必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Aguas Buenas

省份(region): unknown

国家(country): Puerto Rico

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.145.123.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37373
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.145.123.57.			IN	A

;; AUTHORITY SECTION:
.			243	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100300 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 04 02:17:30 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 57.123.145.136.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.123.145.136.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.235.104.204 attackbots
Sep 29 18:42:30 ny01 sshd[10176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.104.204
Sep 29 18:42:32 ny01 sshd[10176]: Failed password for invalid user stats from 49.235.104.204 port 35620 ssh2
Sep 29 18:46:48 ny01 sshd[10938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.104.204
2020-09-30 09:33:55
138.68.71.18 attackspambots
Sep 28 01:37:21 pl2server sshd[26678]: Invalid user alex from 138.68.71.18 port 38504
Sep 28 01:37:21 pl2server sshd[26678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.71.18
Sep 28 01:37:22 pl2server sshd[26678]: Failed password for invalid user alex from 138.68.71.18 port 38504 ssh2
Sep 28 01:37:22 pl2server sshd[26678]: Received disconnect from 138.68.71.18 port 38504:11: Bye Bye [preauth]
Sep 28 01:37:22 pl2server sshd[26678]: Disconnected from 138.68.71.18 port 38504 [preauth]
Sep 28 01:51:34 pl2server sshd[30416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.71.18  user=www-data
Sep 28 01:51:36 pl2server sshd[30416]: Failed password for www-data from 138.68.71.18 port 44968 ssh2
Sep 28 01:51:36 pl2server sshd[30416]: Received disconnect from 138.68.71.18 port 44968:11: Bye Bye [preauth]
Sep 28 01:51:36 pl2server sshd[30416]: Disconnected from 138.68.71.18 port 4496........
-------------------------------
2020-09-30 09:26:07
182.61.167.24 attackspambots
s2.hscode.pl - SSH Attack
2020-09-30 09:35:41
1.55.223.64 attackbots
Icarus honeypot on github
2020-09-30 09:51:25
165.232.39.199 attackspam
21 attempts against mh-ssh on stem
2020-09-30 09:23:03
103.100.210.230 attackbots
Sep 30 02:03:43 santamaria sshd\[2565\]: Invalid user tom1 from 103.100.210.230
Sep 30 02:03:43 santamaria sshd\[2565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.210.230
Sep 30 02:03:45 santamaria sshd\[2565\]: Failed password for invalid user tom1 from 103.100.210.230 port 58704 ssh2
...
2020-09-30 09:21:45
222.165.222.190 attackspam
Invalid user fatimac from 222.165.222.190 port 60320
2020-09-30 09:45:28
45.55.61.114 attackspambots
45.55.61.114 - - [30/Sep/2020:03:32:27 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.55.61.114 - - [30/Sep/2020:03:32:28 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.55.61.114 - - [30/Sep/2020:03:32:30 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-30 09:51:12
152.136.119.164 attackspambots
Sep 30 00:36:18 ns392434 sshd[25298]: Invalid user olivia from 152.136.119.164 port 56238
Sep 30 00:36:18 ns392434 sshd[25298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.119.164
Sep 30 00:36:18 ns392434 sshd[25298]: Invalid user olivia from 152.136.119.164 port 56238
Sep 30 00:36:19 ns392434 sshd[25298]: Failed password for invalid user olivia from 152.136.119.164 port 56238 ssh2
Sep 30 00:45:59 ns392434 sshd[25542]: Invalid user sales from 152.136.119.164 port 50004
Sep 30 00:45:59 ns392434 sshd[25542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.119.164
Sep 30 00:45:59 ns392434 sshd[25542]: Invalid user sales from 152.136.119.164 port 50004
Sep 30 00:46:01 ns392434 sshd[25542]: Failed password for invalid user sales from 152.136.119.164 port 50004 ssh2
Sep 30 00:52:27 ns392434 sshd[25763]: Invalid user law from 152.136.119.164 port 59710
2020-09-30 09:41:11
91.234.128.42 attackspambots
Port Scan: TCP/443
2020-09-30 09:47:10
141.98.80.191 attackspambots
2020-09-30 03:35:01 dovecot_login authenticator failed for \(\[141.98.80.191\]\) \[141.98.80.191\]: 535 Incorrect authentication data \(set_id=postoffice@no-server.de\)
2020-09-30 03:35:08 dovecot_login authenticator failed for \(\[141.98.80.191\]\) \[141.98.80.191\]: 535 Incorrect authentication data
2020-09-30 03:35:17 dovecot_login authenticator failed for \(\[141.98.80.191\]\) \[141.98.80.191\]: 535 Incorrect authentication data
2020-09-30 03:35:22 dovecot_login authenticator failed for \(\[141.98.80.191\]\) \[141.98.80.191\]: 535 Incorrect authentication data
2020-09-30 03:35:35 dovecot_login authenticator failed for \(\[141.98.80.191\]\) \[141.98.80.191\]: 535 Incorrect authentication data
2020-09-30 03:35:40 dovecot_login authenticator failed for \(\[141.98.80.191\]\) \[141.98.80.191\]: 535 Incorrect authentication data
...
2020-09-30 09:46:54
23.98.40.21 attackbotsspam
Invalid user odoo from 23.98.40.21 port 48472
2020-09-30 09:23:45
103.221.252.46 attackspam
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.252.46
Invalid user public from 103.221.252.46 port 47070
Failed password for invalid user public from 103.221.252.46 port 47070 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.252.46  user=nobody
Failed password for nobody from 103.221.252.46 port 33702 ssh2
2020-09-30 09:32:04
85.209.0.252 attackspambots
Scanned 12 times in the last 24 hours on port 22
2020-09-30 09:23:21
157.230.27.30 attackspambots
157.230.27.30 - - [30/Sep/2020:00:21:09 +0100] "POST /wp-login.php HTTP/1.1" 200 2596 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.27.30 - - [30/Sep/2020:00:21:12 +0100] "POST /wp-login.php HTTP/1.1" 200 2580 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.27.30 - - [30/Sep/2020:00:21:14 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-30 09:29:31

最近上报的IP列表

58.70.194.62 76.31.156.34 250.64.154.151 215.25.142.218
172.9.66.173 10.17.131.211 149.53.24.98 228.211.141.169
46.170.39.5 236.115.200.115 97.15.115.73 77.142.179.43
7.142.11.241 133.102.215.185 98.23.171.135 38.169.20.246
63.246.149.114 0.114.195.174 238.245.152.126 14.5.139.118