必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): UOL DIVEO S.A.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.99.114.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19139
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.99.114.57.			IN	A

;; AUTHORITY SECTION:
.			2657	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052700 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 27 20:32:32 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 57.114.99.200.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 57.114.99.200.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.12.52.239 attackbotsspam
SSH Login Bruteforce
2019-12-26 09:03:59
95.78.183.156 attackbots
Dec 24 22:31:55 *** sshd[17343]: reveeclipse mapping checking getaddrinfo for dynamicip-95-78-183-156.pppoe.chel.ertelecom.ru [95.78.183.156] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec 24 22:31:55 *** sshd[17343]: Invalid user test from 95.78.183.156
Dec 24 22:31:55 *** sshd[17343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.78.183.156 
Dec 24 22:31:57 *** sshd[17343]: Failed password for invalid user test from 95.78.183.156 port 37047 ssh2
Dec 24 22:31:57 *** sshd[17343]: Received disconnect from 95.78.183.156: 11: Bye Bye [preauth]
Dec 24 22:44:29 *** sshd[19017]: reveeclipse mapping checking getaddrinfo for dynamicip-95-78-183-156.pppoe.chel.ertelecom.ru [95.78.183.156] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec 24 22:44:29 *** sshd[19017]: Invalid user derosa from 95.78.183.156
Dec 24 22:44:29 *** sshd[19017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.78.183.156 
Dec 24 22:44:........
-------------------------------
2019-12-26 08:55:31
196.52.43.95 attackbotsspam
Honeypot attack, port: 389, PTR: 196.52.43.95.netsystemsresearch.com.
2019-12-26 08:52:00
46.38.144.32 attackspambots
Dec 26 02:12:39 relay postfix/smtpd\[9142\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 02:14:54 relay postfix/smtpd\[27976\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 02:15:55 relay postfix/smtpd\[9034\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 02:18:12 relay postfix/smtpd\[11187\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 02:19:07 relay postfix/smtpd\[9142\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-26 09:20:05
27.72.102.190 attackbotsspam
Invalid user ftpuser from 27.72.102.190 port 18615
2019-12-26 08:49:44
60.213.95.120 attackbots
Dec 25 21:39:43 saengerschafter sshd[5504]: Did not receive identification string from 60.213.95.120
Dec 25 23:43:19 saengerschafter sshd[17842]: Invalid user admin from 60.213.95.120
Dec 25 23:43:20 saengerschafter sshd[17842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.213.95.120 
Dec 25 23:43:22 saengerschafter sshd[17842]: Failed password for invalid user admin from 60.213.95.120 port 53256 ssh2
Dec 25 23:43:23 saengerschafter sshd[17842]: Connection closed by 60.213.95.120 [preauth]
Dec 25 23:43:34 saengerschafter sshd[18110]: Invalid user admin from 60.213.95.120
Dec 25 23:43:34 saengerschafter sshd[18110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.213.95.120 
Dec 25 23:43:36 saengerschafter sshd[18110]: Failed password for invalid user admin from 60.213.95.120 port 53838 ssh2
Dec 25 23:43:37 saengerschafter sshd[18110]: Connection closed by 60.213.95.120 [preauth]
Dec........
-------------------------------
2019-12-26 08:52:58
222.240.195.114 attackbotsspam
TCP Port Scanning
2019-12-26 09:06:35
134.209.173.8 attack
Automatic report - XMLRPC Attack
2019-12-26 09:22:43
46.17.105.2 attackbotsspam
Unauthorised access (Dec 26) SRC=46.17.105.2 LEN=40 TTL=249 ID=49196 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Dec 24) SRC=46.17.105.2 LEN=40 TTL=249 ID=12327 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Dec 23) SRC=46.17.105.2 LEN=40 TTL=249 ID=59808 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Dec 22) SRC=46.17.105.2 LEN=40 TTL=249 ID=46729 TCP DPT=445 WINDOW=1024 SYN
2019-12-26 08:58:20
217.76.158.124 attackspambots
Dec 26 00:37:01 localhost sshd\[15388\]: Invalid user pcap from 217.76.158.124 port 36552
Dec 26 00:37:01 localhost sshd\[15388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.76.158.124
Dec 26 00:37:03 localhost sshd\[15388\]: Failed password for invalid user pcap from 217.76.158.124 port 36552 ssh2
2019-12-26 09:24:40
78.46.171.95 attack
Chat Spam
2019-12-26 09:10:32
210.210.116.203 attack
CloudCIX Reconnaissance Scan Detected, PTR: 210-210-116-203.lan.sify.net.
2019-12-26 09:01:22
45.171.124.30 attackbotsspam
Unauthorized connection attempt detected from IP address 45.171.124.30 to port 9000
2019-12-26 08:59:23
51.38.71.36 attackbotsspam
Dec 25 18:32:00 : SSH login attempts with invalid user
2019-12-26 09:14:44
43.247.40.254 attackspam
Port scan: Attack repeated for 24 hours
2019-12-26 09:12:57

最近上报的IP列表

85.155.76.202 182.195.124.158 1.1.1.8 177.215.96.61
189.78.121.87 42.56.46.173 53.215.29.87 95.83.27.127
218.191.138.140 206.57.18.161 191.219.177.99 79.102.3.102
142.106.2.26 101.69.121.81 125.199.153.233 49.64.134.137
41.221.81.185 1.64.230.239 52.117.190.134 74.226.85.27