必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea Republic of

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.40.139.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.40.139.57.			IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 01:37:51 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 57.139.40.122.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.139.40.122.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.150 attackbots
2020-05-25T06:35:05.575290abusebot-4.cloudsearch.cf sshd[11335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
2020-05-25T06:35:07.706102abusebot-4.cloudsearch.cf sshd[11335]: Failed password for root from 222.186.175.150 port 12978 ssh2
2020-05-25T06:35:11.121554abusebot-4.cloudsearch.cf sshd[11335]: Failed password for root from 222.186.175.150 port 12978 ssh2
2020-05-25T06:35:05.575290abusebot-4.cloudsearch.cf sshd[11335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
2020-05-25T06:35:07.706102abusebot-4.cloudsearch.cf sshd[11335]: Failed password for root from 222.186.175.150 port 12978 ssh2
2020-05-25T06:35:11.121554abusebot-4.cloudsearch.cf sshd[11335]: Failed password for root from 222.186.175.150 port 12978 ssh2
2020-05-25T06:35:05.575290abusebot-4.cloudsearch.cf sshd[11335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2020-05-25 14:54:29
81.200.30.151 attack
May 25 07:31:30 vserver sshd\[16041\]: Invalid user tester from 81.200.30.151May 25 07:31:32 vserver sshd\[16041\]: Failed password for invalid user tester from 81.200.30.151 port 57130 ssh2May 25 07:35:06 vserver sshd\[16067\]: Invalid user xgridcontroller from 81.200.30.151May 25 07:35:08 vserver sshd\[16067\]: Failed password for invalid user xgridcontroller from 81.200.30.151 port 34158 ssh2
...
2020-05-25 14:29:24
67.211.216.7 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-25 14:41:17
46.182.6.77 attack
May 24 20:11:24 web9 sshd\[6049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.182.6.77  user=root
May 24 20:11:25 web9 sshd\[6049\]: Failed password for root from 46.182.6.77 port 39806 ssh2
May 24 20:20:33 web9 sshd\[7501\]: Invalid user ecqadmin from 46.182.6.77
May 24 20:20:33 web9 sshd\[7501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.182.6.77
May 24 20:20:36 web9 sshd\[7501\]: Failed password for invalid user ecqadmin from 46.182.6.77 port 45538 ssh2
2020-05-25 15:03:36
212.119.190.162 attackbotsspam
(sshd) Failed SSH login from 212.119.190.162 (RU/Russia/mail.swedmobil.ru): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 25 06:11:19 ubnt-55d23 sshd[1235]: Invalid user business from 212.119.190.162 port 53796
May 25 06:11:21 ubnt-55d23 sshd[1235]: Failed password for invalid user business from 212.119.190.162 port 53796 ssh2
2020-05-25 14:56:18
14.116.193.91 attack
May 25 06:31:09 vps639187 sshd\[426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.193.91  user=root
May 25 06:31:10 vps639187 sshd\[426\]: Failed password for root from 14.116.193.91 port 55126 ssh2
May 25 06:35:57 vps639187 sshd\[450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.193.91  user=root
...
2020-05-25 15:04:28
51.38.71.36 attackspam
May 25 05:48:06 server sshd[37275]: Failed password for root from 51.38.71.36 port 41922 ssh2
May 25 05:50:46 server sshd[39452]: Failed password for root from 51.38.71.36 port 32892 ssh2
May 25 05:53:18 server sshd[41436]: Failed password for root from 51.38.71.36 port 52098 ssh2
2020-05-25 14:30:01
104.248.158.95 attackbots
104.248.158.95 - - \[25/May/2020:08:26:33 +0200\] "POST /wp-login.php HTTP/1.0" 200 6728 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.158.95 - - \[25/May/2020:08:26:37 +0200\] "POST /wp-login.php HTTP/1.0" 200 6558 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.158.95 - - \[25/May/2020:08:26:40 +0200\] "POST /wp-login.php HTTP/1.0" 200 6552 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-25 14:51:22
119.96.175.244 attackspambots
 TCP (SYN) 119.96.175.244:46503 -> port 3763, len 44
2020-05-25 14:39:56
45.55.214.64 attackspambots
May 25 07:55:29 ArkNodeAT sshd\[11062\]: Invalid user j from 45.55.214.64
May 25 07:55:29 ArkNodeAT sshd\[11062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.214.64
May 25 07:55:31 ArkNodeAT sshd\[11062\]: Failed password for invalid user j from 45.55.214.64 port 37188 ssh2
2020-05-25 14:47:43
37.59.100.22 attack
2020-05-25T03:41:09.900921randservbullet-proofcloud-66.localdomain sshd[3709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=22.ip-37-59-100.eu  user=root
2020-05-25T03:41:12.024461randservbullet-proofcloud-66.localdomain sshd[3709]: Failed password for root from 37.59.100.22 port 38378 ssh2
2020-05-25T03:53:15.792417randservbullet-proofcloud-66.localdomain sshd[3798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=22.ip-37-59-100.eu  user=root
2020-05-25T03:53:18.583166randservbullet-proofcloud-66.localdomain sshd[3798]: Failed password for root from 37.59.100.22 port 33814 ssh2
...
2020-05-25 14:30:29
218.92.0.212 attackbotsspam
May 25 08:28:48 MainVPS sshd[29205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
May 25 08:28:50 MainVPS sshd[29205]: Failed password for root from 218.92.0.212 port 62051 ssh2
May 25 08:28:53 MainVPS sshd[29205]: Failed password for root from 218.92.0.212 port 62051 ssh2
May 25 08:28:48 MainVPS sshd[29205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
May 25 08:28:50 MainVPS sshd[29205]: Failed password for root from 218.92.0.212 port 62051 ssh2
May 25 08:28:53 MainVPS sshd[29205]: Failed password for root from 218.92.0.212 port 62051 ssh2
May 25 08:28:48 MainVPS sshd[29205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
May 25 08:28:50 MainVPS sshd[29205]: Failed password for root from 218.92.0.212 port 62051 ssh2
May 25 08:28:53 MainVPS sshd[29205]: Failed password for root from 218.92.0.212 port 62051 ssh2
M
2020-05-25 14:38:43
81.177.72.58 attack
2020-05-25T08:14:44.049141struts4.enskede.local sshd\[22586\]: Invalid user ricardo from 81.177.72.58 port 56876
2020-05-25T08:14:44.055319struts4.enskede.local sshd\[22586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.177.72.58
2020-05-25T08:14:46.318535struts4.enskede.local sshd\[22586\]: Failed password for invalid user ricardo from 81.177.72.58 port 56876 ssh2
2020-05-25T08:19:01.301333struts4.enskede.local sshd\[22623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.177.72.58  user=operator
2020-05-25T08:19:03.985949struts4.enskede.local sshd\[22623\]: Failed password for operator from 81.177.72.58 port 60826 ssh2
...
2020-05-25 14:38:07
14.0.17.22 attack
SMB Server BruteForce Attack
2020-05-25 14:46:10
61.7.171.228 attackspambots
1590378783 - 05/25/2020 05:53:03 Host: 61.7.171.228/61.7.171.228 Port: 445 TCP Blocked
2020-05-25 14:45:46

最近上报的IP列表

208.191.230.34 58.233.205.119 78.14.177.151 233.74.18.231
169.26.24.3 93.6.176.124 39.103.170.137 64.9.84.0
248.86.68.227 200.134.54.143 225.252.16.193 88.97.2.244
14.81.112.222 38.5.189.225 46.211.244.88 33.68.151.138
68.1.66.3 36.55.174.15 182.82.227.57 17.82.3.244