必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.57.142.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.57.142.227.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 21:12:04 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
227.142.57.220.in-addr.arpa domain name pointer softbank220057142227.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
227.142.57.220.in-addr.arpa	name = softbank220057142227.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.102.49.90 attack
(Jun 27)  LEN=40 TTL=243 ID=28382 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 27)  LEN=40 TTL=243 ID=11754 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 27)  LEN=40 TTL=243 ID=21382 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 27)  LEN=40 TTL=243 ID=40388 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 26)  LEN=40 TTL=243 ID=34930 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 26)  LEN=40 TTL=243 ID=46288 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 26)  LEN=40 TTL=243 ID=52907 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 26)  LEN=40 TTL=243 ID=48712 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 26)  LEN=40 TTL=243 ID=55241 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 26)  LEN=40 TTL=243 ID=3201 DF TCP DPT=23 WINDOW=14600 SYN
2020-06-28 02:06:50
205.185.115.40 attack
Invalid user jenkins from 205.185.115.40 port 33130
2020-06-28 02:00:26
51.161.70.126 attack
Invalid user yen from 51.161.70.126 port 34824
2020-06-28 01:57:32
170.231.199.17 attack
port scan and connect, tcp 23 (telnet)
2020-06-28 02:04:06
91.121.86.22 attack
SSH bruteforce
2020-06-28 01:54:22
148.252.132.48 attack
invalid login attempt (csserver)
2020-06-28 01:54:37
193.8.82.84 attackbotsspam
2020-06-27T23:37:01.875935hostname sshd[10983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.8.82.84
2020-06-27T23:37:01.826238hostname sshd[10983]: Invalid user alberto from 193.8.82.84 port 33686
2020-06-27T23:37:03.877782hostname sshd[10983]: Failed password for invalid user alberto from 193.8.82.84 port 33686 ssh2
...
2020-06-28 01:47:12
159.203.112.185 attackbotsspam
Jun 27 14:15:18 ncomp sshd[8447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.112.185  user=root
Jun 27 14:15:20 ncomp sshd[8447]: Failed password for root from 159.203.112.185 port 34000 ssh2
Jun 27 14:16:56 ncomp sshd[8463]: Invalid user cy from 159.203.112.185
2020-06-28 01:47:58
23.83.130.141 attackspambots
23.83.130.141 - - [27/Jun/2020:14:16:33 +0200] "GET /awstats.pl?config=chmailorder.com%2Fproducts%2FKeeping-the-Faith-of-Our-Christian-Heritage-by-Hal-Brady%2F429033001&lang=en&output=main HTTP/1.1" 404 280 "https://oraux.pnzone.net/" "Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US) AppleWebKit/537.36 (KHTML, like Gecko) Safari/537.36 VivoBrowser/5.4.0 Chrome/38.0.2125.102,gzip(gfe)"
2020-06-28 02:10:56
139.162.99.58 attack
 TCP (SYN) 139.162.99.58:51238 -> port 808, len 44
2020-06-28 01:50:26
65.34.120.176 attackspambots
2020-06-27T16:16:25.571738galaxy.wi.uni-potsdam.de sshd[10423]: Invalid user test from 65.34.120.176 port 51968
2020-06-27T16:16:25.576955galaxy.wi.uni-potsdam.de sshd[10423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.34.120.176
2020-06-27T16:16:25.571738galaxy.wi.uni-potsdam.de sshd[10423]: Invalid user test from 65.34.120.176 port 51968
2020-06-27T16:16:27.124175galaxy.wi.uni-potsdam.de sshd[10423]: Failed password for invalid user test from 65.34.120.176 port 51968 ssh2
2020-06-27T16:17:31.528191galaxy.wi.uni-potsdam.de sshd[10502]: Invalid user chandra from 65.34.120.176 port 58251
2020-06-27T16:17:31.533678galaxy.wi.uni-potsdam.de sshd[10502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.34.120.176
2020-06-27T16:17:31.528191galaxy.wi.uni-potsdam.de sshd[10502]: Invalid user chandra from 65.34.120.176 port 58251
2020-06-27T16:17:33.472556galaxy.wi.uni-potsdam.de sshd[10502]: Failed passwo
...
2020-06-28 01:39:13
91.121.116.65 attack
"Unauthorized connection attempt on SSHD detected"
2020-06-28 02:10:39
52.130.85.214 attackbots
[ssh] SSH attack
2020-06-28 02:06:21
129.211.94.30 attackbotsspam
Jun 27 12:30:21 askasleikir sshd[40679]: Failed password for root from 129.211.94.30 port 39706 ssh2
2020-06-28 02:12:28
14.33.45.230 attack
Jun 27 19:26:49 home sshd[22278]: Failed password for root from 14.33.45.230 port 42048 ssh2
Jun 27 19:30:26 home sshd[22680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.33.45.230
Jun 27 19:30:28 home sshd[22680]: Failed password for invalid user guest9 from 14.33.45.230 port 41118 ssh2
...
2020-06-28 01:34:02

最近上报的IP列表

232.130.166.59 45.226.8.104 237.115.139.10 118.44.203.168
22.221.112.252 125.255.27.209 87.211.196.38 204.63.149.111
134.185.35.103 208.233.171.98 192.173.117.40 243.124.95.171
218.48.56.215 206.126.22.114 237.212.208.171 20.152.84.86
15.71.36.173 27.58.34.38 54.1.222.176 206.212.140.43