必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Fujinomiya

省份(region): Sizuoka (Shizuoka)

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.148.34.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20356
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.148.34.57.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060900 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 10 01:44:01 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
57.34.148.220.in-addr.arpa domain name pointer p057.net220148034.tnc.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.34.148.220.in-addr.arpa	name = p057.net220148034.tnc.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.129.33.15 attack
Aug  5 22:41:30 debian-2gb-nbg1-2 kernel: \[18918549.847188\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.129.33.15 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=53371 PROTO=TCP SPT=45280 DPT=8894 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-06 04:47:55
45.227.255.208 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-05T20:02:57Z and 2020-08-05T20:17:48Z
2020-08-06 04:39:40
14.121.147.76 attackbots
Port probing on unauthorized port 1433
2020-08-06 04:21:37
206.81.2.75 attackspam
Aug  5 22:38:11 vps639187 sshd\[17010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.2.75  user=root
Aug  5 22:38:12 vps639187 sshd\[17010\]: Failed password for root from 206.81.2.75 port 39814 ssh2
Aug  5 22:41:30 vps639187 sshd\[17140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.2.75  user=root
...
2020-08-06 04:48:50
88.212.245.68 attack
88.212.245.68 - - [05/Aug/2020:16:31:37 +0100] "POST /wp-login.php HTTP/1.1" 200 1949 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
88.212.245.68 - - [05/Aug/2020:16:31:38 +0100] "POST /wp-login.php HTTP/1.1" 200 1929 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
88.212.245.68 - - [05/Aug/2020:16:31:38 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-06 04:13:08
145.239.84.203 attack
there was a hack on email box and fb account
2020-08-06 04:47:31
37.59.47.61 attackbots
37.59.47.61 - - [05/Aug/2020:21:27:29 +0100] "POST /wp-login.php HTTP/1.1" 200 6981 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.47.61 - - [05/Aug/2020:21:28:31 +0100] "POST /wp-login.php HTTP/1.1" 200 6981 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.47.61 - - [05/Aug/2020:21:30:23 +0100] "POST /wp-login.php HTTP/1.1" 200 6981 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-06 04:31:28
94.234.54.146 attack
IP: 94.234.54.146
Ports affected
    Simple Mail Transfer (25) 
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 87%
ASN Details
   AS2119 Telenor Norge AS
   Sweden (SE)
   CIDR 94.234.0.0/16
Log Date: 5/08/2020 4:16:42 PM UTC
2020-08-06 04:42:40
128.199.124.159 attack
Aug  5 20:48:46 django-0 sshd[25725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.124.159  user=root
Aug  5 20:48:49 django-0 sshd[25725]: Failed password for root from 128.199.124.159 port 56100 ssh2
...
2020-08-06 04:45:46
192.243.114.21 attackbots
2020-08-05T17:44:39.414727ns386461 sshd\[9452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.243.114.21.16clouds.com  user=root
2020-08-05T17:44:41.462629ns386461 sshd\[9452\]: Failed password for root from 192.243.114.21 port 38386 ssh2
2020-08-05T18:27:57.008726ns386461 sshd\[16391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.243.114.21.16clouds.com  user=root
2020-08-05T18:27:59.718352ns386461 sshd\[16391\]: Failed password for root from 192.243.114.21 port 54096 ssh2
2020-08-05T18:44:00.796594ns386461 sshd\[31139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.243.114.21.16clouds.com  user=root
...
2020-08-06 04:35:04
211.170.61.184 attackspambots
2020-08-05T19:06:51.695528abusebot-3.cloudsearch.cf sshd[24755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.170.61.184  user=root
2020-08-05T19:06:54.257574abusebot-3.cloudsearch.cf sshd[24755]: Failed password for root from 211.170.61.184 port 56301 ssh2
2020-08-05T19:09:45.706914abusebot-3.cloudsearch.cf sshd[24944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.170.61.184  user=root
2020-08-05T19:09:48.153766abusebot-3.cloudsearch.cf sshd[24944]: Failed password for root from 211.170.61.184 port 22949 ssh2
2020-08-05T19:12:36.942896abusebot-3.cloudsearch.cf sshd[24968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.170.61.184  user=root
2020-08-05T19:12:39.199037abusebot-3.cloudsearch.cf sshd[24968]: Failed password for root from 211.170.61.184 port 46091 ssh2
2020-08-05T19:15:32.796605abusebot-3.cloudsearch.cf sshd[25000]: pam_unix(sshd:auth):
...
2020-08-06 04:26:18
212.205.224.44 attack
firewall-block, port(s): 1433/tcp
2020-08-06 04:23:35
118.25.182.118 attack
Aug  5 20:14:19 marvibiene sshd[5712]: Failed password for root from 118.25.182.118 port 42994 ssh2
Aug  5 20:23:05 marvibiene sshd[6227]: Failed password for root from 118.25.182.118 port 49788 ssh2
2020-08-06 04:27:11
36.226.102.221 attackbotsspam
1596629379 - 08/05/2020 14:09:39 Host: 36.226.102.221/36.226.102.221 Port: 445 TCP Blocked
2020-08-06 04:44:06
158.69.42.218 attackbotsspam
Excessive Port-Scanning
2020-08-06 04:20:24

最近上报的IP列表

71.212.142.253 208.86.18.20 119.86.33.91 50.53.38.87
136.247.15.215 22.184.86.184 93.26.47.182 250.80.184.126
164.250.146.187 153.97.243.184 96.78.26.4 31.225.255.117
157.185.248.66 233.172.186.7 187.130.192.64 153.254.43.98
3.214.198.185 236.9.196.187 197.45.142.9 73.70.77.117