必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.246.105.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;205.246.105.57.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010500 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 05 19:41:45 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
Host 57.105.246.205.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.105.246.205.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.92.133.32 attackspambots
Dec 15 15:43:26 v22018086721571380 sshd[5970]: Failed password for invalid user mysql from 120.92.133.32 port 27394 ssh2
Dec 15 16:00:08 v22018086721571380 sshd[7043]: Failed password for invalid user test from 120.92.133.32 port 63482 ssh2
2019-12-15 23:47:17
80.211.112.81 attack
Dec 15 08:31:28 server sshd\[13847\]: Invalid user admin from 80.211.112.81
Dec 15 08:31:28 server sshd\[13847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.112.81 
Dec 15 08:31:30 server sshd\[13847\]: Failed password for invalid user admin from 80.211.112.81 port 55396 ssh2
Dec 15 17:53:45 server sshd\[25009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.112.81  user=root
Dec 15 17:53:48 server sshd\[25009\]: Failed password for root from 80.211.112.81 port 52402 ssh2
...
2019-12-15 23:47:41
106.54.139.117 attackspambots
Dec 15 16:37:19 localhost sshd\[21388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.139.117  user=bin
Dec 15 16:37:22 localhost sshd\[21388\]: Failed password for bin from 106.54.139.117 port 43032 ssh2
Dec 15 16:44:19 localhost sshd\[22114\]: Invalid user kluka from 106.54.139.117 port 39568
Dec 15 16:44:19 localhost sshd\[22114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.139.117
2019-12-15 23:45:27
188.254.0.182 attackbotsspam
Dec 15 05:06:50 php1 sshd\[5514\]: Invalid user sritidc from 188.254.0.182
Dec 15 05:06:50 php1 sshd\[5514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182
Dec 15 05:06:52 php1 sshd\[5514\]: Failed password for invalid user sritidc from 188.254.0.182 port 53020 ssh2
Dec 15 05:13:13 php1 sshd\[6324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182  user=root
Dec 15 05:13:15 php1 sshd\[6324\]: Failed password for root from 188.254.0.182 port 59096 ssh2
2019-12-15 23:13:25
36.69.178.6 attack
invalid user
2019-12-15 23:03:28
49.232.23.127 attackspam
Dec 15 15:48:19 sso sshd[9591]: Failed password for root from 49.232.23.127 port 53534 ssh2
...
2019-12-15 23:35:39
222.186.52.78 attack
Dec 15 22:24:51 webhost01 sshd[30402]: Failed password for root from 222.186.52.78 port 34946 ssh2
...
2019-12-15 23:34:55
180.244.233.30 attackspam
1576421650 - 12/15/2019 15:54:10 Host: 180.244.233.30/180.244.233.30 Port: 445 TCP Blocked
2019-12-15 23:24:32
36.99.169.195 attackspam
Dec 15 09:47:54 linuxvps sshd\[56682\]: Invalid user ktyam from 36.99.169.195
Dec 15 09:47:54 linuxvps sshd\[56682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.99.169.195
Dec 15 09:47:55 linuxvps sshd\[56682\]: Failed password for invalid user ktyam from 36.99.169.195 port 57868 ssh2
Dec 15 09:54:26 linuxvps sshd\[61117\]: Invalid user hafskjold from 36.99.169.195
Dec 15 09:54:26 linuxvps sshd\[61117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.99.169.195
2019-12-15 23:05:00
52.14.193.104 attack
Dec 15 15:46:35 ns382633 sshd\[5455\]: Invalid user i18n from 52.14.193.104 port 34822
Dec 15 15:46:35 ns382633 sshd\[5455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.14.193.104
Dec 15 15:46:38 ns382633 sshd\[5455\]: Failed password for invalid user i18n from 52.14.193.104 port 34822 ssh2
Dec 15 16:08:28 ns382633 sshd\[9103\]: Invalid user hwang from 52.14.193.104 port 44690
Dec 15 16:08:28 ns382633 sshd\[9103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.14.193.104
2019-12-15 23:26:18
34.247.68.236 attackbots
Dec 15 15:49:09 minden010 sshd[18591]: Failed password for root from 34.247.68.236 port 34420 ssh2
Dec 15 15:54:30 minden010 sshd[20235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.247.68.236
Dec 15 15:54:31 minden010 sshd[20235]: Failed password for invalid user marketing from 34.247.68.236 port 42542 ssh2
...
2019-12-15 23:02:04
82.223.197.152 attack
Dec 15 16:53:51 ncomp sshd[7603]: Invalid user ubuntu from 82.223.197.152
Dec 15 16:53:51 ncomp sshd[7603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.223.197.152
Dec 15 16:53:51 ncomp sshd[7603]: Invalid user ubuntu from 82.223.197.152
Dec 15 16:53:54 ncomp sshd[7603]: Failed password for invalid user ubuntu from 82.223.197.152 port 33450 ssh2
2019-12-15 23:43:16
165.22.114.237 attackbots
Dec 15 16:20:38 sd-53420 sshd\[10746\]: Invalid user hung from 165.22.114.237
Dec 15 16:20:38 sd-53420 sshd\[10746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.114.237
Dec 15 16:20:40 sd-53420 sshd\[10746\]: Failed password for invalid user hung from 165.22.114.237 port 42590 ssh2
Dec 15 16:26:05 sd-53420 sshd\[12172\]: Invalid user tveranger from 165.22.114.237
Dec 15 16:26:05 sd-53420 sshd\[12172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.114.237
...
2019-12-15 23:34:19
193.112.19.70 attack
Dec 15 22:26:31 lcl-usvr-02 sshd[5984]: Invalid user rubibl from 193.112.19.70 port 52370
Dec 15 22:26:31 lcl-usvr-02 sshd[5984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.19.70
Dec 15 22:26:31 lcl-usvr-02 sshd[5984]: Invalid user rubibl from 193.112.19.70 port 52370
Dec 15 22:26:33 lcl-usvr-02 sshd[5984]: Failed password for invalid user rubibl from 193.112.19.70 port 52370 ssh2
Dec 15 22:31:08 lcl-usvr-02 sshd[6947]: Invalid user walter from 193.112.19.70 port 35392
...
2019-12-15 23:32:05
60.210.40.197 attack
Dec 15 14:03:52 vtv3 sshd[6983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.197 
Dec 15 14:03:54 vtv3 sshd[6983]: Failed password for invalid user namote from 60.210.40.197 port 22560 ssh2
Dec 15 14:09:07 vtv3 sshd[9348]: Failed password for backup from 60.210.40.197 port 22562 ssh2
Dec 15 14:22:37 vtv3 sshd[15910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.197 
Dec 15 14:22:39 vtv3 sshd[15910]: Failed password for invalid user forms from 60.210.40.197 port 22568 ssh2
Dec 15 14:26:35 vtv3 sshd[17940]: Failed password for root from 60.210.40.197 port 22569 ssh2
Dec 15 14:48:58 vtv3 sshd[28672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.40.197 
Dec 15 14:49:00 vtv3 sshd[28672]: Failed password for invalid user guest from 60.210.40.197 port 22575 ssh2
Dec 15 14:55:07 vtv3 sshd[31418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0
2019-12-15 23:48:38

最近上报的IP列表

207.6.223.159 203.201.225.122 233.235.52.97 2.165.131.78
197.151.186.42 196.191.77.35 195.183.2.138 195.103.38.36
193.1.121.78 192.105.112.251 190.204.165.46 189.118.152.221
186.129.92.85 185.60.137.60 184.198.85.66 183.135.121.65
18.19.130.140 172.68.255.126 178.154.246.1 177.244.30.6