必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.94.57.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15034
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.94.57.160.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 21:48:16 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 160.57.94.219.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 160.57.94.219.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.239.60.149 attack
2020-09-23T18:02:18.899206sorsha.thespaminator.com sshd[13696]: Invalid user glenn from 35.239.60.149 port 56966
2020-09-23T18:02:20.571693sorsha.thespaminator.com sshd[13696]: Failed password for invalid user glenn from 35.239.60.149 port 56966 ssh2
...
2020-09-24 06:23:59
223.199.17.136 attack
IP: 223.199.17.136
Ports affected
    Simple Mail Transfer (25) 
Abuse Confidence rating 17%
Found in DNSBL('s)
ASN Details
   AS4134 Chinanet
   China (CN)
   CIDR 223.198.0.0/15
Log Date: 23/09/2020 7:55:51 PM UTC
2020-09-24 06:45:58
59.90.200.187 attackspambots
Sep 23 23:25:08 server sshd[15246]: Failed password for invalid user deploy from 59.90.200.187 port 49028 ssh2
Sep 23 23:40:54 server sshd[19317]: Failed password for invalid user zzy from 59.90.200.187 port 60478 ssh2
Sep 23 23:45:00 server sshd[20381]: Failed password for invalid user user from 59.90.200.187 port 58792 ssh2
2020-09-24 06:30:17
94.34.177.60 attackbotsspam
Sep 23 18:59:10 ns382633 sshd\[18632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.34.177.60  user=root
Sep 23 18:59:12 ns382633 sshd\[18632\]: Failed password for root from 94.34.177.60 port 37880 ssh2
Sep 23 19:03:12 ns382633 sshd\[19403\]: Invalid user wiki from 94.34.177.60 port 38074
Sep 23 19:03:12 ns382633 sshd\[19403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.34.177.60
Sep 23 19:03:14 ns382633 sshd\[19403\]: Failed password for invalid user wiki from 94.34.177.60 port 38074 ssh2
2020-09-24 06:28:33
182.61.130.51 attackbots
(sshd) Failed SSH login from 182.61.130.51 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 16:26:14 optimus sshd[16402]: Invalid user upload from 182.61.130.51
Sep 23 16:26:14 optimus sshd[16402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.130.51 
Sep 23 16:26:16 optimus sshd[16402]: Failed password for invalid user upload from 182.61.130.51 port 35542 ssh2
Sep 23 16:28:44 optimus sshd[19297]: Invalid user mgeweb from 182.61.130.51
Sep 23 16:28:44 optimus sshd[19297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.130.51
2020-09-24 06:22:11
27.216.198.110 attackbots
Port Scan detected!
...
2020-09-24 06:50:45
106.52.141.36 attackbots
Invalid user csgoserver from 106.52.141.36 port 60076
2020-09-24 06:40:21
80.14.140.41 attackbots
Tried our host z.
2020-09-24 06:38:38
52.188.169.250 attackbots
2020-09-23T18:18:28.547868vps773228.ovh.net sshd[17080]: Failed password for root from 52.188.169.250 port 16677 ssh2
2020-09-23T20:28:42.231199vps773228.ovh.net sshd[18293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.188.169.250  user=root
2020-09-23T20:28:44.093690vps773228.ovh.net sshd[18293]: Failed password for root from 52.188.169.250 port 62295 ssh2
2020-09-24T00:10:00.752799vps773228.ovh.net sshd[20348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.188.169.250  user=root
2020-09-24T00:10:02.788705vps773228.ovh.net sshd[20348]: Failed password for root from 52.188.169.250 port 59207 ssh2
...
2020-09-24 06:30:51
103.20.188.34 attackspam
SP-Scan 58080:445 detected 2020.09.23 14:26:36
blocked until 2020.11.12 06:29:23
2020-09-24 06:31:53
45.129.33.120 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 25094 proto: tcp cat: Misc Attackbytes: 60
2020-09-24 06:27:26
157.245.137.145 attack
(sshd) Failed SSH login from 157.245.137.145 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 16:18:04 server sshd[16489]: Invalid user ftpuser from 157.245.137.145 port 58080
Sep 23 16:18:06 server sshd[16489]: Failed password for invalid user ftpuser from 157.245.137.145 port 58080 ssh2
Sep 23 16:21:48 server sshd[17464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.137.145  user=nagios
Sep 23 16:21:50 server sshd[17464]: Failed password for nagios from 157.245.137.145 port 42820 ssh2
Sep 23 16:25:15 server sshd[18429]: Invalid user zhang from 157.245.137.145 port 53028
2020-09-24 06:26:45
75.119.215.210 attackbots
75.119.215.210 - - [23/Sep/2020:18:59:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2384 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
75.119.215.210 - - [23/Sep/2020:18:59:55 +0100] "POST /wp-login.php HTTP/1.1" 200 2320 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
75.119.215.210 - - [23/Sep/2020:18:59:55 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-24 06:43:25
89.248.162.220 attack
Port scan on 17 port(s): 17010 17211 17223 17254 17327 17345 17382 17466 17535 17573 17681 17766 17819 17833 17843 17870 17942
2020-09-24 06:32:15
52.188.173.88 attackspambots
Sep 23 22:27:14 scw-6657dc sshd[7649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.188.173.88  user=root
Sep 23 22:27:14 scw-6657dc sshd[7649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.188.173.88  user=root
Sep 23 22:27:16 scw-6657dc sshd[7649]: Failed password for root from 52.188.173.88 port 10249 ssh2
...
2020-09-24 06:35:03

最近上报的IP列表

195.116.124.251 77.1.165.68 59.71.203.110 16.129.198.217
196.231.129.218 94.133.123.179 17.70.177.253 160.45.105.118
165.186.147.102 58.189.157.255 126.48.56.35 185.181.98.119
101.103.167.69 27.23.153.25 194.78.198.204 118.142.227.238
228.240.232.163 175.217.90.13 2.152.55.64 134.133.127.146