必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.55.219.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37581
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.55.219.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 09:26:51 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 12.219.55.56.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 56.55.219.12.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.75.16.138 attack
Automatic report - Banned IP Access
2019-08-19 04:35:35
94.191.68.224 attack
Aug 18 14:57:43 tuxlinux sshd[45315]: Invalid user mailnull from 94.191.68.224 port 3016
Aug 18 14:57:43 tuxlinux sshd[45315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.68.224 
Aug 18 14:57:43 tuxlinux sshd[45315]: Invalid user mailnull from 94.191.68.224 port 3016
Aug 18 14:57:43 tuxlinux sshd[45315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.68.224 
Aug 18 14:57:43 tuxlinux sshd[45315]: Invalid user mailnull from 94.191.68.224 port 3016
Aug 18 14:57:43 tuxlinux sshd[45315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.68.224 
Aug 18 14:57:44 tuxlinux sshd[45315]: Failed password for invalid user mailnull from 94.191.68.224 port 3016 ssh2
...
2019-08-19 04:53:30
182.72.162.2 attackspam
Aug 18 19:49:44 microserver sshd[17987]: Invalid user pang from 182.72.162.2 port 10000
Aug 18 19:49:44 microserver sshd[17987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.162.2
Aug 18 19:49:46 microserver sshd[17987]: Failed password for invalid user pang from 182.72.162.2 port 10000 ssh2
Aug 18 19:55:01 microserver sshd[18631]: Invalid user alberto from 182.72.162.2 port 10000
Aug 18 19:55:01 microserver sshd[18631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.162.2
Aug 18 20:05:45 microserver sshd[20335]: Invalid user tony from 182.72.162.2 port 10000
Aug 18 20:05:45 microserver sshd[20335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.162.2
Aug 18 20:05:47 microserver sshd[20335]: Failed password for invalid user tony from 182.72.162.2 port 10000 ssh2
Aug 18 20:11:11 microserver sshd[20965]: Invalid user prueba from 182.72.162.2 port 10000
Aug 18 20:11:11
2019-08-19 04:57:40
201.187.4.195 attack
Aug 18 15:33:03 vserver sshd\[10250\]: Invalid user pi from 201.187.4.195Aug 18 15:33:03 vserver sshd\[10251\]: Invalid user pi from 201.187.4.195Aug 18 15:33:04 vserver sshd\[10250\]: Failed password for invalid user pi from 201.187.4.195 port 41700 ssh2Aug 18 15:33:05 vserver sshd\[10251\]: Failed password for invalid user pi from 201.187.4.195 port 41698 ssh2
...
2019-08-19 04:53:56
113.134.211.228 attackbots
...
2019-08-19 04:22:27
45.55.235.208 attackspambots
2019-08-18T20:39:03.469318abusebot-2.cloudsearch.cf sshd\[21787\]: Invalid user courier from 45.55.235.208 port 41320
2019-08-19 04:47:55
87.98.167.38 attack
Aug 18 19:55:53 ns315508 sshd[1198]: Invalid user shop from 87.98.167.38 port 38442
Aug 18 19:55:53 ns315508 sshd[1198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.167.38
Aug 18 19:55:53 ns315508 sshd[1198]: Invalid user shop from 87.98.167.38 port 38442
Aug 18 19:55:54 ns315508 sshd[1198]: Failed password for invalid user shop from 87.98.167.38 port 38442 ssh2
Aug 18 20:00:05 ns315508 sshd[1275]: Invalid user stafke from 87.98.167.38 port 56948
...
2019-08-19 04:40:21
119.29.62.85 attackspambots
Aug 18 05:43:06 wbs sshd\[28720\]: Invalid user vk from 119.29.62.85
Aug 18 05:43:06 wbs sshd\[28720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.62.85
Aug 18 05:43:08 wbs sshd\[28720\]: Failed password for invalid user vk from 119.29.62.85 port 49146 ssh2
Aug 18 05:49:03 wbs sshd\[29176\]: Invalid user nd from 119.29.62.85
Aug 18 05:49:03 wbs sshd\[29176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.62.85
2019-08-19 04:27:34
188.6.51.75 attackspam
Aug 18 07:03:20 hpm sshd\[19844\]: Invalid user kathrine from 188.6.51.75
Aug 18 07:03:20 hpm sshd\[19844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bc06334b.dsl.pool.telekom.hu
Aug 18 07:03:22 hpm sshd\[19844\]: Failed password for invalid user kathrine from 188.6.51.75 port 44782 ssh2
Aug 18 07:11:47 hpm sshd\[20582\]: Invalid user testftp from 188.6.51.75
Aug 18 07:11:47 hpm sshd\[20582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bc06334b.dsl.pool.telekom.hu
2019-08-19 04:38:12
187.1.27.53 attackspam
failed_logins
2019-08-19 04:48:47
139.59.23.68 attack
Aug 18 09:56:14 tdfoods sshd\[29069\]: Invalid user amal from 139.59.23.68
Aug 18 09:56:14 tdfoods sshd\[29069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.68
Aug 18 09:56:16 tdfoods sshd\[29069\]: Failed password for invalid user amal from 139.59.23.68 port 45900 ssh2
Aug 18 10:01:06 tdfoods sshd\[29513\]: Invalid user myra from 139.59.23.68
Aug 18 10:01:06 tdfoods sshd\[29513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.68
2019-08-19 04:17:03
217.117.13.12 attackspam
Aug 18 17:16:31 cvbmail sshd\[24598\]: Invalid user osbash from 217.117.13.12
Aug 18 17:16:32 cvbmail sshd\[24598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.117.13.12
Aug 18 17:16:34 cvbmail sshd\[24598\]: Failed password for invalid user osbash from 217.117.13.12 port 48509 ssh2
2019-08-19 04:23:46
77.153.7.42 attackspambots
$f2bV_matches
2019-08-19 04:23:28
92.255.197.83 attack
C1,WP GET /nelson/wp-login.php
2019-08-19 04:39:20
106.52.94.153 attack
Aug 18 14:18:51 cp1server sshd[12132]: Invalid user lord from 106.52.94.153
Aug 18 14:18:51 cp1server sshd[12132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.94.153 
Aug 18 14:18:53 cp1server sshd[12132]: Failed password for invalid user lord from 106.52.94.153 port 38412 ssh2
Aug 18 14:18:53 cp1server sshd[12133]: Received disconnect from 106.52.94.153: 11: Bye Bye
Aug 18 14:44:14 cp1server sshd[15322]: Connection closed by 106.52.94.153
Aug 18 14:45:05 cp1server sshd[15483]: Invalid user james from 106.52.94.153
Aug 18 14:45:05 cp1server sshd[15483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.94.153 
Aug 18 14:45:08 cp1server sshd[15483]: Failed password for invalid user james from 106.52.94.153 port 44978 ssh2
Aug 18 14:45:08 cp1server sshd[15499]: Received disconnect from 106.52.94.153: 11: Bye Bye
Aug 18 14:47:12 cp1server sshd[15900]: Invalid user pai from 106.5........
-------------------------------
2019-08-19 04:28:22

最近上报的IP列表

63.39.116.75 215.113.254.168 186.21.229.107 180.26.172.71
223.138.234.214 168.244.162.226 43.79.121.222 125.82.121.212
91.201.80.27 4.68.181.153 89.249.0.125 249.188.54.32
165.161.39.137 97.88.220.173 127.105.65.253 189.141.85.51
2.64.158.94 197.194.23.155 247.71.104.63 254.208.154.91