必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.91.154.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.91.154.194.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030802 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 13:10:16 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 194.154.91.55.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 55.91.154.194.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.212.10.154 attackspambots
Jan 17 12:58:38 vpn sshd[23876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.212.10.154
Jan 17 12:58:40 vpn sshd[23876]: Failed password for invalid user lisandra from 62.212.10.154 port 57330 ssh2
Jan 17 13:02:33 vpn sshd[23938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.212.10.154
2020-01-05 19:25:21
62.219.123.30 attackspambots
Feb 27 13:44:43 vpn sshd[9821]: Invalid user admin from 62.219.123.30
Feb 27 13:44:43 vpn sshd[9821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.219.123.30
Feb 27 13:44:45 vpn sshd[9821]: Failed password for invalid user admin from 62.219.123.30 port 39058 ssh2
Feb 27 13:44:47 vpn sshd[9821]: Failed password for invalid user admin from 62.219.123.30 port 39058 ssh2
Feb 27 13:44:50 vpn sshd[9821]: Failed password for invalid user admin from 62.219.123.30 port 39058 ssh2
2020-01-05 19:22:55
62.94.206.57 attackspambots
Sep 26 22:05:12 vpn sshd[22533]: Invalid user git from 62.94.206.57
Sep 26 22:05:12 vpn sshd[22533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.206.57
Sep 26 22:05:14 vpn sshd[22533]: Failed password for invalid user git from 62.94.206.57 port 34398 ssh2
Sep 26 22:08:38 vpn sshd[22537]: Invalid user pkjain from 62.94.206.57
Sep 26 22:08:38 vpn sshd[22537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.94.206.57
2020-01-05 18:54:23
62.218.23.242 attack
Dec 27 23:19:03 vpn sshd[18516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.218.23.242
Dec 27 23:19:05 vpn sshd[18516]: Failed password for invalid user avahi-autoipd from 62.218.23.242 port 24289 ssh2
Dec 27 23:22:13 vpn sshd[18546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.218.23.242
2020-01-05 19:23:46
222.186.175.183 attackspam
Jan  5 10:46:57 zeus sshd[11816]: Failed password for root from 222.186.175.183 port 65406 ssh2
Jan  5 10:47:02 zeus sshd[11816]: Failed password for root from 222.186.175.183 port 65406 ssh2
Jan  5 10:47:16 zeus sshd[11824]: Failed password for root from 222.186.175.183 port 13708 ssh2
Jan  5 10:47:21 zeus sshd[11824]: Failed password for root from 222.186.175.183 port 13708 ssh2
2020-01-05 19:00:56
5.180.97.151 attackbots
Jan  5 04:52:47 hcbbdb sshd\[1210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.180.97.151  user=root
Jan  5 04:52:49 hcbbdb sshd\[1210\]: Failed password for root from 5.180.97.151 port 38852 ssh2
Jan  5 04:53:18 hcbbdb sshd\[1263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.180.97.151  user=root
Jan  5 04:53:20 hcbbdb sshd\[1263\]: Failed password for root from 5.180.97.151 port 39105 ssh2
Jan  5 04:53:51 hcbbdb sshd\[1305\]: Invalid user pi from 5.180.97.151
2020-01-05 19:21:40
190.201.152.223 attack
20/1/4@23:53:57: FAIL: Alarm-Network address from=190.201.152.223
...
2020-01-05 19:14:00
180.250.210.133 attackspam
Jan  5 11:48:39 vpn01 sshd[23513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.210.133
Jan  5 11:48:41 vpn01 sshd[23513]: Failed password for invalid user avahi from 180.250.210.133 port 42260 ssh2
...
2020-01-05 18:51:45
49.88.112.55 attackspambots
Jan  5 01:16:09 hanapaa sshd\[19003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Jan  5 01:16:11 hanapaa sshd\[19003\]: Failed password for root from 49.88.112.55 port 13135 ssh2
Jan  5 01:16:14 hanapaa sshd\[19003\]: Failed password for root from 49.88.112.55 port 13135 ssh2
Jan  5 01:16:39 hanapaa sshd\[19032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Jan  5 01:16:41 hanapaa sshd\[19032\]: Failed password for root from 49.88.112.55 port 47262 ssh2
2020-01-05 19:22:39
190.14.242.152 attackspambots
Jan  5 00:21:57 web9 sshd\[28661\]: Invalid user clemens from 190.14.242.152
Jan  5 00:21:57 web9 sshd\[28661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.242.152
Jan  5 00:21:59 web9 sshd\[28661\]: Failed password for invalid user clemens from 190.14.242.152 port 27229 ssh2
Jan  5 00:23:36 web9 sshd\[28958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.14.242.152  user=root
Jan  5 00:23:38 web9 sshd\[28958\]: Failed password for root from 190.14.242.152 port 49475 ssh2
2020-01-05 18:57:28
62.84.94.72 attack
Feb 22 21:07:34 vpn sshd[20537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.94.72
Feb 22 21:07:37 vpn sshd[20537]: Failed password for invalid user steam from 62.84.94.72 port 47746 ssh2
Feb 22 21:12:22 vpn sshd[20557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.94.72
2020-01-05 18:57:01
81.218.203.111 attack
Unauthorized connection attempt detected from IP address 81.218.203.111 to port 81 [J]
2020-01-05 19:15:57
5.9.151.57 attack
20 attempts against mh-misbehave-ban on float.magehost.pro
2020-01-05 19:17:37
63.41.9.207 attackspambots
Mar  7 23:57:25 vpn sshd[13785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.41.9.207
Mar  7 23:57:26 vpn sshd[13785]: Failed password for invalid user xw from 63.41.9.207 port 57127 ssh2
Mar  8 00:04:09 vpn sshd[13829]: Failed password for root from 63.41.9.207 port 37781 ssh2
2020-01-05 18:50:41
222.186.175.167 attackbotsspam
Jan  5 06:14:28 plusreed sshd[24160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Jan  5 06:14:31 plusreed sshd[24160]: Failed password for root from 222.186.175.167 port 45676 ssh2
Jan  5 06:14:45 plusreed sshd[24160]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 45676 ssh2 [preauth]
Jan  5 06:14:28 plusreed sshd[24160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Jan  5 06:14:31 plusreed sshd[24160]: Failed password for root from 222.186.175.167 port 45676 ssh2
Jan  5 06:14:45 plusreed sshd[24160]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 45676 ssh2 [preauth]
Jan  5 06:14:28 plusreed sshd[24160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Jan  5 06:14:31 plusreed sshd[24160]: Failed password for root from 222.186.175.1
2020-01-05 19:20:25

最近上报的IP列表

179.143.88.26 211.17.185.231 2.131.252.146 118.146.16.142
213.105.192.195 45.165.253.250 85.223.146.72 224.158.195.141
145.174.135.65 52.30.46.243 52.163.124.217 249.187.28.253
88.146.134.1 85.135.247.101 190.38.46.147 196.250.131.172
23.73.47.141 177.104.223.118 139.124.49.86 23.129.10.122