必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.57.12.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40529
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.57.12.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:14:32 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 106.12.57.4.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.12.57.4.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.143.206.71 attackspam
SSH/22 MH Probe, BF, Hack -
2019-08-26 07:09:12
41.190.36.210 attackbotsspam
Aug 26 01:33:03 server sshd\[4561\]: Invalid user contact from 41.190.36.210 port 35528
Aug 26 01:33:03 server sshd\[4561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.36.210
Aug 26 01:33:05 server sshd\[4561\]: Failed password for invalid user contact from 41.190.36.210 port 35528 ssh2
Aug 26 01:38:40 server sshd\[29634\]: Invalid user postgres from 41.190.36.210 port 59207
Aug 26 01:38:40 server sshd\[29634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.36.210
2019-08-26 07:40:05
178.128.121.188 attackbots
Aug 26 01:20:04 lnxded63 sshd[23872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.188
Aug 26 01:20:04 lnxded63 sshd[23872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.188
2019-08-26 07:50:03
111.93.246.170 attackspambots
Aug 25 21:23:02 *** sshd[14988]: Invalid user fax from 111.93.246.170
2019-08-26 07:22:17
212.47.231.189 attackbots
Aug 25 22:30:21 vps01 sshd[16281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.231.189
Aug 25 22:30:23 vps01 sshd[16281]: Failed password for invalid user ann from 212.47.231.189 port 39112 ssh2
2019-08-26 07:34:14
178.216.49.175 attackbotsspam
WordPress XMLRPC scan :: 178.216.49.175 0.164 BYPASS [26/Aug/2019:04:47:17  1000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 382 "https://www.[censored_1]/" "PHP/5.3.82"
2019-08-26 07:09:29
58.211.166.170 attack
Aug 26 00:49:17 herz-der-gamer sshd[14446]: Invalid user guohui from 58.211.166.170 port 55770
...
2019-08-26 07:27:14
49.88.112.90 attackbotsspam
Automated report - ssh fail2ban:
Aug 26 00:57:13 wrong password, user=root, port=40112, ssh2
Aug 26 00:57:17 wrong password, user=root, port=40112, ssh2
Aug 26 00:57:21 wrong password, user=root, port=40112, ssh2
2019-08-26 07:15:00
80.82.77.18 attack
Aug 26 01:34:56 mail postfix/smtpd\[5004\]: warning: unknown\[80.82.77.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 26 01:35:35 mail postfix/smtpd\[10193\]: warning: unknown\[80.82.77.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 26 01:36:11 mail postfix/smtpd\[10217\]: warning: unknown\[80.82.77.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-26 07:49:12
62.99.71.94 attack
Aug 25 23:11:57 vps691689 sshd[17347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.71.94
Aug 25 23:11:58 vps691689 sshd[17347]: Failed password for invalid user amanda from 62.99.71.94 port 57144 ssh2
...
2019-08-26 07:54:56
172.83.40.111 attackspam
[2019-08-2520:45:54 0200]info[webmaild]172.83.40.111-33.0239416210546"GET/rss/order/newHTTP/1.1"FAILEDLOGINwebmaild:invalidwebmailuser33.0239416210546\(has_cpuser_filefailed\)[2019-08-2520:45:55 0200]info[webmaild]172.83.40.111-33.0239416210546"GET/rss/catalog/notifystockHTTP/1.1"FAILEDLOGINwebmaild:invalidwebmailuser33.0239416210546\(has_cpuser_filefailed\)[2019-08-2520:45:57 0200]info[webmaild]172.83.40.111-33.0239416210546"GET/rss/catalog/reviewHTTP/1.1"FAILEDLOGINwebmaild:invalidwebmailuser33.0239416210546\(has_cpuser_filefailed\)[2019-08-2520:45:59 0200]info[webmaild]172.83.40.111-90.7680526899007"GET/dev/rss/order/newHTTP/1.1"FAILEDLOGINwebmaild:invalidwebmailuser90.7680526899007\(has_cpuser_filefailed\)[2019-08-2520:46:00 0200]info[webmaild]172.83.40.111-90.7680526899007"GET/dev/rss/catalog/notifystockHTTP/1.1"FAILEDLOGINwebmaild:invalidwebmailuser90.7680526899007\(has_cpuser_filefailed\)
2019-08-26 07:54:30
138.128.118.133 attackbots
invalid username 'admin'
2019-08-26 07:25:39
45.141.151.47 attackspambots
Aug 26 04:13:50 our-server-hostname postfix/smtpd[22349]: connect from unknown[45.141.151.47]
Aug x@x
Aug x@x
Aug 26 04:13:52 our-server-hostname postfix/smtpd[22349]: B72EDA4000D: client=unknown[45.141.151.47]
Aug 26 04:13:53 our-server-hostname postfix/smtpd[11542]: B2036A40038: client=unknown[127.0.0.1], orig_client=unknown[45.141.151.47]
Aug x@x
Aug x@x
Aug x@x
Aug 26 04:13:54 our-server-hostname postfix/smtpd[22349]: 0231CA4000D: client=unknown[45.141.151.47]
Aug 26 04:13:54 our-server-hostname postfix/smtpd[10222]: 7D509A40038: client=unknown[127.0.0.1], orig_client=unknown[45.141.151.47]
Aug x@x
Aug x@x
Aug x@x
Aug 26 04:13:54 our-server-hostname postfix/smtpd[22349]: C3848A4000D: client=unknown[45.141.151.47]
Aug 26 04:13:55 our-server-hostname postfix/smtpd[11525]: 4F7FBA40038: client=unknown[127.0.0.1], orig_client=unknown[45.141.151.47]
Aug x@x
Aug x@x
Aug x@x
Aug 26 04:13:55 our-server-hostname postfix/smtpd[22349]: 9EC10A4000D: client=unknown[45.141.151.47]........
-------------------------------
2019-08-26 07:31:50
134.209.243.95 attackspambots
Aug 25 22:02:16 vps691689 sshd[15673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.243.95
Aug 25 22:02:18 vps691689 sshd[15673]: Failed password for invalid user 123456 from 134.209.243.95 port 34560 ssh2
Aug 25 22:06:20 vps691689 sshd[15758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.243.95
...
2019-08-26 07:31:01
170.239.85.162 attackspambots
Invalid user upgrade from 170.239.85.162 port 33348
2019-08-26 07:53:06

最近上报的IP列表

207.236.103.103 75.24.124.65 83.188.202.58 192.254.151.92
212.44.203.41 78.148.50.30 153.241.217.199 234.100.255.184
220.197.246.233 96.120.46.229 70.37.79.40 71.132.121.163
126.74.5.172 14.209.104.71 161.171.53.155 48.14.251.206
96.189.60.157 9.4.2.118 25.116.2.219 122.124.177.210