必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Ireland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.195.42.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11645
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.195.42.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 20:26:37 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 138.42.195.57.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.42.195.57.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
199.195.252.213 attack
Dec 25 10:50:00 vibhu-HP-Z238-Microtower-Workstation sshd\[13859\]: Invalid user cpa from 199.195.252.213
Dec 25 10:50:00 vibhu-HP-Z238-Microtower-Workstation sshd\[13859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
Dec 25 10:50:02 vibhu-HP-Z238-Microtower-Workstation sshd\[13859\]: Failed password for invalid user cpa from 199.195.252.213 port 32824 ssh2
Dec 25 10:52:07 vibhu-HP-Z238-Microtower-Workstation sshd\[14026\]: Invalid user nobody8888 from 199.195.252.213
Dec 25 10:52:07 vibhu-HP-Z238-Microtower-Workstation sshd\[14026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
...
2019-12-25 14:03:05
79.120.60.206 attackspambots
firewall-block, port(s): 4589/tcp
2019-12-25 13:53:35
222.186.180.41 attackbotsspam
12/25/2019-01:09:42.891884 222.186.180.41 Protocol: 6 ET SCAN Potential SSH Scan
2019-12-25 14:12:51
60.210.40.197 attack
$f2bV_matches
2019-12-25 14:08:41
138.197.179.111 attackbotsspam
Dec 25 06:28:23 [host] sshd[30281]: Invalid user culbreth from 138.197.179.111
Dec 25 06:28:23 [host] sshd[30281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.111
Dec 25 06:28:25 [host] sshd[30281]: Failed password for invalid user culbreth from 138.197.179.111 port 34528 ssh2
2019-12-25 13:55:09
192.99.70.208 attack
$f2bV_matches
2019-12-25 13:47:42
89.122.208.9 attackbots
Automatic report - Port Scan Attack
2019-12-25 14:22:54
14.162.146.156 attack
Unauthorized connection attempt detected from IP address 14.162.146.156 to port 445
2019-12-25 14:19:03
125.215.207.40 attackbotsspam
Invalid user jessica from 125.215.207.40 port 57121
2019-12-25 14:19:32
222.186.173.180 attackspambots
Dec 25 13:21:11 lcl-usvr-02 sshd[18710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
Dec 25 13:21:13 lcl-usvr-02 sshd[18710]: Failed password for root from 222.186.173.180 port 49862 ssh2
...
2019-12-25 14:24:39
165.227.80.35 attackspambots
WordPress wp-login brute force :: 165.227.80.35 0.112 - [25/Dec/2019:04:56:45  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2019-12-25 14:02:45
182.61.23.89 attackbots
Dec 25 05:52:53 minden010 sshd[25020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.23.89
Dec 25 05:52:55 minden010 sshd[25020]: Failed password for invalid user donetta from 182.61.23.89 port 55596 ssh2
Dec 25 05:57:05 minden010 sshd[26425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.23.89
...
2019-12-25 13:48:49
58.60.1.29 attackspam
Automatic report - Banned IP Access
2019-12-25 13:58:37
103.238.71.121 attackbotsspam
1577249776 - 12/25/2019 05:56:16 Host: 103.238.71.121/103.238.71.121 Port: 445 TCP Blocked
2019-12-25 14:18:05
222.186.169.192 attackbotsspam
Dec 25 07:02:49 ks10 sshd[8087]: Failed password for root from 222.186.169.192 port 33188 ssh2
Dec 25 07:02:54 ks10 sshd[8087]: Failed password for root from 222.186.169.192 port 33188 ssh2
...
2019-12-25 14:04:30

最近上报的IP列表

114.37.166.144 54.233.233.190 15.220.227.23 38.7.51.15
19.30.95.33 55.4.72.94 57.218.83.71 115.225.141.250
129.23.138.193 40.134.152.84 97.207.69.103 255.138.35.226
168.169.145.173 141.23.143.45 51.27.241.108 240.29.234.222
156.246.161.31 137.76.122.116 25.170.148.101 150.21.150.248