必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.80.57.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.80.57.173.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 231 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 15:47:17 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 173.57.80.47.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 173.57.80.47.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
149.129.251.152 attackspambots
Sep 11 05:01:52 friendsofhawaii sshd\[30724\]: Invalid user appltest from 149.129.251.152
Sep 11 05:01:52 friendsofhawaii sshd\[30724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.251.152
Sep 11 05:01:54 friendsofhawaii sshd\[30724\]: Failed password for invalid user appltest from 149.129.251.152 port 52086 ssh2
Sep 11 05:09:28 friendsofhawaii sshd\[31490\]: Invalid user admin from 149.129.251.152
Sep 11 05:09:28 friendsofhawaii sshd\[31490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.129.251.152
2019-09-11 23:17:33
178.132.201.205 attackbots
Port scan
2019-09-12 00:13:16
138.68.223.84 attackspambots
firewall-block, port(s): 6379/tcp
2019-09-12 00:20:11
185.244.25.133 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-12 00:07:27
144.217.42.212 attackspambots
Sep 10 22:33:14 sachi sshd\[25939\]: Invalid user ts3 from 144.217.42.212
Sep 10 22:33:14 sachi sshd\[25939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip212.ip-144-217-42.net
Sep 10 22:33:16 sachi sshd\[25939\]: Failed password for invalid user ts3 from 144.217.42.212 port 56629 ssh2
Sep 10 22:38:37 sachi sshd\[26401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip212.ip-144-217-42.net  user=mysql
Sep 10 22:38:40 sachi sshd\[26401\]: Failed password for mysql from 144.217.42.212 port 58041 ssh2
2019-09-11 22:58:04
139.28.218.34 attackbotsspam
VN - 1H : (90)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : VN 
 NAME ASN : ASN9009 
 
 IP : 139.28.218.34 
 
 CIDR : 139.28.218.0/24 
 
 PREFIX COUNT : 1708 
 
 UNIQUE IP COUNT : 749056 
 
 
 WYKRYTE ATAKI Z ASN9009 :  
  1H - 1 
  3H - 3 
  6H - 5 
 12H - 7 
 24H - 9 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-11 23:33:40
103.104.17.139 attackbots
Sep 11 10:39:52 aat-srv002 sshd[20488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.17.139
Sep 11 10:39:54 aat-srv002 sshd[20488]: Failed password for invalid user chris from 103.104.17.139 port 52222 ssh2
Sep 11 10:47:40 aat-srv002 sshd[20762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.17.139
Sep 11 10:47:42 aat-srv002 sshd[20762]: Failed password for invalid user ftpusr from 103.104.17.139 port 34836 ssh2
...
2019-09-11 23:52:37
186.46.131.251 attackbots
Sep 11 13:18:40 mail kernel: [313668.688338] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=186.46.131.251 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=31375 DF PROTO=TCP SPT=53735 DPT=9200 WINDOW=14600 RES=0x00 SYN URGP=0 
Sep 11 13:18:41 mail kernel: [313669.689267] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=186.46.131.251 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=31376 DF PROTO=TCP SPT=53735 DPT=9200 WINDOW=14600 RES=0x00 SYN URGP=0 
Sep 11 13:18:41 mail kernel: [313669.713854] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=186.46.131.251 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=39519 DF PROTO=TCP SPT=48873 DPT=7002 WINDOW=14600 RES=0x00 SYN URGP=0
2019-09-12 00:03:09
89.216.118.71 attackbots
2019-09-11 02:50:47 H=cable-89-216-118-71.static.sbb.rs [89.216.118.71]:36601 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-09-11 02:50:47 H=cable-89-216-118-71.static.sbb.rs [89.216.118.71]:36601 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-09-11 02:50:48 H=cable-89-216-118-71.static.sbb.rs [89.216.118.71]:36601 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/89.216.118.71)
...
2019-09-11 22:44:56
88.198.99.142 attackspambots
Sep 11 17:30:26 mail sshd\[27807\]: Invalid user factorio from 88.198.99.142 port 53368
Sep 11 17:30:26 mail sshd\[27807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.198.99.142
Sep 11 17:30:29 mail sshd\[27807\]: Failed password for invalid user factorio from 88.198.99.142 port 53368 ssh2
Sep 11 17:36:20 mail sshd\[28594\]: Invalid user www-upload from 88.198.99.142 port 42616
Sep 11 17:36:20 mail sshd\[28594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.198.99.142
2019-09-11 23:46:15
107.161.93.57 attackspambots
RU - 1H : (121)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN8100 
 
 IP : 107.161.93.57 
 
 CIDR : 107.161.92.0/22 
 
 PREFIX COUNT : 593 
 
 UNIQUE IP COUNT : 472064 
 
 
 WYKRYTE ATAKI Z ASN8100 :  
  1H - 1 
  3H - 3 
  6H - 3 
 12H - 6 
 24H - 12 
 
 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-11 23:42:27
157.230.146.19 attackspam
Sep 11 22:14:56 webhost01 sshd[20304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.146.19
Sep 11 22:14:59 webhost01 sshd[20304]: Failed password for invalid user debian from 157.230.146.19 port 51774 ssh2
...
2019-09-11 23:31:42
51.77.150.235 attackbots
Sep 11 11:42:40 SilenceServices sshd[25816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.150.235
Sep 11 11:42:42 SilenceServices sshd[25816]: Failed password for invalid user !QAZ1qaz from 51.77.150.235 port 58743 ssh2
Sep 11 11:48:28 SilenceServices sshd[27941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.150.235
2019-09-11 23:18:36
185.244.25.248 attackbotsspam
port 23 attempt blocked
2019-09-12 00:06:56
54.83.91.255 attack
xmlrpc attack
2019-09-11 23:43:52

最近上报的IP列表

5.140.84.41 129.92.223.184 180.98.204.224 157.227.134.25
251.199.190.57 174.143.202.8 204.197.140.15 81.166.14.21
96.31.252.153 167.180.57.166 87.53.106.222 34.168.141.94
221.165.128.228 209.251.75.143 23.255.187.227 205.216.219.144
31.116.23.143 104.240.85.56 160.129.98.94 40.181.219.72