必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Stralsund

省份(region): Mecklenburg-Vorpommern

国家(country): Germany

运营商(isp): Telekom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.55.216.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59628
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.55.216.114.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:37:40 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
114.216.55.91.in-addr.arpa domain name pointer p5b37d872.dip0.t-ipconnect.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.216.55.91.in-addr.arpa	name = p5b37d872.dip0.t-ipconnect.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.67.85.74 attackspambots
SSH invalid-user multiple login try
2020-08-16 00:27:16
222.186.180.6 attack
Aug 15 18:16:31 minden010 sshd[9151]: Failed password for root from 222.186.180.6 port 53366 ssh2
Aug 15 18:16:34 minden010 sshd[9151]: Failed password for root from 222.186.180.6 port 53366 ssh2
Aug 15 18:16:38 minden010 sshd[9151]: Failed password for root from 222.186.180.6 port 53366 ssh2
Aug 15 18:16:45 minden010 sshd[9151]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 53366 ssh2 [preauth]
...
2020-08-16 00:19:27
111.229.120.173 attack
Aug 15 18:14:31 santamaria sshd\[25159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.120.173  user=root
Aug 15 18:14:34 santamaria sshd\[25159\]: Failed password for root from 111.229.120.173 port 40206 ssh2
Aug 15 18:18:13 santamaria sshd\[25235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.120.173  user=root
...
2020-08-16 00:20:49
103.10.87.54 attack
(sshd) Failed SSH login from 103.10.87.54 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 15 16:38:52 grace sshd[22047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.87.54  user=root
Aug 15 16:38:54 grace sshd[22047]: Failed password for root from 103.10.87.54 port 28378 ssh2
Aug 15 16:57:48 grace sshd[25714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.87.54  user=root
Aug 15 16:57:50 grace sshd[25714]: Failed password for root from 103.10.87.54 port 29451 ssh2
Aug 15 17:04:16 grace sshd[26735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.87.54  user=root
2020-08-15 23:43:03
83.18.149.38 attackspam
Aug 15 14:21:28  sshd\[25122\]: User root from azt38.internetdsl.tpnet.pl not allowed because not listed in AllowUsersAug 15 14:21:30  sshd\[25122\]: Failed password for invalid user root from 83.18.149.38 port 52130 ssh2
...
2020-08-15 23:43:45
130.185.155.34 attackbots
Repeated brute force against a port
2020-08-16 00:22:58
45.143.220.87 attack
[2020-08-15 11:32:40] NOTICE[1185][C-000027ae] chan_sip.c: Call from '' (45.143.220.87:6336) to extension '0046842002652' rejected because extension not found in context 'public'.
[2020-08-15 11:32:40] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-15T11:32:40.124-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0046842002652",SessionID="0x7f10c43e3a48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.87/6336",ACLName="no_extension_match"
[2020-08-15 11:40:48] NOTICE[1185][C-000027b5] chan_sip.c: Call from '' (45.143.220.87:11278) to extension '+46842002652' rejected because extension not found in context 'public'.
[2020-08-15 11:40:48] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-15T11:40:48.085-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="+46842002652",SessionID="0x7f10c43e3a48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.8
...
2020-08-15 23:57:56
88.102.249.203 attackspam
Aug 15 16:21:57 marvibiene sshd[20355]: Failed password for root from 88.102.249.203 port 44235 ssh2
2020-08-15 23:45:11
222.186.15.18 attackbotsspam
Aug 15 12:10:12 ny01 sshd[1703]: Failed password for root from 222.186.15.18 port 64596 ssh2
Aug 15 12:10:14 ny01 sshd[1703]: Failed password for root from 222.186.15.18 port 64596 ssh2
Aug 15 12:10:17 ny01 sshd[1703]: Failed password for root from 222.186.15.18 port 64596 ssh2
2020-08-16 00:14:59
103.129.223.101 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-15T13:23:58Z and 2020-08-15T13:32:14Z
2020-08-16 00:20:22
60.220.185.61 attackbotsspam
Aug 15 11:32:14 NPSTNNYC01T sshd[23555]: Failed password for root from 60.220.185.61 port 60736 ssh2
Aug 15 11:38:55 NPSTNNYC01T sshd[24017]: Failed password for root from 60.220.185.61 port 40942 ssh2
...
2020-08-15 23:55:27
106.51.80.198 attackbots
Aug 15 15:13:11 cosmoit sshd[28773]: Failed password for root from 106.51.80.198 port 48078 ssh2
2020-08-16 00:00:18
106.12.202.119 attackspambots
Aug 15 15:51:49 roki-contabo sshd\[11181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.119  user=root
Aug 15 15:51:51 roki-contabo sshd\[11181\]: Failed password for root from 106.12.202.119 port 59932 ssh2
Aug 15 16:02:20 roki-contabo sshd\[11316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.119  user=root
Aug 15 16:02:22 roki-contabo sshd\[11316\]: Failed password for root from 106.12.202.119 port 51558 ssh2
Aug 15 16:08:33 roki-contabo sshd\[11411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.119  user=root
...
2020-08-16 00:00:38
171.249.138.146 attack
1597494024 - 08/15/2020 14:20:24 Host: 171.249.138.146/171.249.138.146 Port: 445 TCP Blocked
2020-08-16 00:25:02
95.249.244.9 attackspambots
20 attempts against mh-misbehave-ban on cedar
2020-08-16 00:29:02

最近上报的IP列表

37.147.21.119 244.181.100.105 119.22.32.199 226.25.255.227
92.156.159.125 235.168.88.120 211.128.251.96 22.224.245.246
56.93.66.209 56.102.120.213 235.218.105.45 24.198.91.36
28.191.63.197 216.232.76.23 52.39.224.25 212.85.239.245
113.33.227.191 46.116.154.11 208.146.110.179 246.32.167.6