必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Elk City

省份(region): Oklahoma

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.138.201.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.138.201.162.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 16:45:35 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
162.201.138.57.in-addr.arpa domain name pointer dynamic162-57-138-201.dobsonteleco.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
162.201.138.57.in-addr.arpa	name = dynamic162-57-138-201.dobsonteleco.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
141.98.80.71 attackbotsspam
Nov 12 15:27:52 areeb-Workstation sshd[3911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.71
Nov 12 15:27:55 areeb-Workstation sshd[3911]: Failed password for invalid user admin from 141.98.80.71 port 57982 ssh2
...
2019-11-12 18:55:31
200.29.108.214 attack
Nov 12 09:03:33 meumeu sshd[5153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 
Nov 12 09:03:35 meumeu sshd[5153]: Failed password for invalid user leavelle from 200.29.108.214 port 22497 ssh2
Nov 12 09:07:42 meumeu sshd[5599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214 
...
2019-11-12 18:27:45
185.176.27.102 attackbotsspam
Port scan
2019-11-12 18:23:28
106.12.212.141 attackspambots
Nov 12 07:26:36 tuxlinux sshd[24371]: Invalid user agung from 106.12.212.141 port 39986
Nov 12 07:26:36 tuxlinux sshd[24371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.141 
Nov 12 07:26:36 tuxlinux sshd[24371]: Invalid user agung from 106.12.212.141 port 39986
Nov 12 07:26:36 tuxlinux sshd[24371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.141 
Nov 12 07:26:36 tuxlinux sshd[24371]: Invalid user agung from 106.12.212.141 port 39986
Nov 12 07:26:36 tuxlinux sshd[24371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.141 
Nov 12 07:26:39 tuxlinux sshd[24371]: Failed password for invalid user agung from 106.12.212.141 port 39986 ssh2
...
2019-11-12 18:33:18
213.189.55.85 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-11-12 18:18:37
45.136.109.82 attackspam
Nov 12 10:56:24 mc1 kernel: \[4838863.439063\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.82 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=48002 PROTO=TCP SPT=56799 DPT=8328 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 12 10:58:17 mc1 kernel: \[4838976.493959\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.82 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=48872 PROTO=TCP SPT=56799 DPT=9681 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 12 11:02:58 mc1 kernel: \[4839257.245188\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.82 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=2133 PROTO=TCP SPT=56799 DPT=9199 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-12 18:27:33
207.237.127.163 attack
Connection by 207.237.127.163 on port: 81 got caught by honeypot at 11/12/2019 5:27:11 AM
2019-11-12 18:20:44
45.91.150.48 attack
Postfix RBL failed
2019-11-12 18:48:17
193.77.155.50 attackbotsspam
2019-11-12T08:05:52.174510abusebot-4.cloudsearch.cf sshd\[24160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bsn-77-155-50.static.siol.net  user=root
2019-11-12 18:40:59
144.217.255.89 attack
Nov 11 23:51:55 tdfoods sshd\[15537\]: Invalid user admin from 144.217.255.89
Nov 11 23:51:55 tdfoods sshd\[15537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns542132.ip-144-217-255.net
Nov 11 23:51:57 tdfoods sshd\[15537\]: Failed password for invalid user admin from 144.217.255.89 port 37024 ssh2
Nov 11 23:51:59 tdfoods sshd\[15537\]: Failed password for invalid user admin from 144.217.255.89 port 37024 ssh2
Nov 11 23:52:02 tdfoods sshd\[15537\]: Failed password for invalid user admin from 144.217.255.89 port 37024 ssh2
2019-11-12 18:22:34
172.89.206.82 attackspam
Brainless IDIOT Website Spammer~
2019-11-12 18:47:27
211.235.247.135 attackspambots
Nov 12 04:45:06 ny01 sshd[14281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.235.247.135
Nov 12 04:45:08 ny01 sshd[14281]: Failed password for invalid user password12345677 from 211.235.247.135 port 34070 ssh2
Nov 12 04:49:37 ny01 sshd[14705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.235.247.135
2019-11-12 18:17:45
82.130.15.212 attackbotsspam
Nov 11 10:56:58 nxxxxxxx sshd[15097]: Invalid user server from 82.130.15.212
Nov 11 10:56:59 nxxxxxxx sshd[15097]: Failed password for invalid user server from 82.130.15.212 port 35742 ssh2
Nov 11 10:56:59 nxxxxxxx sshd[15097]: Received disconnect from 82.130.15.212: 11: Bye Bye [preauth]
Nov 11 11:19:19 nxxxxxxx sshd[16960]: Failed password for r.r from 82.130.15.212 port 58212 ssh2
Nov 11 11:19:19 nxxxxxxx sshd[16960]: Received disconnect from 82.130.15.212: 11: Bye Bye [preauth]
Nov 11 11:22:51 nxxxxxxx sshd[17293]: Invalid user trendimsa1.0 from 82.130.15.212
Nov 11 11:22:53 nxxxxxxx sshd[17293]: Failed password for invalid user trendimsa1.0 from 82.130.15.212 port 40452 ssh2
Nov 11 11:22:53 nxxxxxxx sshd[17293]: Received disconnect from 82.130.15.212: 11: Bye Bye [preauth]
Nov 11 11:26:31 nxxxxxxx sshd[17619]: Invalid user guest from 82.130.15.212
Nov 11 11:26:34 nxxxxxxx sshd[17619]: Failed password for invalid user guest from 82.130.15.212 port 53266 ssh2
Nov 11 ........
-------------------------------
2019-11-12 18:36:45
123.195.99.9 attackspam
$f2bV_matches
2019-11-12 18:26:10
123.30.240.39 attack
$f2bV_matches
2019-11-12 18:34:50

最近上报的IP列表

67.26.124.189 135.92.165.248 213.252.23.81 241.201.239.142
203.211.204.11 32.237.9.106 167.193.88.219 109.58.67.108
215.81.127.255 50.34.36.201 148.61.201.23 33.188.232.184
191.191.144.35 79.186.241.95 248.124.64.105 191.160.93.208
98.65.117.210 65.96.243.178 79.120.30.209 168.58.171.169