必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.104.2.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18585
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;67.104.2.55.			IN	A

;; AUTHORITY SECTION:
.			575	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 28 07:00:27 CST 2023
;; MSG SIZE  rcvd: 104
HOST信息:
55.2.104.67.in-addr.arpa domain name pointer 67.104.2.55.ptr.us.xo.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.2.104.67.in-addr.arpa	name = 67.104.2.55.ptr.us.xo.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.54.0.199 attackbots
Unauthorised access (Oct 18) SRC=119.54.0.199 LEN=40 TTL=49 ID=16451 TCP DPT=8080 WINDOW=11350 SYN 
Unauthorised access (Oct 18) SRC=119.54.0.199 LEN=40 TTL=49 ID=26888 TCP DPT=8080 WINDOW=8845 SYN 
Unauthorised access (Oct 18) SRC=119.54.0.199 LEN=40 TTL=49 ID=63442 TCP DPT=8080 WINDOW=8845 SYN 
Unauthorised access (Oct 17) SRC=119.54.0.199 LEN=40 TTL=49 ID=1352 TCP DPT=8080 WINDOW=21269 SYN 
Unauthorised access (Oct 17) SRC=119.54.0.199 LEN=40 TTL=49 ID=21297 TCP DPT=8080 WINDOW=42927 SYN 
Unauthorised access (Oct 17) SRC=119.54.0.199 LEN=40 TTL=49 ID=37294 TCP DPT=8080 WINDOW=62107 SYN 
Unauthorised access (Oct 16) SRC=119.54.0.199 LEN=40 TTL=49 ID=43367 TCP DPT=8080 WINDOW=42927 SYN
2019-10-19 04:54:18
209.95.51.11 attack
2019-10-18T20:25:52.224823abusebot.cloudsearch.cf sshd\[27668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=nyc-exit.privateinternetaccess.com  user=root
2019-10-19 04:52:20
77.42.105.196 attack
Automatic report - Port Scan Attack
2019-10-19 05:17:44
51.77.145.97 attackspambots
$f2bV_matches
2019-10-19 05:11:13
103.212.64.98 attackspam
Oct 18 22:55:35 * sshd[363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.64.98
Oct 18 22:55:37 * sshd[363]: Failed password for invalid user icc from 103.212.64.98 port 59905 ssh2
2019-10-19 05:08:51
217.182.206.141 attackbotsspam
Oct 18 16:48:27 plusreed sshd[24425]: Invalid user leave from 217.182.206.141
...
2019-10-19 04:51:02
72.89.234.162 attackspam
Oct 18 23:05:37 mout sshd[6507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.89.234.162  user=root
Oct 18 23:05:40 mout sshd[6507]: Failed password for root from 72.89.234.162 port 51722 ssh2
2019-10-19 05:16:09
213.32.24.225 attack
Lines containing failures of 213.32.24.225
Oct 18 20:10:46 ariston sshd[8680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.24.225  user=r.r
Oct 18 20:10:48 ariston sshd[8680]: Failed password for r.r from 213.32.24.225 port 36532 ssh2
Oct 18 20:10:48 ariston sshd[8680]: Received disconnect from 213.32.24.225 port 36532:11: Bye Bye [preauth]
Oct 18 20:10:48 ariston sshd[8680]: Disconnected from authenticating user r.r 213.32.24.225 port 36532 [preauth]
Oct 18 20:15:53 ariston sshd[10914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.24.225  user=r.r
Oct 18 20:15:56 ariston sshd[10914]: Failed password for r.r from 213.32.24.225 port 52862 ssh2
Oct 18 20:15:58 ariston sshd[10914]: Received disconnect from 213.32.24.225 port 52862:11: Bye Bye [preauth]
Oct 18 20:15:58 ariston sshd[10914]: Disconnected from authenticating user r.r 213.32.24.225 port 52862 [preauth]
Oct 18 20:........
------------------------------
2019-10-19 05:15:21
179.177.219.188 attack
Automatic report - Port Scan Attack
2019-10-19 04:39:25
121.166.26.234 attackbotsspam
Oct 18 07:07:04 nxxxxxxx sshd[18566]: Invalid user cloud from 121.166.26.234
Oct 18 07:07:04 nxxxxxxx sshd[18566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.26.234 
Oct 18 07:07:07 nxxxxxxx sshd[18566]: Failed password for invalid user cloud from 121.166.26.234 port 54364 ssh2
Oct 18 07:07:07 nxxxxxxx sshd[18566]: Received disconnect from 121.166.26.234: 11: Bye Bye [preauth]
Oct 18 07:23:14 nxxxxxxx sshd[19685]: Invalid user webuser from 121.166.26.234
Oct 18 07:23:14 nxxxxxxx sshd[19685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.26.234 
Oct 18 07:23:16 nxxxxxxx sshd[19685]: Failed password for invalid user webuser from 121.166.26.234 port 43914 ssh2
Oct 18 07:23:16 nxxxxxxx sshd[19685]: Received disconnect from 121.166.26.234: 11: Bye Bye [preauth]
Oct 18 07:27:51 nxxxxxxx sshd[19971]: Invalid user test from 121.166.26.234
Oct 18 07:27:51 nxxxxxxx sshd[19971]: ........
-------------------------------
2019-10-19 04:50:18
213.229.1.12 attack
Oct 19 00:00:31 taivassalofi sshd[100323]: Failed password for root from 213.229.1.12 port 33546 ssh2
Oct 19 00:04:11 taivassalofi sshd[100378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.229.1.12
...
2019-10-19 05:06:41
222.186.175.169 attack
2019-10-18T20:40:04.832063abusebot.cloudsearch.cf sshd\[27995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2019-10-19 04:45:57
119.251.90.45 attack
Telnet Server BruteForce Attack
2019-10-19 05:14:50
181.94.66.92 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/181.94.66.92/ 
 
 US - 1H : (259)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN7303 
 
 IP : 181.94.66.92 
 
 CIDR : 181.94.64.0/20 
 
 PREFIX COUNT : 1591 
 
 UNIQUE IP COUNT : 4138752 
 
 
 ATTACKS DETECTED ASN7303 :  
  1H - 1 
  3H - 2 
  6H - 4 
 12H - 5 
 24H - 8 
 
 DateTime : 2019-10-18 21:52:55 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-19 04:38:15
121.138.213.2 attackspambots
Oct 18 21:52:53 MK-Soft-VM4 sshd[6013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.138.213.2 
Oct 18 21:52:55 MK-Soft-VM4 sshd[6013]: Failed password for invalid user hunter3 from 121.138.213.2 port 62571 ssh2
...
2019-10-19 04:40:30

最近上报的IP列表

171.3.67.229 202.138.25.173 102.241.97.225 102.240.239.106
102.240.202.66 102.241.229.159 102.242.225.182 102.243.249.249
165.141.129.105 102.248.162.241 35.75.75.53 102.248.105.191
225.107.200.253 102.247.250.217 163.110.175.191 208.178.44.160
187.31.235.0 102.250.22.173 97.22.232.46 9.148.246.118