必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Romania

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
2.57.122.195 attackspam
Triggered by Fail2Ban at ReverseProxy web server
2020-10-12 21:47:03
2.57.122.195 attackspam
Unauthorized connection attempt detected from IP address 2.57.122.195 to port 22
2020-10-12 13:17:02
2.57.122.185 attackbotsspam
 TCP (SYN) 2.57.122.185:43529 -> port 81, len 44
2020-10-12 07:57:50
2.57.122.170 attackspambots
Automatic report - Banned IP Access
2020-10-12 05:01:22
2.57.122.185 attackbots
 TCP (SYN) 2.57.122.185:38582 -> port 81, len 44
2020-10-12 00:15:47
2.57.122.170 attackspambots
Automatic report - Banned IP Access
2020-10-11 21:06:02
2.57.122.185 attackspambots
Unauthorized connection attempt detected from IP address 2.57.122.185 to port 81
2020-10-11 16:14:09
2.57.122.170 attackspam
Automatic report - Banned IP Access
2020-10-11 13:03:10
2.57.122.185 attackbotsspam
 TCP (SYN) 2.57.122.185:53503 -> port 81, len 44
2020-10-11 09:33:04
2.57.122.170 attackspambots
Automatic report - Banned IP Access
2020-10-11 06:26:15
2.57.122.181 attack
 TCP (SYN) 2.57.122.181:33950 -> port 80, len 40
2020-10-10 23:49:38
2.57.122.209 attack
Sep 10 16:11:05 *hidden* postfix/postscreen[11034]: DNSBL rank 4 for [2.57.122.209]:55941
2020-10-10 23:47:57
2.57.122.185 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 4 - port: 81 proto: tcp cat: Misc Attackbytes: 60
2020-10-10 23:37:41
2.57.122.171 attackbotsspam
Port Scan
...
2020-10-10 22:33:16
2.57.122.181 attack
 TCP (SYN) 2.57.122.181:33950 -> port 80, len 40
2020-10-10 15:39:14
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '2.57.122.0 - 2.57.122.255'

% Abuse contact for '2.57.122.0 - 2.57.122.255' is 'dmzhostabuse@gmail.com'

inetnum:        2.57.122.0 - 2.57.122.255
netname:        DMZHOSTdotco
descr:          https://dmzhost.co
country:        NL
admin-c:        AD18161-RIPE
tech-c:         AD18161-RIPE
org:            ORG-TSL73-RIPE
status:         ASSIGNED PA
mnt-by:         TECHOFF-MNT
created:        2019-03-21T15:15:17Z
last-modified:  2024-11-21T09:40:02Z
source:         RIPE

organisation:   ORG-TSL73-RIPE
org-name:       TECHOFF SRV LIMITED
country:        GB
org-type:       OTHER
address:        35 Firs Avenue, London N11 3NE
abuse-c:        AD18161-RIPE
mnt-ref:        TECHOFF-MNT
mnt-ref:        MNT-NETERRA
mnt-by:         TECHOFF-MNT
created:        2024-11-20T13:01:40Z
last-modified:  2024-11-26T15:22:33Z
source:         RIPE # Filtered

role:           ABUSE DEP
address:        35 Firs Avenue, London N11 3NE
abuse-mailbox:  dmzhostabuse@gmail.com
nic-hdl:        AD18161-RIPE
mnt-by:         TECHOFF-MNT
created:        2024-11-20T13:00:28Z
last-modified:  2024-11-21T09:45:52Z
source:         RIPE # Filtered

% Information related to '2.57.122.0/24AS47890'

route:          2.57.122.0/24
origin:         AS47890
mnt-by:         TECHOFF-MNT
created:        2022-08-06T20:32:00Z
last-modified:  2024-11-21T09:41:43Z
source:         RIPE

% Information related to '2.57.122.0/24AS48090'

route:          2.57.122.0/24
origin:         AS48090
mnt-by:         TECHOFF-MNT
created:        2020-06-30T20:02:53Z
last-modified:  2024-11-21T09:41:56Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.57.122.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59000
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.57.122.112.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 05:30:33 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 112.122.57.2.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 2.57.122.112.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
172.68.46.212 attackbotsspam
Wordpress XMLRPC attack
2019-08-05 14:14:55
89.163.141.16 attackspam
SMTP PORT:25, HELO:mail.bingers.eu, FROM:Married wives" \n Subject:Married wives want sex"
2019-08-05 14:09:51
89.210.157.52 attackbots
Autoban   89.210.157.52 AUTH/CONNECT
2019-08-05 14:03:45
89.64.26.243 attackbotsspam
Autoban   89.64.26.243 AUTH/CONNECT
2019-08-05 13:46:04
115.78.1.103 attack
2019-08-05T04:08:51.046708abusebot-6.cloudsearch.cf sshd\[10304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.1.103  user=root
2019-08-05 13:26:15
90.143.155.185 attackbots
Autoban   90.143.155.185 AUTH/CONNECT
2019-08-05 13:39:22
89.163.152.184 attackbotsspam
Autoban   89.163.152.184 AUTH/CONNECT
2019-08-05 14:09:01
43.250.124.98 attack
proto=tcp  .  spt=43697  .  dpt=25  .     (listed on Blocklist de  Aug 04)     (714)
2019-08-05 13:19:40
181.65.77.211 attackbots
2019-08-04T21:14:00.421572abusebot-2.cloudsearch.cf sshd\[1126\]: Invalid user accounting from 181.65.77.211 port 45314
2019-08-05 14:16:30
89.64.26.168 attack
Autoban   89.64.26.168 AUTH/CONNECT
2019-08-05 13:46:42
89.64.43.16 attack
Autoban   89.64.43.16 AUTH/CONNECT
2019-08-05 13:44:27
90.148.230.114 attackspam
Autoban   90.148.230.114 AUTH/CONNECT
2019-08-05 13:39:02
89.77.154.238 attack
Autoban   89.77.154.238 AUTH/CONNECT
2019-08-05 13:41:58
91.139.50.102 attackbotsspam
Autoban   91.139.50.102 AUTH/CONNECT
2019-08-05 13:16:51
121.160.21.6 attackbots
Aug  5 00:47:19 sshgateway sshd\[20050\]: Invalid user HDP from 121.160.21.6
Aug  5 00:47:19 sshgateway sshd\[20050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.160.21.6
Aug  5 00:47:21 sshgateway sshd\[20050\]: Failed password for invalid user HDP from 121.160.21.6 port 56712 ssh2
2019-08-05 14:16:59

最近上报的IP列表

34.22.172.118 104.248.53.88 5.187.35.142 198.235.24.243
111.229.157.251 2606:4700:10::ac43:2030 2606:4700:10::ac43:1700 2606:4700:10::6816:2667
2606:4700:10::6816:2631 2606:4700:10::ac43:2162 2606:4700:10::6814:5004 2606:4700:10::6816:403d
2606:4700:10::6814:8425 2606:4700:10::6814:8559 2606:4700:10::6814:7467 2606:4700:10::6814:5074
134.35.157.62 14.213.11.222 66.132.172.202 2606:4700:10::6816:2434