必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.120.202.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21956
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.120.202.55.			IN	A

;; AUTHORITY SECTION:
.			198	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010600 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 18:49:02 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 55.202.120.68.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.202.120.68.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.82.77.139 attackspam
11/25/2019-15:26:08.219842 80.82.77.139 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-26 06:19:09
24.130.179.25 attackspambots
Nov 25 20:58:00 v22019058497090703 sshd[12179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.130.179.25
Nov 25 20:58:02 v22019058497090703 sshd[12179]: Failed password for invalid user dobbs from 24.130.179.25 port 50208 ssh2
Nov 25 21:01:32 v22019058497090703 sshd[12469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.130.179.25
...
2019-11-26 06:31:16
218.92.0.161 attack
Nov 25 23:08:24 vps666546 sshd\[8241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.161  user=root
Nov 25 23:08:26 vps666546 sshd\[8241\]: Failed password for root from 218.92.0.161 port 4611 ssh2
Nov 25 23:08:29 vps666546 sshd\[8241\]: Failed password for root from 218.92.0.161 port 4611 ssh2
Nov 25 23:08:32 vps666546 sshd\[8241\]: Failed password for root from 218.92.0.161 port 4611 ssh2
Nov 25 23:08:35 vps666546 sshd\[8241\]: Failed password for root from 218.92.0.161 port 4611 ssh2
...
2019-11-26 06:15:31
183.12.237.114 attack
Brute force SMTP login attempts.
2019-11-26 06:42:56
117.199.61.51 attack
Unauthorized connection attempt from IP address 117.199.61.51 on Port 445(SMB)
2019-11-26 06:26:25
42.225.229.96 attackbotsspam
Caught in portsentry honeypot
2019-11-26 06:23:53
116.31.105.198 attack
Nov 25 18:13:45 marvibiene sshd[6633]: Invalid user tb2 from 116.31.105.198 port 43740
Nov 25 18:13:45 marvibiene sshd[6633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.105.198
Nov 25 18:13:45 marvibiene sshd[6633]: Invalid user tb2 from 116.31.105.198 port 43740
Nov 25 18:13:47 marvibiene sshd[6633]: Failed password for invalid user tb2 from 116.31.105.198 port 43740 ssh2
...
2019-11-26 06:18:39
191.97.1.40 attack
Nov 25 23:47:24 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:191.97.1.40\]
...
2019-11-26 06:48:38
117.215.39.239 attackbots
Unauthorised access (Nov 25) SRC=117.215.39.239 LEN=52 TOS=0x08 TTL=114 ID=17349 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-26 06:37:16
45.95.33.106 attackspambots
Lines containing failures of 45.95.33.106
Nov 25 14:04:52 shared01 postfix/smtpd[24473]: connect from flower.honeytreenovi.com[45.95.33.106]
Nov 25 14:04:52 shared01 policyd-spf[24483]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.95.33.106; helo=flower.naderidoost.com; envelope-from=x@x
Nov x@x
Nov 25 14:04:53 shared01 postfix/smtpd[24473]: disconnect from flower.honeytreenovi.com[45.95.33.106] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov 25 14:05:04 shared01 postfix/smtpd[24473]: connect from flower.honeytreenovi.com[45.95.33.106]
Nov 25 14:05:04 shared01 policyd-spf[24483]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.95.33.106; helo=flower.naderidoost.com; envelope-from=x@x
Nov x@x
Nov 25 14:05:04 shared01 postfix/smtpd[24473]: disconnect from flower.honeytreenovi.com[45.95.33.106] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov 25 14:15:01 shared01 postfix/smtpd[27299]: conn........
------------------------------
2019-11-26 06:30:46
138.186.251.52 attack
Nov 25 22:47:14 hermescis postfix/smtpd\[24014\]: NOQUEUE: reject: RCPT from unknown\[138.186.251.52\]: 550 5.1.1 \: Recipient address rejected:* from=\ to=\ proto=ESMTP helo=\<\[138.186.251.52\]\>
2019-11-26 06:50:28
195.62.47.155 attackbots
Nov 25 23:42:02 mxgate1 postfix/postscreen[4074]: CONNECT from [195.62.47.155]:60054 to [176.31.12.44]:25
Nov 25 23:42:02 mxgate1 postfix/dnsblog[4076]: addr 195.62.47.155 listed by domain zen.spamhaus.org as 127.0.0.2
Nov 25 23:42:02 mxgate1 postfix/dnsblog[4075]: addr 195.62.47.155 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 25 23:42:03 mxgate1 postfix/dnsblog[4077]: addr 195.62.47.155 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 25 23:42:08 mxgate1 postfix/postscreen[4074]: DNSBL rank 4 for [195.62.47.155]:60054
Nov x@x
Nov 25 23:42:08 mxgate1 postfix/postscreen[4074]: DISCONNECT [195.62.47.155]:60054


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=195.62.47.155
2019-11-26 06:51:43
49.234.36.126 attackbotsspam
Nov 25 23:03:12 root sshd[22610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.36.126 
Nov 25 23:03:14 root sshd[22610]: Failed password for invalid user dasd from 49.234.36.126 port 9116 ssh2
Nov 25 23:09:57 root sshd[22785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.36.126 
...
2019-11-26 06:36:46
203.148.53.227 attackbotsspam
Nov 25 23:22:13 lnxweb61 sshd[3650]: Failed password for www-data from 203.148.53.227 port 60001 ssh2
Nov 25 23:22:13 lnxweb61 sshd[3650]: Failed password for www-data from 203.148.53.227 port 60001 ssh2
Nov 25 23:25:42 lnxweb61 sshd[6538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.148.53.227
2019-11-26 06:26:50
177.23.184.166 attack
Lines containing failures of 177.23.184.166
Nov 19 17:36:02 shared01 postfix/smtpd[23304]: connect from 177-23-184-166.infobarranet.com.br[177.23.184.166]
Nov 19 17:36:05 shared01 policyd-spf[28639]: prepend Received-SPF: Neutral (mailfrom) identhostnamey=mailfrom; client-ip=177.23.184.166; helo=6634016704.e.brasiltelecom.net.br; envelope-from=x@x
Nov x@x
Nov 19 17:36:06 shared01 postfix/smtpd[23304]: lost connection after RCPT from 177-23-184-166.infobarranet.com.br[177.23.184.166]
Nov 19 17:36:06 shared01 postfix/smtpd[23304]: disconnect from 177-23-184-166.infobarranet.com.br[177.23.184.166] ehlo=1 mail=1 rcpt=0/1 commands=2/3
Nov 19 22:47:31 shared01 postfix/smtpd[25715]: connect from 177-23-184-166.infobarranet.com.br[177.23.184.166]
Nov 19 22:47:33 shared01 policyd-spf[1911]: prepend Received-SPF: Neutral (mailfrom) identhostnamey=mailfrom; client-ip=177.23.184.166; helo=6634016704.e.brasiltelecom.net.br; envelope-from=x@x
Nov x@x
Nov 19 22:47:34 shared01 postfix/s........
------------------------------
2019-11-26 06:44:57

最近上报的IP列表

232.144.239.99 109.25.133.107 5.236.228.220 38.189.51.179
114.85.14.237 36.233.142.182 69.228.110.217 243.197.215.47
230.223.255.17 47.6.146.67 243.73.163.88 152.212.165.136
219.216.11.38 97.168.100.252 243.175.81.112 174.187.194.7
207.201.128.79 168.108.96.12 155.142.210.48 236.26.250.226