必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.53.57.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.53.57.211.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 16:23:26 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 211.57.53.107.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 211.57.53.107.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.88.154.29 attack
Honeypot attack, port: 23, PTR: 29.154.88.218.broad.cd.sc.dynamic.163data.com.cn.
2019-08-17 02:30:57
218.92.1.130 attackbots
SSH Brute Force, server-1 sshd[22861]: Failed password for root from 218.92.1.130 port 53863 ssh2
2019-08-17 02:49:09
113.142.69.97 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-17 02:10:04
220.255.87.102 attackbotsspam
Aug 16 03:34:39 lamijardin sshd[17935]: Invalid user pi from 220.255.87.102
Aug 16 03:34:39 lamijardin sshd[17935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.255.87.102
Aug 16 03:34:41 lamijardin sshd[17935]: Failed password for invalid user pi from 220.255.87.102 port 47946 ssh2
Aug 16 03:34:41 lamijardin sshd[17935]: Received disconnect from 220.255.87.102 port 47946:11: Bye Bye [preauth]
Aug 16 03:34:41 lamijardin sshd[17935]: Disconnected from 220.255.87.102 port 47946 [preauth]
Aug 16 04:00:29 lamijardin sshd[18071]: Invalid user raquel from 220.255.87.102
Aug 16 04:00:29 lamijardin sshd[18071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.255.87.102
Aug 16 04:00:31 lamijardin sshd[18071]: Failed password for invalid user raquel from 220.255.87.102 port 45458 ssh2
Aug 16 04:00:31 lamijardin sshd[18071]: Received disconnect from 220.255.87.102 port 45458:11: Bye Bye [pre........
-------------------------------
2019-08-17 02:45:41
79.239.192.209 attack
2019-08-16T19:26:18.386938centos sshd\[7722\]: Invalid user geography from 79.239.192.209 port 44289
2019-08-16T19:26:18.394695centos sshd\[7722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=p4fefc0d1.dip0.t-ipconnect.de
2019-08-16T19:26:20.001149centos sshd\[7722\]: Failed password for invalid user geography from 79.239.192.209 port 44289 ssh2
2019-08-17 02:37:23
198.98.50.112 attack
Aug 16 08:23:06 web9 sshd\[17009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.50.112  user=root
Aug 16 08:23:07 web9 sshd\[17009\]: Failed password for root from 198.98.50.112 port 65489 ssh2
Aug 16 08:23:10 web9 sshd\[17009\]: Failed password for root from 198.98.50.112 port 65489 ssh2
Aug 16 08:23:13 web9 sshd\[17009\]: Failed password for root from 198.98.50.112 port 65489 ssh2
Aug 16 08:23:16 web9 sshd\[17009\]: Failed password for root from 198.98.50.112 port 65489 ssh2
2019-08-17 02:33:09
189.243.73.92 attackbotsspam
Aug 16 19:25:08 MK-Soft-Root1 sshd\[28099\]: Invalid user named from 189.243.73.92 port 60462
Aug 16 19:25:08 MK-Soft-Root1 sshd\[28099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.243.73.92
Aug 16 19:25:10 MK-Soft-Root1 sshd\[28099\]: Failed password for invalid user named from 189.243.73.92 port 60462 ssh2
...
2019-08-17 02:19:14
178.32.47.97 attack
Aug 16 20:33:34 localhost sshd\[24256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.47.97  user=root
Aug 16 20:33:36 localhost sshd\[24256\]: Failed password for root from 178.32.47.97 port 58676 ssh2
Aug 16 20:39:10 localhost sshd\[24889\]: Invalid user otools from 178.32.47.97 port 52874
Aug 16 20:39:10 localhost sshd\[24889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.47.97
2019-08-17 02:39:44
24.149.99.202 attackbots
Aug 16 07:09:01 aiointranet sshd\[21485\]: Invalid user i-heart from 24.149.99.202
Aug 16 07:09:01 aiointranet sshd\[21485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.149.99.202
Aug 16 07:09:02 aiointranet sshd\[21485\]: Failed password for invalid user i-heart from 24.149.99.202 port 46348 ssh2
Aug 16 07:13:57 aiointranet sshd\[21987\]: Invalid user elasticsearch from 24.149.99.202
Aug 16 07:13:57 aiointranet sshd\[21987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.149.99.202
2019-08-17 02:33:48
51.68.198.119 attack
Aug 16 13:59:47 TORMINT sshd\[16218\]: Invalid user testing from 51.68.198.119
Aug 16 13:59:47 TORMINT sshd\[16218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.119
Aug 16 13:59:49 TORMINT sshd\[16218\]: Failed password for invalid user testing from 51.68.198.119 port 50546 ssh2
...
2019-08-17 02:08:46
46.149.182.92 attack
Aug 16 13:54:34 debian sshd\[13868\]: Invalid user nagios from 46.149.182.92 port 58862
Aug 16 13:54:34 debian sshd\[13868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.149.182.92
Aug 16 13:54:37 debian sshd\[13868\]: Failed password for invalid user nagios from 46.149.182.92 port 58862 ssh2
...
2019-08-17 02:18:52
67.55.92.88 attackspambots
Aug 16 23:40:35 areeb-Workstation sshd\[29369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.88  user=root
Aug 16 23:40:36 areeb-Workstation sshd\[29369\]: Failed password for root from 67.55.92.88 port 55088 ssh2
Aug 16 23:45:09 areeb-Workstation sshd\[30357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.88  user=root
...
2019-08-17 02:28:00
51.68.46.156 attack
Aug 16 07:50:45 hiderm sshd\[22931\]: Invalid user parker from 51.68.46.156
Aug 16 07:50:45 hiderm sshd\[22931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.ip-51-68-46.eu
Aug 16 07:50:47 hiderm sshd\[22931\]: Failed password for invalid user parker from 51.68.46.156 port 35980 ssh2
Aug 16 07:55:05 hiderm sshd\[23277\]: Invalid user premier from 51.68.46.156
Aug 16 07:55:05 hiderm sshd\[23277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.ip-51-68-46.eu
2019-08-17 01:58:20
89.203.150.138 attackspam
Aug 16 18:07:51 rigel postfix/smtpd[26998]: connect from unknown[89.203.150.138]
Aug 16 18:07:52 rigel postfix/smtpd[26998]: warning: unknown[89.203.150.138]: SASL CRAM-MD5 authentication failed: authentication failure
Aug 16 18:07:52 rigel postfix/smtpd[26998]: warning: unknown[89.203.150.138]: SASL PLAIN authentication failed: authentication failure
Aug 16 18:07:52 rigel postfix/smtpd[26998]: warning: unknown[89.203.150.138]: SASL LOGIN authentication failed: authentication failure
Aug 16 18:07:52 rigel postfix/smtpd[26998]: disconnect from unknown[89.203.150.138]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=89.203.150.138
2019-08-17 02:42:26
69.245.153.37 attackspambots
Honeypot attack, port: 23, PTR: c-69-245-153-37.hsd1.il.comcast.net.
2019-08-17 02:35:59

最近上报的IP列表

28.28.20.44 82.255.179.142 166.26.172.116 181.123.150.89
38.112.128.215 65.170.25.19 21.234.61.69 175.40.143.44
157.113.217.80 23.230.60.32 220.159.80.34 154.108.4.214
154.194.162.43 109.123.93.205 135.163.136.43 4.204.35.49
179.131.202.32 42.211.79.117 243.34.201.217 147.63.71.86