必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.161.57.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55574
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.161.57.104.			IN	A

;; AUTHORITY SECTION:
.			322	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 05:06:40 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 104.57.161.161.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.57.161.161.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
20.188.60.161 attackspambots
[f2b] sshd bruteforce, retries: 1
2020-08-08 23:13:09
112.85.42.172 attackbots
Aug  8 16:40:58 vps639187 sshd\[9885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Aug  8 16:41:00 vps639187 sshd\[9885\]: Failed password for root from 112.85.42.172 port 39278 ssh2
Aug  8 16:41:04 vps639187 sshd\[9885\]: Failed password for root from 112.85.42.172 port 39278 ssh2
...
2020-08-08 22:41:18
180.254.47.149 attackbots
Unauthorized connection attempt from IP address 180.254.47.149 on Port 445(SMB)
2020-08-08 23:07:55
190.15.120.180 attack
Unauthorized connection attempt from IP address 190.15.120.180 on Port 445(SMB)
2020-08-08 23:14:04
111.72.195.70 attackspam
Aug  8 16:43:03 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 16:43:15 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 16:43:32 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 16:43:53 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 16:44:08 srv01 postfix/smtpd\[880\]: warning: unknown\[111.72.195.70\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-08 23:10:57
87.110.115.239 attackspambots
87.110.115.239 - - [08/Aug/2020:14:14:58 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
87.110.115.239 - - [08/Aug/2020:14:14:59 +0100] "POST /wp-login.php HTTP/1.1" 200 6023 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
87.110.115.239 - - [08/Aug/2020:14:17:16 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
...
2020-08-08 23:00:27
144.160.112.15 attackspambots
AT&T says my account 262863093 has been created and they will be out to setup my DirectTV.  Funny I never signed up with AT&T.  I guess they are so hard up for business they are just randomly choosing people to give DirectTV to.  Lord knows no one in their right mind would purchase it.  Whoever the idiot is who is getting DirectTV is paying $180.31 promo a month for it.  Hasn't he heard of Sling?
2020-08-08 22:54:22
218.92.0.223 attack
Aug  8 14:54:59 localhost sshd[64754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223  user=root
Aug  8 14:55:01 localhost sshd[64754]: Failed password for root from 218.92.0.223 port 48223 ssh2
Aug  8 14:55:04 localhost sshd[64754]: Failed password for root from 218.92.0.223 port 48223 ssh2
Aug  8 14:54:59 localhost sshd[64754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223  user=root
Aug  8 14:55:01 localhost sshd[64754]: Failed password for root from 218.92.0.223 port 48223 ssh2
Aug  8 14:55:04 localhost sshd[64754]: Failed password for root from 218.92.0.223 port 48223 ssh2
Aug  8 14:54:59 localhost sshd[64754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223  user=root
Aug  8 14:55:01 localhost sshd[64754]: Failed password for root from 218.92.0.223 port 48223 ssh2
Aug  8 14:55:04 localhost sshd[64754]: Failed password fo
...
2020-08-08 23:04:16
195.8.51.139 attackbotsspam
20/8/8@08:15:45: FAIL: Alarm-Network address from=195.8.51.139
...
2020-08-08 22:39:50
49.149.102.241 attackspambots
Unauthorized connection attempt from IP address 49.149.102.241 on Port 445(SMB)
2020-08-08 23:01:04
129.211.36.4 attackspam
2020-08-08T14:15:43.256840ks3355764 sshd[5376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.36.4  user=root
2020-08-08T14:15:45.308879ks3355764 sshd[5376]: Failed password for root from 129.211.36.4 port 54940 ssh2
...
2020-08-08 22:39:29
188.52.196.82 attack
Unauthorized connection attempt from IP address 188.52.196.82 on Port 445(SMB)
2020-08-08 22:46:13
1.7.164.219 attackspam
Unauthorized connection attempt from IP address 1.7.164.219 on Port 445(SMB)
2020-08-08 23:04:53
188.226.131.171 attackbotsspam
Aug  8 16:35:50 PorscheCustomer sshd[30416]: Failed password for root from 188.226.131.171 port 35126 ssh2
Aug  8 16:39:56 PorscheCustomer sshd[30479]: Failed password for root from 188.226.131.171 port 45306 ssh2
...
2020-08-08 22:46:55
125.21.227.181 attackspam
Aug  8 16:20:52 nextcloud sshd\[7639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.21.227.181  user=root
Aug  8 16:20:54 nextcloud sshd\[7639\]: Failed password for root from 125.21.227.181 port 49944 ssh2
Aug  8 16:22:38 nextcloud sshd\[9502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.21.227.181  user=root
2020-08-08 22:30:43

最近上报的IP列表

131.120.232.118 178.249.154.4 241.51.143.85 115.80.219.199
92.112.134.4 189.30.17.56 156.241.248.151 133.26.227.224
96.210.195.246 117.165.215.51 171.73.29.173 59.249.117.92
131.67.5.180 62.179.69.179 85.91.71.22 250.238.216.251
105.57.40.154 35.195.89.197 146.133.222.14 185.247.175.50