必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): Claro

主机名(hostname): unknown

机构(organization): CLARO S.A.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.57.137.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24102
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.57.137.20.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 06 00:24:36 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 20.137.57.201.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 20.137.57.201.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.136.109.34 attackbots
09/08/2019-07:46:29.028518 45.136.109.34 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-08 20:02:14
37.19.109.147 attackspambots
TCP Port: 25 _    invalid blocked abuseat-org barracudacentral _  _  _ _ (775)
2019-09-08 20:11:30
182.73.250.50 attack
Sep  8 20:22:15 localhost sshd[14526]: Invalid user student from 182.73.250.50 port 54888
Sep  8 20:22:15 localhost sshd[14526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.250.50
Sep  8 20:22:15 localhost sshd[14526]: Invalid user student from 182.73.250.50 port 54888
Sep  8 20:22:17 localhost sshd[14526]: Failed password for invalid user student from 182.73.250.50 port 54888 ssh2
...
2019-09-08 20:32:26
184.105.247.196 attackspam
19/9/8@06:02:33: FAIL: IoT-Telnet address from=184.105.247.196
...
2019-09-08 19:59:07
119.29.53.107 attack
Sep  8 11:11:09 server01 sshd\[8351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.53.107  user=www-data
Sep  8 11:11:11 server01 sshd\[8351\]: Failed password for www-data from 119.29.53.107 port 49495 ssh2
Sep  8 11:13:52 server01 sshd\[8414\]: Invalid user testuser from 119.29.53.107
...
2019-09-08 20:40:38
139.199.34.191 attackspam
ECShop Remote Code Execution Vulnerability, PTR: PTR record not found
2019-09-08 19:53:02
5.3.247.124 attackspam
TCP Port: 25 _    invalid blocked zen-spamhaus rbldns-ru _  _  _ _ (769)
2019-09-08 20:21:54
104.229.177.64 attack
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (766)
2019-09-08 20:31:40
60.28.253.182 attackspam
Sep  8 13:52:23 meumeu sshd[1178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.28.253.182 
Sep  8 13:52:24 meumeu sshd[1178]: Failed password for invalid user ftptest1 from 60.28.253.182 port 56476 ssh2
Sep  8 13:55:55 meumeu sshd[1679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.28.253.182 
...
2019-09-08 20:31:08
67.248.141.225 attackbotsspam
Sep  8 11:39:21 MK-Soft-VM5 sshd\[32373\]: Invalid user payme from 67.248.141.225 port 45902
Sep  8 11:39:21 MK-Soft-VM5 sshd\[32373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.248.141.225
Sep  8 11:39:23 MK-Soft-VM5 sshd\[32373\]: Failed password for invalid user payme from 67.248.141.225 port 45902 ssh2
...
2019-09-08 20:21:38
103.119.145.130 attackspam
Sep  8 10:14:13 vpn01 sshd\[15900\]: Invalid user testuser from 103.119.145.130
Sep  8 10:14:13 vpn01 sshd\[15900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.145.130
Sep  8 10:14:15 vpn01 sshd\[15900\]: Failed password for invalid user testuser from 103.119.145.130 port 58978 ssh2
2019-09-08 20:12:20
138.68.208.31 attackspambots
8140/tcp 70/tcp
[2019-09-06/07]3pkt
2019-09-08 20:20:57
105.154.74.185 attackspambots
TCP Port: 25 _    invalid blocked abuseat-org zen-spamhaus _  _  _ _ (785)
2019-09-08 19:56:10
130.61.117.31 attackspambots
Sep  8 11:11:32 localhost sshd\[72851\]: Invalid user jtsai from 130.61.117.31 port 21504
Sep  8 11:11:32 localhost sshd\[72851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.117.31
Sep  8 11:11:35 localhost sshd\[72851\]: Failed password for invalid user jtsai from 130.61.117.31 port 21504 ssh2
Sep  8 11:22:32 localhost sshd\[73195\]: Invalid user rtest from 130.61.117.31 port 65201
Sep  8 11:22:32 localhost sshd\[73195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.117.31
...
2019-09-08 19:53:23
193.112.46.99 attackspam
Sep  8 13:40:31 markkoudstaal sshd[21588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.46.99
Sep  8 13:40:33 markkoudstaal sshd[21588]: Failed password for invalid user 12345 from 193.112.46.99 port 43706 ssh2
Sep  8 13:45:52 markkoudstaal sshd[22041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.46.99
2019-09-08 20:01:41

最近上报的IP列表

78.249.113.67 2001:44c8:4567:fbda:3cd2:578a:f9f2:c0e 149.62.202.253 178.254.143.255
45.5.103.68 42.118.8.87 39.79.130.42 36.78.203.8
2001:44c8:4508:bb42:1960:b430:8a9b:9ff2 205.59.233.223 31.163.163.10 208.15.237.51
14.98.75.9 2.50.142.209 103.75.198.251 1.160.194.184
125.216.71.134 1.0.159.25 131.77.183.22 202.46.36.33