必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.93.18.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;55.93.18.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 22:27:32 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 140.18.93.55.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 55.93.18.140.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.28.141.140 attackbotsspam
10 attempts against mh-pma-try-ban on shine
2020-08-10 02:29:39
31.132.211.144 attackbots
0,28-01/01 [bc01/m05] PostRequest-Spammer scoring: harare01_holz
2020-08-10 02:52:06
59.63.163.165 attack
 TCP (SYN) 59.63.163.165:47407 -> port 14772, len 44
2020-08-10 02:28:44
111.230.148.82 attackspambots
Aug  9 14:04:08 santamaria sshd\[24332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.148.82  user=root
Aug  9 14:04:09 santamaria sshd\[24332\]: Failed password for root from 111.230.148.82 port 41484 ssh2
Aug  9 14:06:22 santamaria sshd\[24339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.148.82  user=root
...
2020-08-10 03:04:11
200.0.236.210 attackbots
2020-08-10T00:41:52.749009billing sshd[5656]: Failed password for root from 200.0.236.210 port 42446 ssh2
2020-08-10T00:46:53.001727billing sshd[16933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.0.236.210  user=root
2020-08-10T00:46:55.601942billing sshd[16933]: Failed password for root from 200.0.236.210 port 39750 ssh2
...
2020-08-10 02:39:16
46.101.95.65 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-10 02:51:51
159.203.165.156 attack
Aug  9 20:09:44 lnxmail61 sshd[11185]: Failed password for root from 159.203.165.156 port 41400 ssh2
Aug  9 20:09:44 lnxmail61 sshd[11185]: Failed password for root from 159.203.165.156 port 41400 ssh2
2020-08-10 02:41:45
139.155.87.35 attackspam
Attempts to probe for or exploit a Drupal 7.69 site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2020-08-10 03:05:42
51.141.90.183 attackspambots
Automatic report - Banned IP Access
2020-08-10 03:04:42
106.54.40.151 attackspambots
Aug  9 14:07:15 cosmoit sshd[20499]: Failed password for root from 106.54.40.151 port 52510 ssh2
2020-08-10 02:33:15
36.80.94.31 attackspambots
Automatic report - Port Scan Attack
2020-08-10 02:38:29
34.93.149.4 attackspam
$f2bV_matches
2020-08-10 02:47:58
128.199.33.116 attackspam
Aug  9 15:59:09 buvik sshd[21010]: Failed password for root from 128.199.33.116 port 58262 ssh2
Aug  9 16:03:16 buvik sshd[22022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.33.116  user=root
Aug  9 16:03:18 buvik sshd[22022]: Failed password for root from 128.199.33.116 port 41878 ssh2
...
2020-08-10 02:48:30
167.172.33.248 attack
" "
2020-08-10 02:35:21
39.52.177.80 attackspam
20/8/9@08:06:35: FAIL: Alarm-Network address from=39.52.177.80
...
2020-08-10 03:00:18

最近上报的IP列表

225.72.119.217 95.147.18.254 252.115.85.175 35.105.181.225
115.166.139.89 56.86.26.119 150.175.14.131 87.95.91.223
181.182.114.220 165.173.40.213 135.64.21.125 166.190.49.75
185.175.134.126 69.247.223.245 124.199.65.248 34.193.228.219
164.40.55.89 46.223.154.254 198.24.93.253 143.163.146.85