必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.196.148.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12124
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;220.196.148.57.			IN	A

;; AUTHORITY SECTION:
.			453	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032201 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 07:03:01 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 57.148.196.220.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 57.148.196.220.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.135.120.247 attack
Port probing on unauthorized port 445
2020-05-12 02:26:52
175.8.94.35 attackbots
Port probing on unauthorized port 23
2020-05-12 02:15:33
124.232.133.205 attack
May 11 18:00:21 *** sshd[31846]: Invalid user math from 124.232.133.205
2020-05-12 02:11:30
109.244.101.155 attackbotsspam
May 11 19:54:58 [host] sshd[10873]: Invalid user a
May 11 19:54:58 [host] sshd[10873]: pam_unix(sshd:
May 11 19:55:00 [host] sshd[10873]: Failed passwor
2020-05-12 02:01:09
14.142.119.174 attack
1589198616 - 05/11/2020 14:03:36 Host: 14.142.119.174/14.142.119.174 Port: 445 TCP Blocked
2020-05-12 02:18:47
222.186.173.238 attackbotsspam
May 11 20:14:58 vmd48417 sshd[12320]: Failed password for root from 222.186.173.238 port 22722 ssh2
2020-05-12 02:17:18
123.20.184.43 attackspam
May 11 14:03:16 mail sshd\[11010\]: Invalid user admin from 123.20.184.43
May 11 14:03:16 mail sshd\[11010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.20.184.43
May 11 14:03:19 mail sshd\[11010\]: Failed password for invalid user admin from 123.20.184.43 port 36604 ssh2
...
2020-05-12 02:35:40
162.243.139.56 attackbotsspam
firewall-block, port(s): 7474/tcp
2020-05-12 02:38:16
47.74.230.86 attack
*Port Scan* detected from 47.74.230.86 (SG/Singapore/-/Singapore (Downtown Core)/-). 4 hits in the last 10 seconds
2020-05-12 02:30:35
171.246.84.140 attackspambots
May 11 13:03:52 cdc sshd[32360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.246.84.140 
May 11 13:03:54 cdc sshd[32360]: Failed password for invalid user admin from 171.246.84.140 port 64830 ssh2
2020-05-12 01:59:56
192.119.92.45 attack
Spam
2020-05-12 02:37:00
134.175.154.93 attackspambots
May 11 14:03:30 mail sshd\[11056\]: Invalid user pie from 134.175.154.93
May 11 14:03:30 mail sshd\[11056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.154.93
May 11 14:03:32 mail sshd\[11056\]: Failed password for invalid user pie from 134.175.154.93 port 38074 ssh2
...
2020-05-12 02:20:32
27.22.127.191 attack
May 11 07:54:45 esmtp postfix/smtpd[3732]: lost connection after AUTH from unknown[27.22.127.191]
May 11 07:54:55 esmtp postfix/smtpd[3674]: lost connection after AUTH from unknown[27.22.127.191]
May 11 07:55:01 esmtp postfix/smtpd[3732]: lost connection after AUTH from unknown[27.22.127.191]
May 11 07:55:08 esmtp postfix/smtpd[3674]: lost connection after AUTH from unknown[27.22.127.191]
May 11 07:55:13 esmtp postfix/smtpd[3732]: lost connection after AUTH from unknown[27.22.127.191]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.22.127.191
2020-05-12 02:08:35
152.67.35.185 attackbotsspam
May 11 14:50:35 vps647732 sshd[26684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.35.185
May 11 14:50:37 vps647732 sshd[26684]: Failed password for invalid user lab from 152.67.35.185 port 55218 ssh2
...
2020-05-12 02:32:45
222.186.173.142 attack
May 11 20:59:20 ift sshd\[60493\]: Failed password for root from 222.186.173.142 port 39382 ssh2May 11 20:59:24 ift sshd\[60493\]: Failed password for root from 222.186.173.142 port 39382 ssh2May 11 20:59:34 ift sshd\[60493\]: Failed password for root from 222.186.173.142 port 39382 ssh2May 11 20:59:39 ift sshd\[60497\]: Failed password for root from 222.186.173.142 port 12096 ssh2May 11 20:59:42 ift sshd\[60497\]: Failed password for root from 222.186.173.142 port 12096 ssh2
...
2020-05-12 02:04:59

最近上报的IP列表

62.133.223.212 179.52.12.79 100.219.180.39 161.67.78.173
42.60.13.172 173.29.229.166 242.69.48.26 119.206.159.39
146.241.126.91 115.214.111.230 93.148.49.207 41.220.71.113
69.42.195.36 49.51.130.208 63.82.48.21 76.177.38.86
45.81.233.179 138.227.194.131 46.206.117.65 197.140.32.155