必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Poland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.57.138.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.57.138.142.			IN	A

;; AUTHORITY SECTION:
.			343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:17:47 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
142.138.57.2.in-addr.arpa domain name pointer s13.zenbox.pl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.138.57.2.in-addr.arpa	name = s13.zenbox.pl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.129.142.196 attackspambots
20/7/12@16:01:39: FAIL: Alarm-Network address from=181.129.142.196
20/7/12@16:01:39: FAIL: Alarm-Network address from=181.129.142.196
...
2020-07-13 05:52:01
128.199.123.0 attackbotsspam
2020-07-12T21:05:59.636389shield sshd\[7326\]: Invalid user arvind from 128.199.123.0 port 56144
2020-07-12T21:05:59.645540shield sshd\[7326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.0
2020-07-12T21:06:02.004448shield sshd\[7326\]: Failed password for invalid user arvind from 128.199.123.0 port 56144 ssh2
2020-07-12T21:09:21.775318shield sshd\[8005\]: Invalid user admin from 128.199.123.0 port 52428
2020-07-12T21:09:21.783553shield sshd\[8005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.0
2020-07-13 06:05:14
99.34.200.17 attack
Invalid user wchen from 99.34.200.17 port 29478
2020-07-13 06:12:20
141.98.9.161 attackspambots
Invalid user admin from 141.98.9.161 port 40157
2020-07-13 06:06:40
111.230.221.203 attackspam
Jul 12 22:01:10 rancher-0 sshd[272475]: Invalid user vagrant from 111.230.221.203 port 52256
Jul 12 22:01:12 rancher-0 sshd[272475]: Failed password for invalid user vagrant from 111.230.221.203 port 52256 ssh2
...
2020-07-13 06:22:06
51.91.251.20 attackspam
Jul 13 00:15:28 backup sshd[65469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.251.20 
Jul 13 00:15:30 backup sshd[65469]: Failed password for invalid user webstaff from 51.91.251.20 port 45244 ssh2
...
2020-07-13 06:22:39
20.186.66.200 attackspam
Brute forcing email accounts
2020-07-13 05:59:47
183.131.3.196 attackspambots
Jul 12 22:01:16 debian-2gb-nbg1-2 kernel: \[16842654.395455\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=183.131.3.196 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=50 ID=26201 DF PROTO=TCP SPT=5068 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2020-07-13 06:11:26
188.128.75.43 attack
Unauthorized connection attempt from IP address 188.128.75.43 on Port 445(SMB)
2020-07-13 05:51:29
59.46.173.153 attackspambots
2020-07-12T22:05:48+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-07-13 06:21:04
220.120.106.254 attackspambots
Jul 13 03:20:45 dhoomketu sshd[1469135]: Invalid user shimi from 220.120.106.254 port 46546
Jul 13 03:20:45 dhoomketu sshd[1469135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254 
Jul 13 03:20:45 dhoomketu sshd[1469135]: Invalid user shimi from 220.120.106.254 port 46546
Jul 13 03:20:47 dhoomketu sshd[1469135]: Failed password for invalid user shimi from 220.120.106.254 port 46546 ssh2
Jul 13 03:25:29 dhoomketu sshd[1469274]: Invalid user test from 220.120.106.254 port 41438
...
2020-07-13 06:17:12
106.12.12.141 attackspambots
Jul 12 16:01:05 Tower sshd[39938]: Connection from 106.12.12.141 port 58976 on 192.168.10.220 port 22 rdomain ""
Jul 12 16:01:10 Tower sshd[39938]: Invalid user cubie from 106.12.12.141 port 58976
Jul 12 16:01:10 Tower sshd[39938]: error: Could not get shadow information for NOUSER
Jul 12 16:01:10 Tower sshd[39938]: Failed password for invalid user cubie from 106.12.12.141 port 58976 ssh2
Jul 12 16:01:11 Tower sshd[39938]: Received disconnect from 106.12.12.141 port 58976:11: Bye Bye [preauth]
Jul 12 16:01:11 Tower sshd[39938]: Disconnected from invalid user cubie 106.12.12.141 port 58976 [preauth]
2020-07-13 05:56:56
91.205.75.94 attack
Brute-Force,SSH
2020-07-13 06:16:13
160.16.148.161 attackbotsspam
Invalid user martin from 160.16.148.161 port 35820
2020-07-13 06:00:15
114.35.44.253 attack
Invalid user sounosuke from 114.35.44.253 port 32904
2020-07-13 05:50:59

最近上报的IP列表

2.57.138.4 2.57.171.49 2.57.184.239 2.57.169.238
2.57.169.48 2.57.88.238 2.57.88.132 2.57.88.147
2.57.89.111 2.57.88.194 2.57.189.62 2.57.88.135
2.57.89.110 2.57.89.12 2.57.89.116 2.57.169.52
2.57.89.149 2.57.89.177 2.57.89.194 2.57.89.17