必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.199.54.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50699
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.199.54.57.			IN	A

;; AUTHORITY SECTION:
.			236	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 21:52:01 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 57.54.199.222.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 222.199.54.57.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.168.57.109 attackspam
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-11 15:09:09
89.46.196.34 attackbotsspam
2019-09-10T19:15:58.899284mizuno.rwx.ovh sshd[17220]: Connection from 89.46.196.34 port 51902 on 78.46.61.178 port 22
2019-09-10T19:15:59.222253mizuno.rwx.ovh sshd[17220]: Invalid user test3 from 89.46.196.34 port 51902
2019-09-10T19:15:59.230366mizuno.rwx.ovh sshd[17220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.46.196.34
2019-09-10T19:15:58.899284mizuno.rwx.ovh sshd[17220]: Connection from 89.46.196.34 port 51902 on 78.46.61.178 port 22
2019-09-10T19:15:59.222253mizuno.rwx.ovh sshd[17220]: Invalid user test3 from 89.46.196.34 port 51902
2019-09-10T19:16:01.657203mizuno.rwx.ovh sshd[17220]: Failed password for invalid user test3 from 89.46.196.34 port 51902 ssh2
...
2019-09-11 14:19:45
188.19.116.220 attackbots
Sep 11 02:00:40 Tower sshd[41776]: Connection from 188.19.116.220 port 59028 on 192.168.10.220 port 22
Sep 11 02:00:41 Tower sshd[41776]: Invalid user admin1 from 188.19.116.220 port 59028
Sep 11 02:00:41 Tower sshd[41776]: error: Could not get shadow information for NOUSER
Sep 11 02:00:41 Tower sshd[41776]: Failed password for invalid user admin1 from 188.19.116.220 port 59028 ssh2
Sep 11 02:00:42 Tower sshd[41776]: Received disconnect from 188.19.116.220 port 59028:11: Bye Bye [preauth]
Sep 11 02:00:42 Tower sshd[41776]: Disconnected from invalid user admin1 188.19.116.220 port 59028 [preauth]
2019-09-11 14:59:41
106.12.24.234 attack
Sep 10 17:37:46 friendsofhawaii sshd\[30667\]: Invalid user postgres from 106.12.24.234
Sep 10 17:37:46 friendsofhawaii sshd\[30667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.234
Sep 10 17:37:48 friendsofhawaii sshd\[30667\]: Failed password for invalid user postgres from 106.12.24.234 port 37118 ssh2
Sep 10 17:45:30 friendsofhawaii sshd\[31498\]: Invalid user vyatta from 106.12.24.234
Sep 10 17:45:30 friendsofhawaii sshd\[31498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.234
2019-09-11 14:51:16
80.58.157.231 attackspam
Sep 11 06:39:15 MK-Soft-VM4 sshd\[2729\]: Invalid user alexk from 80.58.157.231 port 47781
Sep 11 06:39:15 MK-Soft-VM4 sshd\[2729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.58.157.231
Sep 11 06:39:17 MK-Soft-VM4 sshd\[2729\]: Failed password for invalid user alexk from 80.58.157.231 port 47781 ssh2
...
2019-09-11 15:11:53
185.176.27.190 attack
09/11/2019-00:24:59.610731 185.176.27.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-11 15:10:44
203.70.179.185 attackbots
19/9/10@18:08:19: FAIL: Alarm-Intrusion address from=203.70.179.185
...
2019-09-11 14:20:48
118.166.144.38 attackspam
port 23 attempt blocked
2019-09-11 15:22:04
218.98.26.177 attackspam
Sep 11 05:51:41 *** sshd[17861]: User root from 218.98.26.177 not allowed because not listed in AllowUsers
2019-09-11 14:24:16
194.67.9.186 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-10 17:56:09,127 INFO [amun_request_handler] PortScan Detected on Port: 445 (194.67.9.186)
2019-09-11 14:16:50
206.189.76.64 attackbotsspam
Sep 11 03:49:56 mout sshd[32039]: Invalid user webadm from 206.189.76.64 port 42770
2019-09-11 14:45:25
39.135.1.159 attackbotsspam
CN - 1H : (365)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN9808 
 
 IP : 39.135.1.159 
 
 CIDR : 39.135.1.0/24 
 
 PREFIX COUNT : 3598 
 
 UNIQUE IP COUNT : 18819072 
 
 
 WYKRYTE ATAKI Z ASN9808 :  
  1H - 5 
  3H - 6 
  6H - 7 
 12H - 7 
 24H - 11 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-11 14:36:34
159.89.38.26 attack
Sep 10 20:21:24 lcdev sshd\[4631\]: Invalid user deploy from 159.89.38.26
Sep 10 20:21:24 lcdev sshd\[4631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.38.26
Sep 10 20:21:26 lcdev sshd\[4631\]: Failed password for invalid user deploy from 159.89.38.26 port 48422 ssh2
Sep 10 20:29:49 lcdev sshd\[5385\]: Invalid user invoices from 159.89.38.26
Sep 10 20:29:49 lcdev sshd\[5385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.38.26
2019-09-11 14:34:09
213.14.29.250 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 20r] PortScan Detected on Port: 445 (213.14.29.250)
2019-09-11 15:25:04
218.92.0.181 attack
(sshd) Failed SSH login from 218.92.0.181 (-): 5 in the last 3600 secs
2019-09-11 15:12:57

最近上报的IP列表

20.231.190.154 170.221.232.193 247.140.244.92 187.186.205.195
15.54.9.11 216.133.132.106 173.236.52.35 174.234.96.161
203.118.40.70 129.85.102.228 137.12.200.29 163.187.251.14
133.102.199.35 103.84.224.95 104.44.222.48 198.77.154.245
127.171.79.109 145.143.175.30 185.175.231.246 171.83.117.79