必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Reykjavík

省份(region): Höfuðborgarsvæði

国家(country): Iceland

运营商(isp): Nova

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.97.27.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.97.27.21.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023101703 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 18 07:08:44 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
21.27.97.157.in-addr.arpa domain name pointer nova-157-097-027-021.cpe.novanet.is.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.27.97.157.in-addr.arpa	name = nova-157-097-027-021.cpe.novanet.is.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.192.5 attackbots
May  5 15:13:30 vserver sshd\[3394\]: Invalid user test123 from 106.13.192.5May  5 15:13:32 vserver sshd\[3394\]: Failed password for invalid user test123 from 106.13.192.5 port 18267 ssh2May  5 15:17:17 vserver sshd\[3420\]: Invalid user testing from 106.13.192.5May  5 15:17:20 vserver sshd\[3420\]: Failed password for invalid user testing from 106.13.192.5 port 60289 ssh2
...
2020-05-05 21:24:24
185.200.118.80 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-05 21:28:17
198.100.146.67 attack
May  5 15:05:39 ift sshd\[53054\]: Invalid user killer from 198.100.146.67May  5 15:05:41 ift sshd\[53054\]: Failed password for invalid user killer from 198.100.146.67 port 56044 ssh2May  5 15:09:21 ift sshd\[53499\]: Invalid user ventas from 198.100.146.67May  5 15:09:23 ift sshd\[53499\]: Failed password for invalid user ventas from 198.100.146.67 port 60907 ssh2May  5 15:12:57 ift sshd\[54140\]: Invalid user oracle from 198.100.146.67
...
2020-05-05 21:12:53
39.43.102.99 attack
1588670258 - 05/05/2020 11:17:38 Host: 39.43.102.99/39.43.102.99 Port: 445 TCP Blocked
2020-05-05 21:22:00
85.228.104.150 attack
Honeypot attack, port: 5555, PTR: ua-85-228-104-150.bbcust.telenor.se.
2020-05-05 21:38:30
41.140.242.75 attack
Unauthorized connection attempt detected from IP address 41.140.242.75 to port 1433
2020-05-05 21:41:11
118.27.30.121 attackspam
fail2ban
2020-05-05 21:13:36
151.101.18.109 attack
london/uk hacker/well known -cdn.polyfill.io 151.101.18.109-1 user/well known/cdn links to locals coming into the property and perimeterx.net and byside.com users - stalkers and hackers - -monitor the user - derogatory hostname/dns admins registered to it/likely stalking online
2020-05-05 21:20:53
104.50.180.85 attackspam
Unauthorized SSH login attempts
2020-05-05 21:10:35
180.76.152.32 attackbots
5x Failed Password
2020-05-05 21:40:39
165.227.58.61 attackspambots
2020-05-05T14:03:33.678633ns386461 sshd\[23501\]: Invalid user user from 165.227.58.61 port 47648
2020-05-05T14:03:33.683302ns386461 sshd\[23501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.58.61
2020-05-05T14:03:35.742384ns386461 sshd\[23501\]: Failed password for invalid user user from 165.227.58.61 port 47648 ssh2
2020-05-05T14:12:48.221912ns386461 sshd\[31994\]: Invalid user adminweb from 165.227.58.61 port 52678
2020-05-05T14:12:48.226594ns386461 sshd\[31994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.58.61
...
2020-05-05 21:28:40
31.202.61.104 attackspam
(sshd) Failed SSH login from 31.202.61.104 (UA/Ukraine/31-202-61-104-kh.maxnet.ua): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  5 11:17:26 ubnt-55d23 sshd[30421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.202.61.104  user=root
May  5 11:17:27 ubnt-55d23 sshd[30421]: Failed password for root from 31.202.61.104 port 54832 ssh2
2020-05-05 21:37:10
198.108.67.17 attackbots
May  5 14:41:24 debian-2gb-nbg1-2 kernel: \[10941378.753395\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.17 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=22778 PROTO=TCP SPT=49551 DPT=16992 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-05 21:38:52
185.200.118.58 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-05 21:17:14
157.245.64.140 attackspambots
SSH login attempts.
2020-05-05 21:30:38

最近上报的IP列表

87.154.77.5 241.200.216.73 167.10.219.201 50.213.62.50
74.224.124.110 104.153.41.87 125.10.104.177 200.79.6.18
70.192.220.248 253.113.8.149 104.178.35.91 110.11.6.76
24.244.62.232 181.90.253.208 177.2.146.241 65.8.45.62
141.143.90.61 59.174.0.159 220.37.75.37 17.191.194.166