必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
164.132.57.16 attackbotsspam
Oct 11 20:39:06 server sshd[13991]: Failed password for invalid user xs from 164.132.57.16 port 34749 ssh2
Oct 11 20:42:42 server sshd[16171]: Failed password for root from 164.132.57.16 port 37497 ssh2
Oct 11 20:46:15 server sshd[18107]: Failed password for root from 164.132.57.16 port 40237 ssh2
2020-10-12 03:20:38
164.132.57.16 attack
SSH login attempts.
2020-10-11 19:13:21
164.132.57.16 attack
2020-09-14 17:43:59.701938-0500  localhost sshd[26082]: Failed password for root from 164.132.57.16 port 38598 ssh2
2020-09-15 13:00:01
164.132.57.16 attackbotsspam
2020-09-14T20:00:03.412203abusebot-6.cloudsearch.cf sshd[14897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=16.ip-164-132-57.eu  user=root
2020-09-14T20:00:05.788947abusebot-6.cloudsearch.cf sshd[14897]: Failed password for root from 164.132.57.16 port 53339 ssh2
2020-09-14T20:04:44.212726abusebot-6.cloudsearch.cf sshd[14993]: Invalid user applmgr from 164.132.57.16 port 60003
2020-09-14T20:04:44.218587abusebot-6.cloudsearch.cf sshd[14993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=16.ip-164-132-57.eu
2020-09-14T20:04:44.212726abusebot-6.cloudsearch.cf sshd[14993]: Invalid user applmgr from 164.132.57.16 port 60003
2020-09-14T20:04:46.505166abusebot-6.cloudsearch.cf sshd[14993]: Failed password for invalid user applmgr from 164.132.57.16 port 60003 ssh2
2020-09-14T20:08:46.913021abusebot-6.cloudsearch.cf sshd[15095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser
...
2020-09-15 05:10:13
164.132.57.16 attackspam
Sep  3 12:38:27 ns382633 sshd\[16685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16  user=root
Sep  3 12:38:29 ns382633 sshd\[16685\]: Failed password for root from 164.132.57.16 port 54949 ssh2
Sep  3 12:52:33 ns382633 sshd\[19209\]: Invalid user jader from 164.132.57.16 port 55219
Sep  3 12:52:33 ns382633 sshd\[19209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16
Sep  3 12:52:34 ns382633 sshd\[19209\]: Failed password for invalid user jader from 164.132.57.16 port 55219 ssh2
2020-09-03 20:17:07
164.132.57.16 attackbots
Sep  3 05:47:05 marvibiene sshd[1925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16 
Sep  3 05:47:07 marvibiene sshd[1925]: Failed password for invalid user exp from 164.132.57.16 port 60917 ssh2
2020-09-03 12:01:09
164.132.57.16 attackspambots
(sshd) Failed SSH login from 164.132.57.16 (FR/France/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  2 15:44:21 server2 sshd[14405]: Invalid user test from 164.132.57.16
Sep  2 15:44:23 server2 sshd[14405]: Failed password for invalid user test from 164.132.57.16 port 35836 ssh2
Sep  2 15:52:28 server2 sshd[20083]: Invalid user bart from 164.132.57.16
Sep  2 15:52:30 server2 sshd[20083]: Failed password for invalid user bart from 164.132.57.16 port 60446 ssh2
Sep  2 15:56:43 server2 sshd[22980]: Invalid user samplee from 164.132.57.16
2020-09-03 04:20:43
164.132.57.16 attackspam
Aug 23 07:21:53 mout sshd[5483]: Invalid user uftp from 164.132.57.16 port 43212
2020-08-23 13:44:34
164.132.57.16 attack
Aug 21 23:24:58 hosting sshd[24022]: Invalid user vhp from 164.132.57.16 port 35705
...
2020-08-22 05:22:29
164.132.57.16 attackspam
2020-08-08T16:36:22.779861shield sshd\[14243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=16.ip-164-132-57.eu  user=root
2020-08-08T16:36:24.803025shield sshd\[14243\]: Failed password for root from 164.132.57.16 port 42543 ssh2
2020-08-08T16:40:28.446164shield sshd\[15955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=16.ip-164-132-57.eu  user=root
2020-08-08T16:40:30.237848shield sshd\[15955\]: Failed password for root from 164.132.57.16 port 47854 ssh2
2020-08-08T16:44:36.580839shield sshd\[17499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=16.ip-164-132-57.eu  user=root
2020-08-09 00:46:20
164.132.57.16 attackspam
2020-08-04T13:32:50.631067vps751288.ovh.net sshd\[18643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=16.ip-164-132-57.eu  user=root
2020-08-04T13:32:52.598738vps751288.ovh.net sshd\[18643\]: Failed password for root from 164.132.57.16 port 34215 ssh2
2020-08-04T13:36:50.430527vps751288.ovh.net sshd\[18715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=16.ip-164-132-57.eu  user=root
2020-08-04T13:36:52.687098vps751288.ovh.net sshd\[18715\]: Failed password for root from 164.132.57.16 port 39848 ssh2
2020-08-04T13:40:54.468657vps751288.ovh.net sshd\[18781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=16.ip-164-132-57.eu  user=root
2020-08-04 22:42:39
164.132.57.16 attackspambots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-01 04:32:40
164.132.57.16 attackbotsspam
Jul 24 08:19:42 ncomp sshd[19365]: Invalid user ldm from 164.132.57.16
Jul 24 08:19:42 ncomp sshd[19365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16
Jul 24 08:19:42 ncomp sshd[19365]: Invalid user ldm from 164.132.57.16
Jul 24 08:19:45 ncomp sshd[19365]: Failed password for invalid user ldm from 164.132.57.16 port 58265 ssh2
2020-07-24 15:45:30
164.132.57.16 attackbotsspam
SSH Invalid Login
2020-07-24 06:09:51
164.132.57.16 attackbots
Jul 15 08:05:58 gospond sshd[23909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16 
Jul 15 08:05:58 gospond sshd[23909]: Invalid user admin from 164.132.57.16 port 39524
Jul 15 08:06:00 gospond sshd[23909]: Failed password for invalid user admin from 164.132.57.16 port 39524 ssh2
...
2020-07-15 16:39:43
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.132.57.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.132.57.146.			IN	A

;; AUTHORITY SECTION:
.			306	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 20:32:33 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
146.57.132.164.in-addr.arpa domain name pointer vps-1978fd04.vps.ovh.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.57.132.164.in-addr.arpa	name = vps-1978fd04.vps.ovh.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.182.101.180 attack
Mar 18 02:09:02 ms-srv sshd[22721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.101.180
Mar 18 02:09:04 ms-srv sshd[22721]: Failed password for invalid user qhsupport from 217.182.101.180 port 39798 ssh2
2020-03-08 21:40:07
85.234.9.126 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-03-08 21:16:03
213.120.127.47 attackspam
Automatic report - Port Scan Attack
2020-03-08 21:40:32
51.38.130.63 attackspam
sshd jail - ssh hack attempt
2020-03-08 21:16:32
187.134.43.16 attack
Mar  8 14:18:58  sshd\[18297\]: Invalid user seesbot from 187.134.43.16Mar  8 14:18:59  sshd\[18297\]: Failed password for invalid user seesbot from 187.134.43.16 port 34792 ssh2
...
2020-03-08 21:39:30
180.250.248.170 attackbots
Sep 10 07:18:10 ms-srv sshd[52810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.170
Sep 10 07:18:11 ms-srv sshd[52810]: Failed password for invalid user ts3srv from 180.250.248.170 port 53744 ssh2
2020-03-08 21:11:56
217.182.70.125 attackbots
Dec 16 22:49:35 ms-srv sshd[26203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.70.125
Dec 16 22:49:37 ms-srv sshd[26203]: Failed password for invalid user info from 217.182.70.125 port 33594 ssh2
2020-03-08 21:27:56
217.182.196.178 attack
Feb 12 07:47:49 ms-srv sshd[54873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.196.178  user=root
Feb 12 07:47:50 ms-srv sshd[54873]: Failed password for invalid user root from 217.182.196.178 port 55918 ssh2
2020-03-08 21:32:43
118.36.21.28 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-08 21:18:54
217.182.203.177 attackbotsspam
Jan 23 19:29:42 ms-srv sshd[30285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.203.177
Jan 23 19:29:44 ms-srv sshd[30285]: Failed password for invalid user dev from 217.182.203.177 port 40830 ssh2
2020-03-08 21:32:19
61.224.4.157 attackbots
Honeypot attack, port: 5555, PTR: 61-224-4-157.dynamic-ip.hinet.net.
2020-03-08 21:28:59
117.117.165.131 attackspam
W 5701,/var/log/auth.log,-,-
2020-03-08 21:52:17
106.12.76.91 attackspambots
Mar  8 19:05:32 areeb-Workstation sshd[6740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.76.91 
Mar  8 19:05:34 areeb-Workstation sshd[6740]: Failed password for invalid user robert from 106.12.76.91 port 37246 ssh2
...
2020-03-08 21:39:44
217.182.77.186 attackbots
Nov 25 05:59:16 ms-srv sshd[65080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.77.186  user=bin
Nov 25 05:59:18 ms-srv sshd[65080]: Failed password for invalid user bin from 217.182.77.186 port 49246 ssh2
2020-03-08 21:24:27
209.97.175.191 attackbots
209.97.175.191 - - [08/Mar/2020:12:20:36 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
209.97.175.191 - - [08/Mar/2020:12:20:37 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-03-08 21:22:31

最近上报的IP列表

164.132.251.220 164.132.59.66 186.205.163.96 127.104.193.232
149.113.187.118 249.17.151.91 164.138.208.223 164.138.18.169
164.138.209.197 164.138.21.210 164.138.209.106 164.138.21.44
164.138.209.229 164.138.19.157 164.138.209.44 164.138.18.251
164.138.209.127 164.138.20.117 164.138.210.235 164.138.210.108