必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Mexico

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.212.109.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.212.109.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:26:50 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 57.109.212.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.109.212.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.180.147 attackbots
Failed password for root from 222.186.180.147 port 43720 ssh2
Failed password for root from 222.186.180.147 port 43720 ssh2
Failed password for root from 222.186.180.147 port 43720 ssh2
Failed password for root from 222.186.180.147 port 43720 ssh2
2020-01-26 13:10:27
191.35.85.131 attackbots
firewall-block, port(s): 23/tcp
2020-01-26 13:13:36
64.225.72.103 attack
Unauthorized connection attempt detected from IP address 64.225.72.103 to port 443 [J]
2020-01-26 13:10:42
96.78.178.158 attackspambots
firewall-block, port(s): 5555/tcp
2020-01-26 13:17:45
183.88.13.179 attackbots
10,14-05/05 [bc02/m53] PostRequest-Spammer scoring: wien2018
2020-01-26 13:08:54
80.82.77.86 attackspam
Jan 26 06:17:40 debian-2gb-nbg1-2 kernel: \[2275132.545234\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.86 DST=195.201.40.59 LEN=130 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=45048 DPT=32768 LEN=110
2020-01-26 13:31:24
209.97.166.200 attackbotsspam
Jan 26 05:22:23 hcbbdb sshd\[29434\]: Invalid user admin from 209.97.166.200
Jan 26 05:22:23 hcbbdb sshd\[29434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.166.200
Jan 26 05:22:25 hcbbdb sshd\[29434\]: Failed password for invalid user admin from 209.97.166.200 port 34702 ssh2
Jan 26 05:25:13 hcbbdb sshd\[29793\]: Invalid user david from 209.97.166.200
Jan 26 05:25:13 hcbbdb sshd\[29793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.166.200
2020-01-26 13:40:23
77.55.212.158 attackspam
Unauthorized connection attempt detected from IP address 77.55.212.158 to port 2220 [J]
2020-01-26 13:07:07
157.230.225.168 attack
Unauthorized connection attempt detected from IP address 157.230.225.168 to port 2220 [J]
2020-01-26 13:16:49
104.248.149.130 attack
Unauthorized connection attempt detected from IP address 104.248.149.130 to port 2220 [J]
2020-01-26 13:26:10
130.185.250.76 attackspambots
Automatic report - Banned IP Access
2020-01-26 13:21:50
115.23.172.24 attackbotsspam
Unauthorized connection attempt detected from IP address 115.23.172.24 to port 3433
2020-01-26 13:22:14
148.235.57.184 attack
Jan 26 06:22:06 sd-53420 sshd\[3251\]: User root from 148.235.57.184 not allowed because none of user's groups are listed in AllowGroups
Jan 26 06:22:06 sd-53420 sshd\[3251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.57.184  user=root
Jan 26 06:22:08 sd-53420 sshd\[3251\]: Failed password for invalid user root from 148.235.57.184 port 44924 ssh2
Jan 26 06:26:04 sd-53420 sshd\[3840\]: Invalid user norma from 148.235.57.184
Jan 26 06:26:04 sd-53420 sshd\[3840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.57.184
...
2020-01-26 13:39:08
206.189.146.100 attack
Unauthorized connection attempt detected from IP address 206.189.146.100 to port 2220 [J]
2020-01-26 13:36:32
138.197.73.215 attackbotsspam
Unauthorized connection attempt detected from IP address 138.197.73.215 to port 2220 [J]
2020-01-26 13:43:42

最近上报的IP列表

165.160.181.168 193.142.197.139 25.100.186.161 54.18.60.77
247.174.32.145 164.26.48.78 54.100.233.88 140.142.70.118
242.237.161.181 143.248.219.225 106.73.57.181 170.121.245.210
254.10.208.150 241.175.68.62 21.134.190.106 44.159.121.192
141.201.83.109 21.138.57.246 77.194.127.225 235.11.238.221