必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.14.3.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.14.3.57.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 27 14:57:42 CST 2024
;; MSG SIZE  rcvd: 104
HOST信息:
57.3.14.116.in-addr.arpa domain name pointer bb116-14-3-57.singnet.com.sg.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.3.14.116.in-addr.arpa	name = bb116-14-3-57.singnet.com.sg.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.216.193.65 attackbotsspam
Invalid user test from 201.216.193.65 port 38200
2019-07-27 12:24:36
17.58.97.104 attackspam
[Fri Jul 26 09:06:34 2019] [error] [client 17.58.97.104] File does not exist: /home/schoenbrun.com/public_html/mitch.htm
2019-07-27 12:32:26
160.174.129.174 attackspambots
SSH Brute-Force attacks
2019-07-27 12:38:56
66.70.255.6 attackspam
firewall-block, port(s): 445/tcp
2019-07-27 11:56:41
40.73.73.130 attack
Jul 26 23:40:18 yabzik sshd[29103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.73.130
Jul 26 23:40:20 yabzik sshd[29103]: Failed password for invalid user hadoop from 40.73.73.130 port 39536 ssh2
Jul 26 23:45:52 yabzik sshd[30979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.73.130
2019-07-27 12:34:34
90.189.164.195 attackbots
Attempts against Pop3/IMAP
2019-07-27 11:57:29
107.155.96.46 attackspam
[Fri Jul 26 09:10:14 2019] [error] [client 107.155.96.46] File does not exist: /home/sfaa/public_html/test
2019-07-27 12:23:46
201.216.252.157 attack
2019-07-27T04:22:48.578327abusebot.cloudsearch.cf sshd\[7050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.216.252.157  user=root
2019-07-27 12:32:58
190.220.7.66 attackbotsspam
Jul 27 05:28:52 v22018076622670303 sshd\[9254\]: Invalid user february from 190.220.7.66 port 44886
Jul 27 05:28:52 v22018076622670303 sshd\[9254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.220.7.66
Jul 27 05:28:53 v22018076622670303 sshd\[9254\]: Failed password for invalid user february from 190.220.7.66 port 44886 ssh2
...
2019-07-27 11:48:58
222.143.242.69 attackspambots
Jul 26 21:33:17 h2177944 sshd\[29554\]: Invalid user adelin from 222.143.242.69 port 32250
Jul 26 21:33:17 h2177944 sshd\[29554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.143.242.69
Jul 26 21:33:19 h2177944 sshd\[29554\]: Failed password for invalid user adelin from 222.143.242.69 port 32250 ssh2
Jul 26 21:38:25 h2177944 sshd\[29657\]: Invalid user sergio from 222.143.242.69 port 10836
Jul 26 21:38:25 h2177944 sshd\[29657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.143.242.69
...
2019-07-27 12:52:02
80.121.253.117 attack
Automatic report - Port Scan Attack
2019-07-27 12:55:07
221.152.217.113 attackbotsspam
Jul 26 21:38:18 server sshd[21333]: Failed password for invalid user netscreen from 221.152.217.113 port 52376 ssh2
Jul 26 21:38:24 server sshd[21341]: Failed password for invalid user misp from 221.152.217.113 port 55034 ssh2
Jul 26 21:38:49 server sshd[21373]: Failed password for invalid user admin from 221.152.217.113 port 41488 ssh2
2019-07-27 12:35:49
104.229.105.140 attack
Invalid user oracle from 104.229.105.140 port 45010
2019-07-27 12:47:35
167.99.77.255 attack
Jul 27 05:00:17 localhost sshd\[24027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.77.255  user=root
Jul 27 05:00:19 localhost sshd\[24027\]: Failed password for root from 167.99.77.255 port 52922 ssh2
...
2019-07-27 12:23:16
46.161.27.42 attack
Port scan: Attack repeated for 24 hours
2019-07-27 12:41:54

最近上报的IP列表

227.11.51.224 188.236.19.36 73.34.192.177 48.212.113.128
63.158.228.56 17.17.77.57 205.102.62.151 27.70.232.100
9.246.233.104 39.2.144.148 118.169.189.126 203.152.125.136
167.222.113.208 241.234.21.109 142.132.242.58 234.196.213.111
252.86.173.115 192.216.255.206 252.110.21.120 22.159.253.243