必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.55.42.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57015
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.55.42.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 19:56:21 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 159.42.55.6.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 6.55.42.159.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.248.160.231 attackbotsspam
srv02 SSH BruteForce Attacks 22 ..
2020-06-21 15:31:03
37.152.177.25 attack
Jun 21 09:14:11 v22019038103785759 sshd\[15049\]: Invalid user yiyuan from 37.152.177.25 port 47988
Jun 21 09:14:11 v22019038103785759 sshd\[15049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.177.25
Jun 21 09:14:13 v22019038103785759 sshd\[15049\]: Failed password for invalid user yiyuan from 37.152.177.25 port 47988 ssh2
Jun 21 09:23:18 v22019038103785759 sshd\[15530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.177.25  user=root
Jun 21 09:23:20 v22019038103785759 sshd\[15530\]: Failed password for root from 37.152.177.25 port 60786 ssh2
...
2020-06-21 15:26:29
188.35.187.50 attackspambots
Jun 21 06:48:41 cdc sshd[7900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.35.187.50 
Jun 21 06:48:43 cdc sshd[7900]: Failed password for invalid user oc from 188.35.187.50 port 56450 ssh2
2020-06-21 15:16:08
181.48.120.219 attackspambots
Invalid user vicky from 181.48.120.219 port 2922
2020-06-21 15:51:57
212.64.78.151 attack
$f2bV_matches
2020-06-21 15:30:46
222.186.42.136 attackspam
2020-06-21T09:42:24.870584centos sshd[26999]: Failed password for root from 222.186.42.136 port 43803 ssh2
2020-06-21T09:42:39.957606centos sshd[27006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
2020-06-21T09:42:42.108275centos sshd[27006]: Failed password for root from 222.186.42.136 port 64987 ssh2
...
2020-06-21 15:47:57
60.251.66.178 attackbots
Jun 21 13:55:02 NG-HHDC-SVS-001 sshd[1005]: Invalid user danny from 60.251.66.178
...
2020-06-21 15:31:54
188.165.24.200 attackbotsspam
2020-06-21T09:07:39+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-06-21 15:39:37
35.199.73.100 attackspambots
Jun 21 06:42:54 srv-ubuntu-dev3 sshd[45567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.73.100  user=root
Jun 21 06:42:57 srv-ubuntu-dev3 sshd[45567]: Failed password for root from 35.199.73.100 port 38672 ssh2
Jun 21 06:46:40 srv-ubuntu-dev3 sshd[46284]: Invalid user ginger from 35.199.73.100
Jun 21 06:46:40 srv-ubuntu-dev3 sshd[46284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.73.100
Jun 21 06:46:40 srv-ubuntu-dev3 sshd[46284]: Invalid user ginger from 35.199.73.100
Jun 21 06:46:42 srv-ubuntu-dev3 sshd[46284]: Failed password for invalid user ginger from 35.199.73.100 port 38664 ssh2
Jun 21 06:50:35 srv-ubuntu-dev3 sshd[46936]: Invalid user original from 35.199.73.100
Jun 21 06:50:35 srv-ubuntu-dev3 sshd[46936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.73.100
Jun 21 06:50:35 srv-ubuntu-dev3 sshd[46936]: Invalid user original fr
...
2020-06-21 15:53:09
83.97.20.35 attack
 TCP (SYN) 83.97.20.35:52607 -> port 5060, len 44
2020-06-21 15:50:20
78.29.75.229 attackspam
Last visit 2020-06-20 05:47:27
2020-06-21 15:15:01
213.226.114.41 attackspambots
Jun 21 07:16:15 nas sshd[19210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.226.114.41 
Jun 21 07:16:17 nas sshd[19210]: Failed password for invalid user al from 213.226.114.41 port 42180 ssh2
Jun 21 07:25:39 nas sshd[19428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.226.114.41 
...
2020-06-21 15:45:41
42.115.92.155 attackspambots
KH - - [21/Jun/2020:01:53:06 +0300] GET / HTTP/1.1 404 - - -
2020-06-21 15:42:08
51.83.75.97 attackspambots
Invalid user runner from 51.83.75.97 port 32868
2020-06-21 15:33:49
103.235.169.188 attack
HK_APNIC-HM_<177>1592711716 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]:  {TCP} 103.235.169.188:47417
2020-06-21 15:21:14

最近上报的IP列表

219.101.232.11 130.137.222.16 194.19.79.86 123.45.167.146
89.5.67.135 60.92.147.237 57.151.97.105 166.218.117.195
137.97.83.84 150.90.172.185 27.191.24.8 242.217.157.196
119.26.0.220 95.252.178.95 101.87.91.167 174.254.192.36
19.254.130.17 178.240.46.204 119.161.9.116 189.227.171.46