必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Ireland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.219.192.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45526
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.219.192.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:04:20 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 34.192.219.57.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.192.219.57.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
142.93.154.90 attack
Unauthorized connection attempt detected from IP address 142.93.154.90 to port 2220 [J]
2020-01-15 20:43:26
222.186.52.189 attackspambots
Unauthorized connection attempt detected from IP address 222.186.52.189 to port 22 [J]
2020-01-15 20:55:21
139.199.165.187 attackbots
5x Failed Password
2020-01-15 20:58:47
46.38.144.32 attack
2020-01-15 00:00:23 -> 2020-01-15 06:00:42 : [46.38.144.32]:6836 connection denied (globally) - 4 login attempts
2020-01-15 20:54:53
93.148.181.194 attackbotsspam
Unauthorized connection attempt detected from IP address 93.148.181.194 to port 2220 [J]
2020-01-15 20:54:26
116.196.79.253 attackspambots
2020-01-15T08:55:54.844192shield sshd\[10457\]: Invalid user david from 116.196.79.253 port 46348
2020-01-15T08:55:54.849215shield sshd\[10457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.79.253
2020-01-15T08:55:56.354090shield sshd\[10457\]: Failed password for invalid user david from 116.196.79.253 port 46348 ssh2
2020-01-15T09:01:42.936047shield sshd\[12463\]: Invalid user packager from 116.196.79.253 port 39382
2020-01-15T09:01:42.941106shield sshd\[12463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.79.253
2020-01-15 21:06:35
198.50.194.17 attackbots
2020-01-15T10:26:24.014558www postfix/smtpd[19553]: warning: ip17.ip-198-50-194.net[198.50.194.17]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-15T10:26:32.266742www postfix/smtpd[19553]: warning: ip17.ip-198-50-194.net[198.50.194.17]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-01-15T10:26:44.147215www postfix/smtpd[19553]: warning: ip17.ip-198-50-194.net[198.50.194.17]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-15 21:03:10
178.128.215.16 attack
Jan 15 13:15:46 vps691689 sshd[14705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16
Jan 15 13:15:49 vps691689 sshd[14705]: Failed password for invalid user deluge from 178.128.215.16 port 33424 ssh2
Jan 15 13:20:27 vps691689 sshd[14958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.215.16
...
2020-01-15 20:48:28
184.105.247.239 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-01-15 21:05:15
156.251.174.241 attackspambots
Jan 15 12:14:47 vpn01 sshd[31891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.251.174.241
Jan 15 12:14:49 vpn01 sshd[31891]: Failed password for invalid user casanova from 156.251.174.241 port 35940 ssh2
...
2020-01-15 20:28:05
36.70.232.164 attackbotsspam
Unauthorized connection attempt from IP address 36.70.232.164 on Port 445(SMB)
2020-01-15 20:30:35
164.68.120.168 attackspam
unauthorized connection attempt
2020-01-15 20:25:41
188.166.34.129 attackbotsspam
Unauthorized connection attempt detected from IP address 188.166.34.129 to port 2220 [J]
2020-01-15 20:58:16
86.247.215.153 attackbots
Unauthorized connection attempt detected from IP address 86.247.215.153 to port 22
2020-01-15 21:05:46
180.183.169.243 attack
unauthorized connection attempt
2020-01-15 20:46:33

最近上报的IP列表

247.92.228.51 159.216.237.186 225.54.62.233 247.16.254.140
16.37.208.173 13.240.32.108 60.144.204.86 13.181.235.44
60.160.15.96 208.164.122.196 228.7.53.206 9.253.23.128
198.0.159.63 130.109.134.231 34.189.245.212 32.58.70.130
253.241.90.51 85.253.34.179 237.132.158.187 144.131.148.122