必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.115.139.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.115.139.57.			IN	A

;; AUTHORITY SECTION:
.			109	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020302 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 04 10:57:28 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 57.139.115.244.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.139.115.244.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.143.221.46 attack
scans 3 times in preceeding hours on the ports (in chronological order) 5222 9922 10100
2020-07-06 23:08:45
157.245.163.0 attackspambots
*Port Scan* detected from 157.245.163.0 (US/United States/California/Santa Clara/-). 4 hits in the last 135 seconds
2020-07-06 23:13:43
180.149.125.141 attack
probes 4 times on the port 8888
2020-07-06 23:11:26
92.63.197.55 attackbots
scans once in preceeding hours on the ports (in chronological order) 3711 resulting in total of 17 scans from 92.63.192.0/20 block.
2020-07-06 23:27:02
174.138.64.163 attack
scans 2 times in preceeding hours on the ports (in chronological order) 7902 7902
2020-07-06 23:11:53
46.35.19.18 attackbotsspam
Jul  6 16:13:52 meumeu sshd[638392]: Invalid user factorio from 46.35.19.18 port 33401
Jul  6 16:13:52 meumeu sshd[638392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.19.18 
Jul  6 16:13:52 meumeu sshd[638392]: Invalid user factorio from 46.35.19.18 port 33401
Jul  6 16:13:54 meumeu sshd[638392]: Failed password for invalid user factorio from 46.35.19.18 port 33401 ssh2
Jul  6 16:18:21 meumeu sshd[638598]: Invalid user xcy from 46.35.19.18 port 60660
Jul  6 16:18:21 meumeu sshd[638598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.19.18 
Jul  6 16:18:21 meumeu sshd[638598]: Invalid user xcy from 46.35.19.18 port 60660
Jul  6 16:18:24 meumeu sshd[638598]: Failed password for invalid user xcy from 46.35.19.18 port 60660 ssh2
Jul  6 16:22:36 meumeu sshd[638721]: Invalid user cookie from 46.35.19.18 port 59694
...
2020-07-06 22:48:55
45.148.10.217 attackbotsspam
Jul  6 15:32:22 mail postfix/smtpd\[24268\]: warning: unknown\[45.148.10.217\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  6 15:32:28 mail postfix/smtpd\[24268\]: warning: unknown\[45.148.10.217\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jul  6 16:08:40 mail postfix/smtpd\[25137\]: warning: unknown\[45.148.10.217\]: SASL LOGIN authentication failed: VXNlcm5hbWU6\
Jul  6 16:08:46 mail postfix/smtpd\[25137\]: warning: unknown\[45.148.10.217\]: SASL LOGIN authentication failed: VXNlcm5hbWU6\
2020-07-06 23:02:47
107.181.174.74 attackbotsspam
2020-07-06T12:51:01.677084shield sshd\[9115\]: Invalid user prasad from 107.181.174.74 port 54630
2020-07-06T12:51:01.681693shield sshd\[9115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.181.174.74
2020-07-06T12:51:03.731113shield sshd\[9115\]: Failed password for invalid user prasad from 107.181.174.74 port 54630 ssh2
2020-07-06T12:55:29.751284shield sshd\[11206\]: Invalid user client from 107.181.174.74 port 53852
2020-07-06T12:55:29.755722shield sshd\[11206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.181.174.74
2020-07-06 23:01:07
180.124.77.116 attackspambots
2020-07-06 22:49:50
45.138.74.217 attackspam
2020-07-06 22:47:35
193.169.212.191 attack
2020-07-06 22:47:56
193.169.252.21 attack
 UDP 193.169.252.21:33331 -> port 6881, len 119
2020-07-06 23:07:24
183.136.225.45 attackspam
 TCP (SYN) 183.136.225.45:61933 -> port 1443, len 44
2020-07-06 23:09:34
185.156.73.60 attack
scans 16 times in preceeding hours on the ports (in chronological order) 9999 10001 3393 3392 3395 3390 32389 50000 33898 33899 33890 3391 63389 55555 3388 3380 resulting in total of 79 scans from 185.156.72.0/22 block.
2020-07-06 23:23:35
185.175.93.14 attackspambots
scans 11 times in preceeding hours on the ports (in chronological order) 62222 8390 10900 63391 23000 8989 8689 7788 5333 14141 4500 resulting in total of 25 scans from 185.175.93.0/24 block.
2020-07-06 23:23:01

最近上报的IP列表

131.240.84.11 70.167.240.228 41.107.68.209 98.204.248.132
75.37.9.27 136.0.185.2 78.235.195.134 21.37.157.197
9.59.13.169 28.65.171.136 229.64.236.27 56.192.35.167
51.178.16.33 250.183.102.46 143.255.126.5 134.249.66.107
174.253.1.118 54.58.120.218 250.202.113.190 241.106.96.124