必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.189.52.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.189.52.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:28:27 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 57.52.189.194.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.52.189.194.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.144.131.93 attack
Oct 21 05:51:32 lnxmysql61 sshd[13537]: Failed password for root from 122.144.131.93 port 40983 ssh2
Oct 21 05:51:32 lnxmysql61 sshd[13537]: Failed password for root from 122.144.131.93 port 40983 ssh2
2019-10-21 12:12:31
71.6.233.178 attackspambots
" "
2019-10-21 12:03:28
144.217.39.131 attackbots
Oct 21 05:55:49 ns41 sshd[8460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.39.131
2019-10-21 12:18:44
27.154.20.222 attackspam
Oct 21 05:56:05 vps01 sshd[30368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.154.20.222
Oct 21 05:56:08 vps01 sshd[30368]: Failed password for invalid user chase from 27.154.20.222 port 19310 ssh2
2019-10-21 12:04:50
212.47.251.164 attackspambots
$f2bV_matches
2019-10-21 08:19:00
52.166.95.124 attackspambots
Oct 21 06:34:05 server sshd\[27733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.166.95.124  user=root
Oct 21 06:34:07 server sshd\[27733\]: Failed password for root from 52.166.95.124 port 58716 ssh2
Oct 21 06:52:55 server sshd\[2348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.166.95.124  user=root
Oct 21 06:52:56 server sshd\[2348\]: Failed password for root from 52.166.95.124 port 23548 ssh2
Oct 21 06:56:07 server sshd\[3275\]: Invalid user test from 52.166.95.124
Oct 21 06:56:07 server sshd\[3275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.166.95.124 
...
2019-10-21 12:03:54
222.186.175.154 attackspam
Oct 21 02:03:33 vserver sshd\[6273\]: Failed password for root from 222.186.175.154 port 22942 ssh2Oct 21 02:03:37 vserver sshd\[6273\]: Failed password for root from 222.186.175.154 port 22942 ssh2Oct 21 02:03:42 vserver sshd\[6273\]: Failed password for root from 222.186.175.154 port 22942 ssh2Oct 21 02:03:46 vserver sshd\[6273\]: Failed password for root from 222.186.175.154 port 22942 ssh2
...
2019-10-21 08:24:33
190.203.68.76 attack
Port 1433 Scan
2019-10-21 08:16:45
51.83.73.160 attackbots
F2B jail: sshd. Time: 2019-10-20 23:10:25, Reported by: VKReport
2019-10-21 08:25:37
222.186.175.148 attack
Oct 20 20:30:14 ny01 sshd[27798]: Failed password for root from 222.186.175.148 port 54556 ssh2
Oct 20 20:30:18 ny01 sshd[27798]: Failed password for root from 222.186.175.148 port 54556 ssh2
Oct 20 20:30:22 ny01 sshd[27798]: Failed password for root from 222.186.175.148 port 54556 ssh2
Oct 20 20:30:26 ny01 sshd[27798]: Failed password for root from 222.186.175.148 port 54556 ssh2
2019-10-21 08:31:25
77.55.210.147 attack
Oct 20 11:24:03 nxxxxxxx0 sshd[29113]: Invalid user awanjiru from 77.55.210.147
Oct 20 11:24:05 nxxxxxxx0 sshd[29113]: Failed password for invalid user awanjiru from 77.55.210.147 port 41134 ssh2
Oct 20 11:24:05 nxxxxxxx0 sshd[29113]: Received disconnect from 77.55.210.147: 11: Bye Bye [preauth]
Oct 20 11:44:26 nxxxxxxx0 sshd[30545]: Failed password for r.r from 77.55.210.147 port 56236 ssh2
Oct 20 11:44:26 nxxxxxxx0 sshd[30545]: Received disconnect from 77.55.210.147: 11: Bye Bye [preauth]
Oct 20 11:49:26 nxxxxxxx0 sshd[30892]: Invalid user tom from 77.55.210.147
Oct 20 11:49:28 nxxxxxxx0 sshd[30892]: Failed password for invalid user tom from 77.55.210.147 port 40202 ssh2
Oct 20 11:49:28 nxxxxxxx0 sshd[30892]: Received disconnect from 77.55.210.147: 11: Bye Bye [preauth]
Oct 20 11:53:13 nxxxxxxx0 sshd[31149]: Invalid user er from 77.55.210.147
Oct 20 11:53:15 nxxxxxxx0 sshd[31149]: Failed password for invalid user er from 77.55.210.147 port 52392 ssh2
Oct 20 11:53:15 n........
-------------------------------
2019-10-21 08:30:04
45.82.34.153 attackspambots
Autoban   45.82.34.153 AUTH/CONNECT
2019-10-21 12:07:31
129.226.129.191 attack
Oct 21 05:51:47 vps691689 sshd[20835]: Failed password for root from 129.226.129.191 port 37330 ssh2
Oct 21 05:56:00 vps691689 sshd[20881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.191
...
2019-10-21 12:11:32
45.61.48.232 attack
10/20/2019-18:18:55.367485 45.61.48.232 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-21 08:13:30
194.181.140.218 attack
Oct 21 06:52:00 www2 sshd\[8953\]: Failed password for root from 194.181.140.218 port 46388 ssh2Oct 21 06:55:55 www2 sshd\[9467\]: Invalid user  from 194.181.140.218Oct 21 06:55:57 www2 sshd\[9467\]: Failed password for invalid user  from 194.181.140.218 port 37468 ssh2
...
2019-10-21 12:13:53

最近上报的IP列表

28.201.74.3 134.23.208.53 184.207.180.136 173.46.96.225
180.148.131.35 90.175.130.1 237.253.195.47 53.245.208.118
13.149.252.45 133.55.226.242 168.4.135.88 178.80.58.9
174.101.53.172 74.170.143.31 62.250.173.222 4.97.150.112
162.237.244.225 186.157.49.17 92.197.149.206 171.116.190.228