必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.57.98.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61206
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.57.98.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 06:16:21 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 145.98.57.192.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.98.57.192.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.53.232.61 attack
Brute force attempt
2019-11-23 16:45:07
106.12.92.88 attackspam
2019-11-23T01:12:01.1022811495-001 sshd\[51933\]: Invalid user wwwadmin from 106.12.92.88 port 42790
2019-11-23T01:12:01.1070561495-001 sshd\[51933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.92.88
2019-11-23T01:12:03.3096641495-001 sshd\[51933\]: Failed password for invalid user wwwadmin from 106.12.92.88 port 42790 ssh2
2019-11-23T01:17:09.9293291495-001 sshd\[52094\]: Invalid user zhaine from 106.12.92.88 port 49092
2019-11-23T01:17:09.9367671495-001 sshd\[52094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.92.88
2019-11-23T01:17:12.4207381495-001 sshd\[52094\]: Failed password for invalid user zhaine from 106.12.92.88 port 49092 ssh2
...
2019-11-23 16:33:15
106.13.190.144 attack
SS5,DEF GET /MyAdmin/scripts/setup.php
2019-11-23 16:38:16
223.85.57.70 attackspambots
Nov 23 06:27:06 *** sshd[9434]: User root from 223.85.57.70 not allowed because not listed in AllowUsers
2019-11-23 16:56:14
104.131.82.112 attack
Nov 19 23:57:40 shadeyouvpn sshd[24822]: Invalid user issei from 104.131.82.112
Nov 19 23:57:40 shadeyouvpn sshd[24822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.82.112 
Nov 19 23:57:42 shadeyouvpn sshd[24822]: Failed password for invalid user issei from 104.131.82.112 port 51083 ssh2
Nov 19 23:57:42 shadeyouvpn sshd[24822]: Received disconnect from 104.131.82.112: 11: Bye Bye [preauth]
Nov 20 00:06:04 shadeyouvpn sshd[29587]: Invalid user test from 104.131.82.112
Nov 20 00:06:04 shadeyouvpn sshd[29587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.82.112 
Nov 20 00:06:05 shadeyouvpn sshd[29587]: Failed password for invalid user test from 104.131.82.112 port 56558 ssh2
Nov 20 00:06:06 shadeyouvpn sshd[29587]: Received disconnect from 104.131.82.112: 11: Bye Bye [preauth]
Nov 20 00:10:58 shadeyouvpn sshd[32622]: pam_unix(sshd:auth): authentication failure; logname= u........
-------------------------------
2019-11-23 16:34:48
176.114.207.188 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/176.114.207.188/ 
 
 RU - 1H : (104)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN50060 
 
 IP : 176.114.207.188 
 
 CIDR : 176.114.192.0/19 
 
 PREFIX COUNT : 4 
 
 UNIQUE IP COUNT : 25600 
 
 
 ATTACKS DETECTED ASN50060 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-23 07:26:57 
 
 INFO :
2019-11-23 17:02:10
168.197.77.231 attackspam
" "
2019-11-23 16:36:53
124.188.225.212 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/124.188.225.212/ 
 
 AU - 1H : (15)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN135887 
 
 IP : 124.188.225.212 
 
 CIDR : 124.188.0.0/14 
 
 PREFIX COUNT : 44 
 
 UNIQUE IP COUNT : 4004608 
 
 
 ATTACKS DETECTED ASN135887 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-11-23 07:27:15 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-23 16:51:22
122.170.177.102 attackbots
2019-11-20 07:35:16 H=(abts-mum-dynamic-102.177.170.122-airtelbroadband.in) [122.170.177.102]:25616 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=122.170.177.102)
2019-11-20 07:35:16 unexpected disconnection while reading SMTP command from (abts-mum-dynamic-102.177.170.122-airtelbroadband.in) [122.170.177.102]:25616 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-11-20 08:11:50 H=(abts-mum-dynamic-102.177.170.122-airtelbroadband.in) [122.170.177.102]:30392 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=122.170.177.102)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.170.177.102
2019-11-23 16:40:27
112.85.42.87 attackbots
Nov 22 22:43:42 sachi sshd\[29217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
Nov 22 22:43:44 sachi sshd\[29217\]: Failed password for root from 112.85.42.87 port 55250 ssh2
Nov 22 22:44:24 sachi sshd\[29260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
Nov 22 22:44:26 sachi sshd\[29260\]: Failed password for root from 112.85.42.87 port 41401 ssh2
Nov 22 22:45:05 sachi sshd\[29310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2019-11-23 16:50:07
106.12.32.48 attack
Nov 23 09:13:16 vps666546 sshd\[30631\]: Invalid user 1234567 from 106.12.32.48 port 33758
Nov 23 09:13:16 vps666546 sshd\[30631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.32.48
Nov 23 09:13:18 vps666546 sshd\[30631\]: Failed password for invalid user 1234567 from 106.12.32.48 port 33758 ssh2
Nov 23 09:18:27 vps666546 sshd\[30765\]: Invalid user Motdepasse_111 from 106.12.32.48 port 39696
Nov 23 09:18:27 vps666546 sshd\[30765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.32.48
...
2019-11-23 16:29:26
193.33.111.217 attackspam
Nov 23 02:35:12 server sshd\[2212\]: Failed password for invalid user deana from 193.33.111.217 port 50894 ssh2
Nov 23 09:08:51 server sshd\[6475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.33.111.217  user=root
Nov 23 09:08:53 server sshd\[6475\]: Failed password for root from 193.33.111.217 port 58148 ssh2
Nov 23 09:27:06 server sshd\[11268\]: Invalid user test from 193.33.111.217
Nov 23 09:27:06 server sshd\[11268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.33.111.217 
...
2019-11-23 16:59:21
139.199.45.83 attackspambots
Nov 23 09:21:38 sd-53420 sshd\[15782\]: User root from 139.199.45.83 not allowed because none of user's groups are listed in AllowGroups
Nov 23 09:21:38 sd-53420 sshd\[15782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83  user=root
Nov 23 09:21:40 sd-53420 sshd\[15782\]: Failed password for invalid user root from 139.199.45.83 port 53934 ssh2
Nov 23 09:25:47 sd-53420 sshd\[16832\]: Invalid user home from 139.199.45.83
Nov 23 09:25:47 sd-53420 sshd\[16832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.45.83
...
2019-11-23 16:37:40
185.49.86.54 attackspambots
Nov 20 22:07:21 carla sshd[25100]: Invalid user katuscha from 185.49.86.54
Nov 20 22:07:21 carla sshd[25100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.49.86.54 
Nov 20 22:07:23 carla sshd[25100]: Failed password for invalid user katuscha from 185.49.86.54 port 51562 ssh2
Nov 20 22:07:23 carla sshd[25101]: Received disconnect from 185.49.86.54: 11: Bye Bye
Nov 20 22:18:56 carla sshd[25156]: Invalid user ident from 185.49.86.54
Nov 20 22:18:56 carla sshd[25156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.49.86.54 
Nov 20 22:18:58 carla sshd[25156]: Failed password for invalid user ident from 185.49.86.54 port 40802 ssh2
Nov 20 22:18:58 carla sshd[25157]: Received disconnect from 185.49.86.54: 11: Bye Bye
Nov 20 22:22:42 carla sshd[25170]: Invalid user backup from 185.49.86.54
Nov 20 22:22:42 carla sshd[25170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid........
-------------------------------
2019-11-23 16:57:45
27.74.97.39 attack
Automatic report - Port Scan Attack
2019-11-23 16:35:19

最近上报的IP列表

34.161.28.54 94.237.170.2 234.30.243.105 122.46.105.30
91.19.29.11 75.132.253.208 254.143.50.224 119.158.50.28
232.227.200.184 47.100.40.203 19.141.223.34 8.17.214.76
12.34.192.16 95.243.127.85 146.116.154.8 181.248.131.241
176.72.251.46 223.176.58.121 139.213.134.146 95.21.207.182