必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.57.42.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.57.42.89.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 01:38:49 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 89.42.57.57.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.42.57.57.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.37.8.91 attackbots
Nov 15 02:15:44 server sshd\[18171\]: Invalid user kendall from 54.37.8.91
Nov 15 02:15:44 server sshd\[18171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.ip-54-37-8.eu 
Nov 15 02:15:46 server sshd\[18171\]: Failed password for invalid user kendall from 54.37.8.91 port 37606 ssh2
Nov 15 02:35:01 server sshd\[22637\]: Invalid user desmond from 54.37.8.91
Nov 15 02:35:01 server sshd\[22637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.ip-54-37-8.eu 
...
2019-11-15 09:03:25
116.7.176.146 attackspambots
Nov 14 20:37:54 firewall sshd[4303]: Invalid user abcdefghijklmnopq from 116.7.176.146
Nov 14 20:37:56 firewall sshd[4303]: Failed password for invalid user abcdefghijklmnopq from 116.7.176.146 port 46502 ssh2
Nov 14 20:42:18 firewall sshd[4375]: Invalid user luis123 from 116.7.176.146
...
2019-11-15 08:51:24
213.136.109.67 attackspam
Nov 15 01:17:48 server sshd\[2891\]: Invalid user odroid from 213.136.109.67
Nov 15 01:17:48 server sshd\[2891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.mugef-ci.com 
Nov 15 01:17:49 server sshd\[2891\]: Failed password for invalid user odroid from 213.136.109.67 port 45948 ssh2
Nov 15 01:34:51 server sshd\[7225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.mugef-ci.com  user=root
Nov 15 01:34:52 server sshd\[7225\]: Failed password for root from 213.136.109.67 port 36402 ssh2
...
2019-11-15 09:05:39
118.24.55.171 attackspam
Failed password for invalid user lieberman from 118.24.55.171 port 49589 ssh2
Invalid user totto from 118.24.55.171 port 22202
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.55.171
Failed password for invalid user totto from 118.24.55.171 port 22202 ssh2
Invalid user guest from 118.24.55.171 port 58784
2019-11-15 08:50:58
194.93.56.74 attack
Nov 12 21:46:43 km20725 sshd[19479]: Invalid user taberos from 194.93.56.74
Nov 12 21:46:43 km20725 sshd[19479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.93.56.74
Nov 12 21:46:45 km20725 sshd[19479]: Failed password for invalid user taberos from 194.93.56.74 port 51898 ssh2
Nov 12 21:46:45 km20725 sshd[19479]: Received disconnect from 194.93.56.74: 11: Bye Bye [preauth]
Nov 12 22:07:55 km20725 sshd[20567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.93.56.74  user=r.r
Nov 12 22:07:57 km20725 sshd[20567]: Failed password for r.r from 194.93.56.74 port 41558 ssh2
Nov 12 22:07:57 km20725 sshd[20567]: Received disconnect from 194.93.56.74: 11: Bye Bye [preauth]
Nov 12 22:13:47 km20725 sshd[21020]: Invalid user amarpree from 194.93.56.74
Nov 12 22:13:47 km20725 sshd[21020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.93.56.74
Nov ........
-------------------------------
2019-11-15 08:40:58
51.83.76.36 attack
$f2bV_matches
2019-11-15 08:54:41
119.196.83.30 attack
Nov 15 05:00:26 XXX sshd[41648]: Invalid user ofsaa from 119.196.83.30 port 36962
2019-11-15 13:09:23
106.12.58.4 attack
Invalid user ketil from 106.12.58.4 port 60028
2019-11-15 08:50:14
125.227.236.60 attack
SSH Brute-Force attacks
2019-11-15 08:51:50
134.175.121.31 attackbotsspam
Nov 15 01:35:02 vps691689 sshd[5707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.121.31
Nov 15 01:35:04 vps691689 sshd[5707]: Failed password for invalid user bermea from 134.175.121.31 port 60104 ssh2
...
2019-11-15 08:52:08
159.89.1.19 attack
schuetzenmusikanten.de 159.89.1.19 \[14/Nov/2019:23:34:53 +0100\] "POST /wp-login.php HTTP/1.1" 200 6379 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
schuetzenmusikanten.de 159.89.1.19 \[14/Nov/2019:23:34:58 +0100\] "POST /wp-login.php HTTP/1.1" 200 6348 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
schuetzenmusikanten.de 159.89.1.19 \[14/Nov/2019:23:34:58 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 4112 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-15 09:01:35
139.199.84.234 attack
Nov 14 13:49:38 hpm sshd\[31633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.84.234  user=mysql
Nov 14 13:49:40 hpm sshd\[31633\]: Failed password for mysql from 139.199.84.234 port 40000 ssh2
Nov 14 13:54:08 hpm sshd\[31990\]: Invalid user wwwrun from 139.199.84.234
Nov 14 13:54:08 hpm sshd\[31990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.84.234
Nov 14 13:54:10 hpm sshd\[31990\]: Failed password for invalid user wwwrun from 139.199.84.234 port 48102 ssh2
2019-11-15 08:48:43
119.188.210.75 attack
Lines containing failures of 119.188.210.75
Nov 14 06:03:35 zabbix sshd[67015]: Invalid user athira from 119.188.210.75 port 43202
Nov 14 06:03:35 zabbix sshd[67015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.188.210.75
Nov 14 06:03:36 zabbix sshd[67015]: Failed password for invalid user athira from 119.188.210.75 port 43202 ssh2
Nov 14 06:03:36 zabbix sshd[67015]: Received disconnect from 119.188.210.75 port 43202:11: Bye Bye [preauth]
Nov 14 06:03:36 zabbix sshd[67015]: Disconnected from invalid user athira 119.188.210.75 port 43202 [preauth]
Nov 14 06:21:46 zabbix sshd[79653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.188.210.75  user=r.r
Nov 14 06:21:49 zabbix sshd[79653]: Failed password for r.r from 119.188.210.75 port 34903 ssh2
Nov 14 06:21:49 zabbix sshd[79653]: Received disconnect from 119.188.210.75 port 34903:11: Bye Bye [preauth]
Nov 14 06:21:49 zabbix sshd[79........
------------------------------
2019-11-15 08:47:14
5.228.232.101 attack
Chat Spam
2019-11-15 08:43:07
101.228.121.216 attack
Login attempts on Synology NAs
2019-11-15 11:51:13

最近上报的IP列表

207.179.6.221 233.188.54.235 2.208.183.41 224.76.192.174
159.52.148.168 70.80.99.179 101.57.187.202 153.27.204.65
15.98.145.9 162.57.79.99 124.192.98.111 169.86.17.95
63.17.13.89 71.249.224.2 189.252.12.110 210.72.128.120
235.164.65.129 217.242.166.72 214.121.193.17 234.245.221.210