必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.49.8.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2876
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.49.8.109.			IN	A

;; AUTHORITY SECTION:
.			172	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123001 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 10:18:00 CST 2021
;; MSG SIZE  rcvd: 104
HOST信息:
Host 109.8.49.55.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 55.49.8.109.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.243.143.208 attackbots
" "
2020-06-14 06:47:33
200.116.175.40 attackbots
Invalid user aragon from 200.116.175.40 port 54076
2020-06-14 06:49:39
36.88.35.26 attackbots
2020-06-13T22:52:33.934355shield sshd\[26650\]: Invalid user sysadmin from 36.88.35.26 port 42447
2020-06-13T22:52:33.938147shield sshd\[26650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.88.35.26
2020-06-13T22:52:35.840385shield sshd\[26650\]: Failed password for invalid user sysadmin from 36.88.35.26 port 42447 ssh2
2020-06-13T22:56:45.952126shield sshd\[28847\]: Invalid user sftpuser from 36.88.35.26 port 17665
2020-06-13T22:56:45.955938shield sshd\[28847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.88.35.26
2020-06-14 07:02:19
177.131.189.12 attack
20/6/13@17:08:24: FAIL: Alarm-Network address from=177.131.189.12
...
2020-06-14 06:25:11
185.16.37.135 attack
Invalid user angus from 185.16.37.135 port 34974
2020-06-14 06:55:59
185.28.103.150 attackspam
Jun 13 23:18:15 localhost sshd\[20115\]: Invalid user monitor from 185.28.103.150
Jun 13 23:18:15 localhost sshd\[20115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.28.103.150
Jun 13 23:18:16 localhost sshd\[20115\]: Failed password for invalid user monitor from 185.28.103.150 port 34220 ssh2
Jun 13 23:22:17 localhost sshd\[20418\]: Invalid user sasha75 from 185.28.103.150
Jun 13 23:22:17 localhost sshd\[20418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.28.103.150
...
2020-06-14 06:31:33
49.233.202.231 attack
Jun 14 00:26:07 cosmoit sshd[23747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.202.231
2020-06-14 06:47:02
49.86.88.153 attackbotsspam
Jun 13 22:07:56 l03 postfix/smtpd[14279]: warning: unknown[49.86.88.153]: SASL PLAIN authentication failed: authentication failure
Jun 13 22:08:00 l03 postfix/smtpd[14279]: warning: unknown[49.86.88.153]: SASL LOGIN authentication failed: authentication failure
Jun 13 22:08:03 l03 postfix/smtpd[14279]: warning: unknown[49.86.88.153]: SASL PLAIN authentication failed: authentication failure
Jun 13 22:08:06 l03 postfix/smtpd[14279]: warning: unknown[49.86.88.153]: SASL LOGIN authentication failed: authentication failure
...
2020-06-14 06:35:13
200.89.178.197 attack
Jun 13 22:09:37 powerpi2 sshd[12327]: Invalid user admin from 200.89.178.197 port 38228
Jun 13 22:09:38 powerpi2 sshd[12327]: Failed password for invalid user admin from 200.89.178.197 port 38228 ssh2
Jun 13 22:16:24 powerpi2 sshd[12777]: Invalid user roberta from 200.89.178.197 port 44908
...
2020-06-14 06:55:42
138.68.95.204 attack
Jun 14 00:42:23 abendstille sshd\[27430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.95.204  user=root
Jun 14 00:42:25 abendstille sshd\[27430\]: Failed password for root from 138.68.95.204 port 53266 ssh2
Jun 14 00:45:33 abendstille sshd\[30332\]: Invalid user tangjingjuan from 138.68.95.204
Jun 14 00:45:33 abendstille sshd\[30332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.95.204
Jun 14 00:45:35 abendstille sshd\[30332\]: Failed password for invalid user tangjingjuan from 138.68.95.204 port 54610 ssh2
...
2020-06-14 06:51:37
123.206.111.27 attackspam
Jun 13 21:29:16 django-0 sshd\[4892\]: Invalid user arrowbaz from 123.206.111.27Jun 13 21:29:17 django-0 sshd\[4892\]: Failed password for invalid user arrowbaz from 123.206.111.27 port 59622 ssh2Jun 13 21:34:10 django-0 sshd\[5177\]: Invalid user lzj from 123.206.111.27
...
2020-06-14 06:39:01
111.229.64.133 attackbots
2020-06-13T17:58:10.6814151495-001 sshd[38406]: Failed password for invalid user sunyl from 111.229.64.133 port 47482 ssh2
2020-06-13T18:01:34.1212351495-001 sshd[38616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.64.133  user=root
2020-06-13T18:01:36.0744391495-001 sshd[38616]: Failed password for root from 111.229.64.133 port 59220 ssh2
2020-06-13T18:04:59.9251931495-001 sshd[38712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.64.133  user=root
2020-06-13T18:05:01.6877571495-001 sshd[38712]: Failed password for root from 111.229.64.133 port 42712 ssh2
2020-06-13T18:08:24.9957991495-001 sshd[38890]: Invalid user www from 111.229.64.133 port 54444
...
2020-06-14 06:32:57
109.86.225.205 attackspam
IP 109.86.225.205 attacked honeypot on port: 80 at 6/13/2020 10:08:08 PM
2020-06-14 06:24:16
46.38.145.6 attackbotsspam
Jun 14 00:30:56 mail.srvfarm.net postfix/smtpd[1485198]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 14 00:32:27 mail.srvfarm.net postfix/smtpd[1483727]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 14 00:33:56 mail.srvfarm.net postfix/smtpd[1483727]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 14 00:35:26 mail.srvfarm.net postfix/smtpd[1485200]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 14 00:37:00 mail.srvfarm.net postfix/smtpd[1485223]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-14 06:50:11
185.153.196.230 attackbotsspam
2020-06-14T00:29:11.180988sd-86998 sshd[25005]: Invalid user 0 from 185.153.196.230 port 34612
2020-06-14T00:29:12.807712sd-86998 sshd[25005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.196.230
2020-06-14T00:29:11.180988sd-86998 sshd[25005]: Invalid user 0 from 185.153.196.230 port 34612
2020-06-14T00:29:14.710137sd-86998 sshd[25005]: Failed password for invalid user 0 from 185.153.196.230 port 34612 ssh2
2020-06-14T00:29:20.399128sd-86998 sshd[25047]: Invalid user 22 from 185.153.196.230 port 41235
...
2020-06-14 06:46:39

最近上报的IP列表

8.213.203.247 251.131.2.110 77.141.206.21 202.177.101.114
202.247.128.239 6.147.13.66 204.127.133.196 111.150.90.174
204.198.162.209 206.142.0.240 204.247.124.233 205.138.200.219
205.141.211.254 205.227.221.158 243.122.88.224 32.223.95.66
128.5.150.35 208.164.158.138 208.172.247.201 209.157.176.117