必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.57.194.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18721
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.57.194.21.			IN	A

;; AUTHORITY SECTION:
.			434	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:08:46 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
21.194.57.13.in-addr.arpa domain name pointer ec2-13-57-194-21.us-west-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.194.57.13.in-addr.arpa	name = ec2-13-57-194-21.us-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
149.56.141.170 attack
Aug 22 15:06:11 vps639187 sshd\[16348\]: Invalid user riana from 149.56.141.170 port 53248
Aug 22 15:06:11 vps639187 sshd\[16348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.141.170
Aug 22 15:06:13 vps639187 sshd\[16348\]: Failed password for invalid user riana from 149.56.141.170 port 53248 ssh2
...
2020-08-22 21:30:58
164.132.110.238 attackspam
2020-08-22T13:10:03.845865shield sshd\[23533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.110.238  user=root
2020-08-22T13:10:05.783977shield sshd\[23533\]: Failed password for root from 164.132.110.238 port 53208 ssh2
2020-08-22T13:12:18.418292shield sshd\[24096\]: Invalid user frans from 164.132.110.238 port 60708
2020-08-22T13:12:18.440386shield sshd\[24096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.110.238
2020-08-22T13:12:20.579592shield sshd\[24096\]: Failed password for invalid user frans from 164.132.110.238 port 60708 ssh2
2020-08-22 21:22:08
206.189.87.108 attackspam
Aug 22 05:43:21 mockhub sshd[3376]: Failed password for minecraft from 206.189.87.108 port 53938 ssh2
...
2020-08-22 21:19:07
36.229.24.19 attackbots
Unauthorized connection attempt from IP address 36.229.24.19 on Port 445(SMB)
2020-08-22 21:51:19
49.235.132.88 attack
SSH login attempts.
2020-08-22 21:48:01
191.235.78.75 attackspambots
2020-08-22T13:21:13.284765shield sshd\[26299\]: Invalid user minecraft from 191.235.78.75 port 59926
2020-08-22T13:21:13.305553shield sshd\[26299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.78.75
2020-08-22T13:21:15.224034shield sshd\[26299\]: Failed password for invalid user minecraft from 191.235.78.75 port 59926 ssh2
2020-08-22T13:26:18.406202shield sshd\[27612\]: Invalid user deploy from 191.235.78.75 port 40348
2020-08-22T13:26:18.414842shield sshd\[27612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.235.78.75
2020-08-22 21:29:12
187.109.253.246 attackspambots
Aug 22 14:15:29 mellenthin sshd[2350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.109.253.246  user=root
Aug 22 14:15:31 mellenthin sshd[2350]: Failed password for invalid user root from 187.109.253.246 port 60834 ssh2
2020-08-22 21:15:48
197.234.194.210 attack
Unauthorized connection attempt from IP address 197.234.194.210 on Port 445(SMB)
2020-08-22 21:32:37
122.51.80.103 attackbotsspam
Aug 22 17:33:57 lunarastro sshd[17283]: Failed password for root from 122.51.80.103 port 56096 ssh2
Aug 22 17:46:18 lunarastro sshd[17732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.80.103 
Aug 22 17:46:21 lunarastro sshd[17732]: Failed password for invalid user usuario from 122.51.80.103 port 57118 ssh2
2020-08-22 21:41:53
49.235.98.68 attack
2020-08-22T07:55:21.3395451495-001 sshd[47503]: Invalid user morita from 49.235.98.68 port 46378
2020-08-22T07:55:21.3429801495-001 sshd[47503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.98.68
2020-08-22T07:55:21.3395451495-001 sshd[47503]: Invalid user morita from 49.235.98.68 port 46378
2020-08-22T07:55:22.9808561495-001 sshd[47503]: Failed password for invalid user morita from 49.235.98.68 port 46378 ssh2
2020-08-22T07:58:50.0242221495-001 sshd[47611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.98.68  user=root
2020-08-22T07:58:51.8830531495-001 sshd[47611]: Failed password for root from 49.235.98.68 port 58266 ssh2
...
2020-08-22 21:25:46
49.235.54.129 attackspam
Aug 22 13:44:05 ajax sshd[29572]: Failed password for root from 49.235.54.129 port 53898 ssh2
2020-08-22 21:36:19
156.96.117.189 attackspambots
[2020-08-22 09:22:22] NOTICE[1185][C-00004953] chan_sip.c: Call from '' (156.96.117.189:64605) to extension '0048221530539' rejected because extension not found in context 'public'.
[2020-08-22 09:22:22] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-22T09:22:22.974-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0048221530539",SessionID="0x7f10c405a408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.117.189/64605",ACLName="no_extension_match"
[2020-08-22 09:22:40] NOTICE[1185][C-00004955] chan_sip.c: Call from '' (156.96.117.189:59153) to extension '011441252954108' rejected because extension not found in context 'public'.
[2020-08-22 09:22:40] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-22T09:22:40.711-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441252954108",SessionID="0x7f10c4245bd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/1
...
2020-08-22 21:23:08
171.231.188.152 attack
Unauthorized connection attempt from IP address 171.231.188.152 on Port 445(SMB)
2020-08-22 21:24:48
60.250.164.169 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-22T12:07:22Z and 2020-08-22T12:15:28Z
2020-08-22 21:24:08
183.166.149.157 attackbots
Aug 22 15:33:34 srv01 postfix/smtpd\[2361\]: warning: unknown\[183.166.149.157\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 22 15:33:46 srv01 postfix/smtpd\[2361\]: warning: unknown\[183.166.149.157\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 22 15:34:03 srv01 postfix/smtpd\[2361\]: warning: unknown\[183.166.149.157\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 22 15:34:35 srv01 postfix/smtpd\[2361\]: warning: unknown\[183.166.149.157\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 22 15:34:47 srv01 postfix/smtpd\[2361\]: warning: unknown\[183.166.149.157\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-22 21:49:27

最近上报的IP列表

13.57.194.187 13.57.195.232 13.57.196.109 13.57.194.220
13.57.225.224 13.57.222.81 13.57.222.115 13.57.225.85
13.57.225.107 13.57.225.174 13.57.224.127 13.57.222.58
13.57.225.91 13.57.224.195 13.57.227.226 13.57.223.242
13.57.228.206 13.57.228.103 13.57.228.101 13.57.230.197