必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.81.6.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.81.6.157.			IN	A

;; AUTHORITY SECTION:
.			198	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122900 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 16:07:49 CST 2021
;; MSG SIZE  rcvd: 105
HOST信息:
Host 157.6.81.144.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.6.81.144.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.32.67.38 attackbotsspam
Lines containing failures of 45.32.67.38
Oct  7 09:42:07 zabbix sshd[62724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.32.67.38  user=r.r
Oct  7 09:42:09 zabbix sshd[62724]: Failed password for r.r from 45.32.67.38 port 47236 ssh2
Oct  7 09:42:09 zabbix sshd[62724]: Received disconnect from 45.32.67.38 port 47236:11: Bye Bye [preauth]
Oct  7 09:42:09 zabbix sshd[62724]: Disconnected from authenticating user r.r 45.32.67.38 port 47236 [preauth]
Oct  7 10:00:48 zabbix sshd[64600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.32.67.38  user=r.r
Oct  7 10:00:50 zabbix sshd[64600]: Failed password for r.r from 45.32.67.38 port 37874 ssh2
Oct  7 10:00:50 zabbix sshd[64600]: Received disconnect from 45.32.67.38 port 37874:11: Bye Bye [preauth]
Oct  7 10:00:50 zabbix sshd[64600]: Disconnected from authenticating user r.r 45.32.67.38 port 37874 [preauth]
Oct  7 10:04:28 zabbix sshd[6486........
------------------------------
2019-10-08 22:58:24
220.184.7.116 attackbotsspam
Sep  3 17:48:38 dallas01 sshd[10526]: Failed password for root from 220.184.7.116 port 47773 ssh2
Sep  3 17:48:45 dallas01 sshd[10526]: Failed password for root from 220.184.7.116 port 47773 ssh2
Sep  3 17:48:47 dallas01 sshd[10526]: Failed password for root from 220.184.7.116 port 47773 ssh2
Sep  3 17:48:49 dallas01 sshd[10526]: Failed password for root from 220.184.7.116 port 47773 ssh2
Sep  3 17:48:49 dallas01 sshd[10526]: error: maximum authentication attempts exceeded for root from 220.184.7.116 port 47773 ssh2 [preauth]
2019-10-08 22:31:16
153.36.242.143 attackbotsspam
Oct  8 11:05:42 debian sshd\[28583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Oct  8 11:05:44 debian sshd\[28583\]: Failed password for root from 153.36.242.143 port 39270 ssh2
Oct  8 11:05:46 debian sshd\[28583\]: Failed password for root from 153.36.242.143 port 39270 ssh2
...
2019-10-08 23:07:57
51.38.95.12 attackbotsspam
Oct  8 16:05:32 vps01 sshd[12723]: Failed password for root from 51.38.95.12 port 53948 ssh2
2019-10-08 22:25:58
117.191.67.213 attackspambots
Oct  8 16:00:34 icinga sshd[31361]: Failed password for root from 117.191.67.213 port 41644 ssh2
...
2019-10-08 22:31:44
165.22.182.168 attackspambots
2019-10-08T07:50:12.521867ns525875 sshd\[6558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168  user=root
2019-10-08T07:50:14.426044ns525875 sshd\[6558\]: Failed password for root from 165.22.182.168 port 34748 ssh2
2019-10-08T07:53:45.022467ns525875 sshd\[10492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168  user=root
2019-10-08T07:53:47.166639ns525875 sshd\[10492\]: Failed password for root from 165.22.182.168 port 46858 ssh2
...
2019-10-08 22:46:15
49.88.112.66 attackbotsspam
Aug 28 05:33:59 dallas01 sshd[371]: Failed password for root from 49.88.112.66 port 50622 ssh2
Aug 28 05:34:01 dallas01 sshd[371]: Failed password for root from 49.88.112.66 port 50622 ssh2
Aug 28 05:34:04 dallas01 sshd[371]: Failed password for root from 49.88.112.66 port 50622 ssh2
Aug 28 05:37:00 dallas01 sshd[929]: Failed password for root from 49.88.112.66 port 52282 ssh2
2019-10-08 22:25:30
35.137.198.190 attackspambots
Oct  8 13:54:14 tor-proxy-02 sshd\[27793\]: Invalid user pi from 35.137.198.190 port 41180
Oct  8 13:54:14 tor-proxy-02 sshd\[27794\]: Invalid user pi from 35.137.198.190 port 41182
Oct  8 13:54:15 tor-proxy-02 sshd\[27793\]: Connection closed by 35.137.198.190 port 41180 \[preauth\]
...
2019-10-08 22:27:40
220.163.29.67 attackbotsspam
Sep  4 22:47:00 dallas01 sshd[21766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.163.29.67
Sep  4 22:47:02 dallas01 sshd[21766]: Failed password for invalid user admin from 220.163.29.67 port 56499 ssh2
Sep  4 22:47:04 dallas01 sshd[21766]: Failed password for invalid user admin from 220.163.29.67 port 56499 ssh2
Sep  4 22:47:06 dallas01 sshd[21766]: Failed password for invalid user admin from 220.163.29.67 port 56499 ssh2
2019-10-08 22:57:17
190.153.178.46 attackspam
Oct  8 18:44:06 lcl-usvr-02 sshd[15757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.153.178.46  user=root
Oct  8 18:44:08 lcl-usvr-02 sshd[15757]: Failed password for root from 190.153.178.46 port 25395 ssh2
Oct  8 18:49:01 lcl-usvr-02 sshd[16872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.153.178.46  user=root
Oct  8 18:49:02 lcl-usvr-02 sshd[16872]: Failed password for root from 190.153.178.46 port 9968 ssh2
Oct  8 18:53:50 lcl-usvr-02 sshd[18033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.153.178.46  user=root
Oct  8 18:53:52 lcl-usvr-02 sshd[18033]: Failed password for root from 190.153.178.46 port 50506 ssh2
...
2019-10-08 22:42:40
193.34.53.208 attack
Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-10-08 23:00:54
217.112.128.116 attack
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-10-08 23:04:41
115.159.214.247 attackspambots
Oct  8 16:04:14 MK-Soft-VM4 sshd[18753]: Failed password for root from 115.159.214.247 port 40092 ssh2
...
2019-10-08 22:37:48
122.155.174.36 attackspambots
Oct  8 16:00:04 web1 postfix/smtpd\[24453\]: warning: unknown\[122.155.174.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 16:00:31 web1 postfix/smtpd\[24453\]: warning: unknown\[122.155.174.36\]: SASL LOGIN authentication failed: Connection lost to authentication server
Oct  8 16:03:41 web1 postfix/smtpd\[24810\]: warning: unknown\[122.155.174.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-08 23:02:19
218.92.0.173 attack
Oct  8 14:55:01 piServer sshd[26252]: Failed password for root from 218.92.0.173 port 49315 ssh2
Oct  8 14:55:04 piServer sshd[26252]: Failed password for root from 218.92.0.173 port 49315 ssh2
Oct  8 14:55:09 piServer sshd[26252]: Failed password for root from 218.92.0.173 port 49315 ssh2
Oct  8 14:55:14 piServer sshd[26252]: Failed password for root from 218.92.0.173 port 49315 ssh2
...
2019-10-08 22:58:45

最近上报的IP列表

23.183.230.55 189.201.99.177 118.223.24.119 230.121.4.121
204.65.190.30 81.90.150.51 248.174.249.188 157.135.192.25
170.46.132.132 84.9.105.108 187.126.72.231 7.0.106.66
96.184.69.94 183.63.153.200 93.40.14.15 146.95.116.118
1.122.166.239 183.118.220.93 89.154.215.237 170.231.130.23