必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.57.55.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31919
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.57.55.204.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:53:08 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 204.55.57.12.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 204.55.57.12.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.205.135.171 attackspam
srvr1: (mod_security) mod_security (id:942100) triggered by 129.205.135.171 (ZA/-/129-205-135-171.dynamic.macrolan.co.za): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:05:05 [error] 482759#0: *840539 [client 129.205.135.171] ModSecurity: Access denied with code 406 (phase 2).  [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801150536.056070"] [ref ""], client: 129.205.135.171, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%29%29%29+OR+++%28%28%284032%3D0 HTTP/1.1" [redacted]
2020-08-21 23:19:46
185.97.116.222 attackbotsspam
Aug 21 14:04:48 rancher-0 sshd[1193518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.222  user=root
Aug 21 14:04:50 rancher-0 sshd[1193518]: Failed password for root from 185.97.116.222 port 49650 ssh2
...
2020-08-21 23:32:24
203.162.79.194 attack
Fail2Ban Ban Triggered
2020-08-21 23:24:36
213.166.73.28 attack
Trying to access wordpress plugins
2020-08-21 23:38:06
183.12.242.226 attackbots
Failed password for invalid user servidor1 from 183.12.242.226 port 19755 ssh2
2020-08-21 23:03:20
77.247.181.163 attack
Aug 21 15:51:37 srv3 sshd\[1465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.247.181.163  user=root
Aug 21 15:51:38 srv3 sshd\[1465\]: Failed password for root from 77.247.181.163 port 30166 ssh2
Aug 21 15:51:42 srv3 sshd\[1465\]: Failed password for root from 77.247.181.163 port 30166 ssh2
Aug 21 15:51:43 srv3 sshd\[1465\]: Failed password for root from 77.247.181.163 port 30166 ssh2
Aug 21 15:51:46 srv3 sshd\[1465\]: Failed password for root from 77.247.181.163 port 30166 ssh2
...
2020-08-21 23:00:41
65.96.150.113 attackbots
Aug 21 07:45:05 josie sshd[19539]: Invalid user admin from 65.96.150.113
Aug 21 07:45:06 josie sshd[19539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.96.150.113 
Aug 21 07:45:08 josie sshd[19539]: Failed password for invalid user admin from 65.96.150.113 port 53352 ssh2
Aug 21 07:45:08 josie sshd[19540]: Received disconnect from 65.96.150.113: 11: Bye Bye
Aug 21 07:45:08 josie sshd[19545]: Invalid user admin from 65.96.150.113
Aug 21 07:45:08 josie sshd[19545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.96.150.113 
Aug 21 07:45:10 josie sshd[19545]: Failed password for invalid user admin from 65.96.150.113 port 53423 ssh2
Aug 21 07:45:10 josie sshd[19546]: Received disconnect from 65.96.150.113: 11: Bye Bye
Aug 21 07:45:11 josie sshd[19554]: Invalid user admin from 65.96.150.113
Aug 21 07:45:11 josie sshd[19554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu........
-------------------------------
2020-08-21 23:41:25
111.231.231.22 attackspambots
$f2bV_matches
2020-08-21 23:35:03
106.52.200.171 attackspambots
Aug 21 15:54:51 *hidden* sshd[46047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.171 user=root Aug 21 15:54:53 *hidden* sshd[46047]: Failed password for *hidden* from 106.52.200.171 port 42082 ssh2 Aug 21 15:59:40 *hidden* sshd[47700]: Invalid user el from 106.52.200.171 port 59970 Aug 21 15:59:40 *hidden* sshd[47700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.200.171 Aug 21 15:59:42 *hidden* sshd[47700]: Failed password for invalid user el from 106.52.200.171 port 59970 ssh2
2020-08-21 23:17:45
68.183.203.30 attackspambots
Aug 21 13:09:43 onepixel sshd[2297634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.203.30 
Aug 21 13:09:43 onepixel sshd[2297634]: Invalid user frappe from 68.183.203.30 port 47994
Aug 21 13:09:45 onepixel sshd[2297634]: Failed password for invalid user frappe from 68.183.203.30 port 47994 ssh2
Aug 21 13:14:39 onepixel sshd[2300385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.203.30  user=root
Aug 21 13:14:40 onepixel sshd[2300385]: Failed password for root from 68.183.203.30 port 47394 ssh2
2020-08-21 23:25:24
87.251.74.18 attack
Port scan on 12 port(s): 505 1000 4389 5001 5389 8080 8888 9000 23390 33391 33999 63389
2020-08-21 23:04:42
37.139.8.104 attack
CMS (WordPress or Joomla) login attempt.
2020-08-21 23:03:57
101.71.3.53 attack
Aug 21 16:46:17 server sshd[3685]: Failed password for invalid user stop from 101.71.3.53 port 60449 ssh2
Aug 21 16:51:47 server sshd[11059]: Failed password for root from 101.71.3.53 port 60451 ssh2
Aug 21 16:53:42 server sshd[13432]: Failed password for invalid user admin from 101.71.3.53 port 60452 ssh2
2020-08-21 23:17:07
58.56.140.62 attack
2020-08-21T15:07:22.296142vps751288.ovh.net sshd\[21190\]: Invalid user admin from 58.56.140.62 port 50849
2020-08-21T15:07:22.302791vps751288.ovh.net sshd\[21190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.140.62
2020-08-21T15:07:24.924155vps751288.ovh.net sshd\[21190\]: Failed password for invalid user admin from 58.56.140.62 port 50849 ssh2
2020-08-21T15:11:19.102793vps751288.ovh.net sshd\[21258\]: Invalid user globalflash from 58.56.140.62 port 6241
2020-08-21T15:11:19.109828vps751288.ovh.net sshd\[21258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.140.62
2020-08-21 23:18:24
211.173.58.253 attackbotsspam
Aug 21 14:57:01 srv-ubuntu-dev3 sshd[46915]: Invalid user iqc from 211.173.58.253
Aug 21 14:57:01 srv-ubuntu-dev3 sshd[46915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.173.58.253
Aug 21 14:57:01 srv-ubuntu-dev3 sshd[46915]: Invalid user iqc from 211.173.58.253
Aug 21 14:57:03 srv-ubuntu-dev3 sshd[46915]: Failed password for invalid user iqc from 211.173.58.253 port 42340 ssh2
Aug 21 14:58:16 srv-ubuntu-dev3 sshd[47076]: Invalid user kafka from 211.173.58.253
Aug 21 14:58:16 srv-ubuntu-dev3 sshd[47076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.173.58.253
Aug 21 14:58:16 srv-ubuntu-dev3 sshd[47076]: Invalid user kafka from 211.173.58.253
Aug 21 14:58:18 srv-ubuntu-dev3 sshd[47076]: Failed password for invalid user kafka from 211.173.58.253 port 56520 ssh2
Aug 21 14:59:29 srv-ubuntu-dev3 sshd[47201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2
...
2020-08-21 23:18:49

最近上报的IP列表

23.49.199.18 143.181.18.128 22.72.197.241 211.197.138.168
87.216.127.204 89.99.173.70 68.48.168.14 193.181.217.157
193.83.238.107 177.73.195.64 120.249.174.66 28.208.179.200
162.46.65.125 70.18.98.215 227.127.249.31 103.157.173.178
161.63.105.165 114.164.255.230 206.226.69.121 186.110.18.45