必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.1.196.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9829
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.1.196.198.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:53:19 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 198.196.1.157.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 198.196.1.157.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.23.32.126 attack
WordPress login Brute force / Web App Attack on client site.
2019-10-19 21:14:59
118.89.187.136 attackbots
Oct 19 14:03:30 MK-Soft-VM7 sshd[3547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.187.136 
Oct 19 14:03:32 MK-Soft-VM7 sshd[3547]: Failed password for invalid user mmcom from 118.89.187.136 port 50992 ssh2
...
2019-10-19 21:39:59
80.85.158.197 attackbotsspam
80.85.158.197 has been banned for [spam]
...
2019-10-19 21:16:39
79.239.111.67 attack
Automatic report - Port Scan Attack
2019-10-19 21:17:10
103.74.121.142 attack
Automatic report - XMLRPC Attack
2019-10-19 21:31:24
119.18.157.10 attackspam
Oct 18 17:18:23 archiv sshd[19462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.18.157.10  user=r.r
Oct 18 17:18:24 archiv sshd[19462]: Failed password for r.r from 119.18.157.10 port 33341 ssh2
Oct 18 17:18:25 archiv sshd[19462]: Received disconnect from 119.18.157.10 port 33341:11: Bye Bye [preauth]
Oct 18 17:18:25 archiv sshd[19462]: Disconnected from 119.18.157.10 port 33341 [preauth]
Oct 18 17:36:37 archiv sshd[19615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.18.157.10  user=r.r
Oct 18 17:36:40 archiv sshd[19615]: Failed password for r.r from 119.18.157.10 port 65478 ssh2
Oct 18 17:36:40 archiv sshd[19615]: Received disconnect from 119.18.157.10 port 65478:11: Bye Bye [preauth]
Oct 18 17:36:40 archiv sshd[19615]: Disconnected from 119.18.157.10 port 65478 [preauth]
Oct 18 17:47:48 archiv sshd[19664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t........
-------------------------------
2019-10-19 21:39:18
106.75.103.35 attack
2019-10-19T12:38:25.513416abusebot-5.cloudsearch.cf sshd\[4804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.103.35  user=root
2019-10-19 21:40:12
37.28.154.68 attackbotsspam
Oct 19 14:03:08 rotator sshd\[11348\]: Failed password for root from 37.28.154.68 port 40072 ssh2Oct 19 14:03:10 rotator sshd\[11348\]: Failed password for root from 37.28.154.68 port 40072 ssh2Oct 19 14:03:13 rotator sshd\[11348\]: Failed password for root from 37.28.154.68 port 40072 ssh2Oct 19 14:03:16 rotator sshd\[11348\]: Failed password for root from 37.28.154.68 port 40072 ssh2Oct 19 14:03:19 rotator sshd\[11348\]: Failed password for root from 37.28.154.68 port 40072 ssh2Oct 19 14:03:22 rotator sshd\[11348\]: Failed password for root from 37.28.154.68 port 40072 ssh2
...
2019-10-19 21:44:59
139.99.107.166 attackbotsspam
Oct 19 03:19:57 kapalua sshd\[24392\]: Invalid user mghl2k from 139.99.107.166
Oct 19 03:19:57 kapalua sshd\[24392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.107.166
Oct 19 03:19:58 kapalua sshd\[24392\]: Failed password for invalid user mghl2k from 139.99.107.166 port 35922 ssh2
Oct 19 03:24:47 kapalua sshd\[24803\]: Invalid user saf145645 from 139.99.107.166
Oct 19 03:24:47 kapalua sshd\[24803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.107.166
2019-10-19 21:30:17
177.135.93.227 attackspam
Oct 19 14:24:19 dedicated sshd[18408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.135.93.227  user=root
Oct 19 14:24:20 dedicated sshd[18408]: Failed password for root from 177.135.93.227 port 44808 ssh2
2019-10-19 21:50:33
140.143.136.89 attackbotsspam
Oct 19 02:49:47 friendsofhawaii sshd\[4138\]: Invalid user oracle from 140.143.136.89
Oct 19 02:49:47 friendsofhawaii sshd\[4138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.136.89
Oct 19 02:49:49 friendsofhawaii sshd\[4138\]: Failed password for invalid user oracle from 140.143.136.89 port 36332 ssh2
Oct 19 02:55:41 friendsofhawaii sshd\[4606\]: Invalid user xe from 140.143.136.89
Oct 19 02:55:41 friendsofhawaii sshd\[4606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.136.89
2019-10-19 21:19:37
107.170.18.163 attack
Oct 19 15:08:58 jane sshd[19602]: Failed password for root from 107.170.18.163 port 53880 ssh2
Oct 19 15:14:53 jane sshd[25113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.18.163 
...
2019-10-19 21:19:54
190.0.159.86 attackspambots
Oct 19 02:40:55 php1 sshd\[4626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.86  user=root
Oct 19 02:40:57 php1 sshd\[4626\]: Failed password for root from 190.0.159.86 port 41187 ssh2
Oct 19 02:50:11 php1 sshd\[5373\]: Invalid user dods from 190.0.159.86
Oct 19 02:50:11 php1 sshd\[5373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.86
Oct 19 02:50:13 php1 sshd\[5373\]: Failed password for invalid user dods from 190.0.159.86 port 32926 ssh2
2019-10-19 21:12:50
139.59.108.237 attackspam
Oct 19 13:58:55 MK-Soft-VM6 sshd[4573]: Failed password for root from 139.59.108.237 port 48890 ssh2
...
2019-10-19 21:40:38
61.161.214.3 attackspam
Port 1433 Scan
2019-10-19 21:12:38

最近上报的IP列表

68.198.243.237 250.76.172.185 219.140.131.237 16.245.41.0
49.28.251.58 41.33.162.248 33.113.94.197 95.255.192.122
118.199.75.53 31.160.246.83 197.149.81.44 136.119.131.39
182.102.171.118 125.84.33.27 249.170.35.148 220.174.114.201
69.124.72.196 64.46.98.96 216.171.159.182 252.194.236.130