from 187.188.169.123
Sep  4 00:02:32 hcbbdb sshd\[26518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-169-123.totalplay.net
2019-09-04 08:42:08
178.176.174.242 attackspambots
Sep  3 20:31:13 mail postfix/submission/smtpd[3761]: warning: unknown[178.176.174.242]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 20:33:29 mail postfix/submission/smtpd[3776]: warning: unknown[178.176.174.242]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 20:33:59 mail postfix/smtpd[3780]: warning: unknown[178.176.174.242]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-04 08:52:54
191.53.52.149 attackbots
Sep  3 20:34:37 arianus postfix/smtps/smtpd\[19142\]: warning: unknown\[191.53.52.149\]: SASL PLAIN authentication failed:
...
2019-09-04 08:29:46
40.71.170.117 attackbotsspam
Port Scan: TCP/443
2019-09-04 08:43:53
14.241.67.226 attack
Unauthorized connection attempt from IP address 14.241.67.226 on Port 445(SMB)
2019-09-04 09:02:56
122.176.27.149 attack
Sep  4 01:29:25 v22019058497090703 sshd[6374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.27.149
Sep  4 01:29:27 v22019058497090703 sshd[6374]: Failed password for invalid user cychen from 122.176.27.149 port 36580 ssh2
Sep  4 01:34:52 v22019058497090703 sshd[6807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.27.149
...
2019-09-04 08:27:44
68.183.193.46 attackbots
Sep  4 00:47:07 hb sshd\[30824\]: Invalid user zs from 68.183.193.46
Sep  4 00:47:07 hb sshd\[30824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.46
Sep  4 00:47:09 hb sshd\[30824\]: Failed password for invalid user zs from 68.183.193.46 port 38158 ssh2
Sep  4 00:51:04 hb sshd\[31214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.46  user=root
Sep  4 00:51:05 hb sshd\[31214\]: Failed password for root from 68.183.193.46 port 54388 ssh2
2019-09-04 08:56:18
109.167.98.27 attackspambots
Sep  3 20:26:34 ny01 sshd[24067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.98.27
Sep  3 20:26:36 ny01 sshd[24067]: Failed password for invalid user appadmin from 109.167.98.27 port 55646 ssh2
Sep  3 20:31:36 ny01 sshd[25018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.98.27
2019-09-04 08:35:00
84.201.165.126 attack
Sep  3 14:33:41 aiointranet sshd\[5040\]: Invalid user test from 84.201.165.126
Sep  3 14:33:41 aiointranet sshd\[5040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.165.126
Sep  3 14:33:44 aiointranet sshd\[5040\]: Failed password for invalid user test from 84.201.165.126 port 37526 ssh2
Sep  3 14:37:38 aiointranet sshd\[5379\]: Invalid user sirene from 84.201.165.126
Sep  3 14:37:38 aiointranet sshd\[5379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.165.126
2019-09-04 08:38:08

最近上报的IP列表

120.151.117.69 31.5.212.2 225.96.9.184 50.19.153.219
36.84.111.178 89.22.60.16 50.106.3.27 44.76.3.57
2.44.145.193 23.249.236.28 16.177.230.27 142.237.2.92
35.168.100.117 48.76.60.120 35.21.45.52 220.208.136.133
13.235.95.210 195.17.1.246 157.34.18.126 35.116.20.116