必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.189.57.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.189.57.22.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:36:54 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 22.57.189.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.57.189.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
219.153.31.186 attackbotsspam
Sep  2 23:25:00 markkoudstaal sshd[1522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.31.186
Sep  2 23:25:02 markkoudstaal sshd[1522]: Failed password for invalid user mktg3 from 219.153.31.186 port 36688 ssh2
Sep  2 23:29:41 markkoudstaal sshd[2019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.31.186
2019-09-03 05:37:09
41.78.201.48 attack
Sep  2 20:05:43 debian sshd\[23865\]: Invalid user plaidhorse from 41.78.201.48 port 38359
Sep  2 20:05:43 debian sshd\[23865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.201.48
...
2019-09-03 05:27:27
114.236.204.63 attackspam
Unauthorised access (Sep  2) SRC=114.236.204.63 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=2538 TCP DPT=8080 WINDOW=53212 SYN 
Unauthorised access (Sep  2) SRC=114.236.204.63 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=1144 TCP DPT=8080 WINDOW=53212 SYN 
Unauthorised access (Sep  2) SRC=114.236.204.63 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=49880 TCP DPT=8080 WINDOW=62356 SYN
2019-09-03 04:59:15
193.201.224.12 attackbots
Sep  3 01:42:57 itv-usvr-01 sshd[27597]: Invalid user 0 from 193.201.224.12
Sep  3 01:42:57 itv-usvr-01 sshd[27597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.201.224.12
Sep  3 01:42:57 itv-usvr-01 sshd[27597]: Invalid user 0 from 193.201.224.12
Sep  3 01:42:59 itv-usvr-01 sshd[27597]: Failed password for invalid user 0 from 193.201.224.12 port 9584 ssh2
2019-09-03 05:17:25
212.64.7.134 attack
Sep  2 18:13:34 debian sshd\[20618\]: Invalid user bot from 212.64.7.134 port 49962
Sep  2 18:13:34 debian sshd\[20618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.7.134
...
2019-09-03 04:57:39
159.65.137.23 attack
Repeated brute force against a port
2019-09-03 05:22:44
223.241.162.225 attackspambots
Bad Postfix AUTH attempts
...
2019-09-03 05:34:06
212.73.90.86 attack
Sep  2 17:40:53 Ubuntu-1404-trusty-64-minimal sshd\[9897\]: Invalid user ax from 212.73.90.86
Sep  2 17:40:53 Ubuntu-1404-trusty-64-minimal sshd\[9897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.73.90.86
Sep  2 17:40:55 Ubuntu-1404-trusty-64-minimal sshd\[9897\]: Failed password for invalid user ax from 212.73.90.86 port 64440 ssh2
Sep  2 17:48:54 Ubuntu-1404-trusty-64-minimal sshd\[12657\]: Invalid user user2 from 212.73.90.86
Sep  2 17:48:54 Ubuntu-1404-trusty-64-minimal sshd\[12657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.73.90.86
2019-09-03 05:09:42
77.120.228.177 attack
postfix/smtpd\[9399\]: NOQUEUE: reject: RCPT from unknown\[77.120.228.177\]: 554 5.7.1 Service Client host \[77.120.228.177\] blocked using sbl-xbl.spamhaus.org\;
2019-09-03 04:52:17
59.173.8.178 attackspam
2019-09-02T19:40:21.108712abusebot-3.cloudsearch.cf sshd\[31832\]: Invalid user dmkim from 59.173.8.178 port 47321
2019-09-03 05:28:55
190.244.230.54 attackbots
34567/tcp
[2019-09-02]1pkt
2019-09-03 05:37:29
218.3.139.85 attack
Sep  2 05:34:21 hiderm sshd\[28453\]: Invalid user nevin from 218.3.139.85
Sep  2 05:34:21 hiderm sshd\[28453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.139.85
Sep  2 05:34:23 hiderm sshd\[28453\]: Failed password for invalid user nevin from 218.3.139.85 port 56481 ssh2
Sep  2 05:39:01 hiderm sshd\[28825\]: Invalid user carlosfarah from 218.3.139.85
Sep  2 05:39:01 hiderm sshd\[28825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.139.85
2019-09-03 05:01:05
157.230.119.200 attack
Sep  2 19:42:20 SilenceServices sshd[2824]: Failed password for root from 157.230.119.200 port 41430 ssh2
Sep  2 19:46:30 SilenceServices sshd[5952]: Failed password for root from 157.230.119.200 port 58528 ssh2
2019-09-03 04:50:00
2.190.43.111 attackbots
23/tcp
[2019-09-02]1pkt
2019-09-03 04:49:26
77.45.157.116 attackspambots
Sep  2 15:05:48 xb3 sshd[14538]: Failed password for r.r from 77.45.157.116 port 58485 ssh2
Sep  2 15:05:50 xb3 sshd[14538]: Failed password for r.r from 77.45.157.116 port 58485 ssh2
Sep  2 15:05:52 xb3 sshd[14538]: Failed password for r.r from 77.45.157.116 port 58485 ssh2
Sep  2 15:05:52 xb3 sshd[14538]: Disconnecting: Too many authentication failures for r.r from 77.45.157.116 port 58485 ssh2 [preauth]
Sep  2 15:05:59 xb3 sshd[14786]: Failed password for r.r from 77.45.157.116 port 58494 ssh2
Sep  2 15:06:02 xb3 sshd[14786]: Failed password for r.r from 77.45.157.116 port 58494 ssh2
Sep  2 15:06:04 xb3 sshd[14786]: Failed password for r.r from 77.45.157.116 port 58494 ssh2
Sep  2 15:06:04 xb3 sshd[14786]: Disconnecting: Too many authentication failures for r.r from 77.45.157.116 port 58494 ssh2 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.45.157.116
2019-09-03 04:58:36

最近上报的IP列表

106.40.241.162 106.190.150.203 106.196.30.88 106.197.3.143
106.198.20.163 106.198.251.124 106.2.1.5 106.40.243.105
106.40.243.106 106.40.243.117 106.40.243.10 106.40.243.118
106.40.243.114 106.40.243.108 106.40.243.1 106.40.243.110
106.40.243.113 106.40.243.100 106.40.243.102 106.40.243.122