必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Saint Vincent and the Grenadines

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.74.121.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.74.121.229.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:23:11 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 229.121.74.57.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 229.121.74.57.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.165.51.121 attack
445/tcp 445/tcp
[2019-08-11/09-08]2pkt
2019-09-09 09:15:03
86.127.20.241 attack
CloudCIX Reconnaissance Scan Detected, PTR: 86-127-20-241.rdsnet.ro.
2019-09-09 08:41:12
218.68.204.18 attack
09.09.2019 01:29:12 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-09-09 09:18:03
118.24.57.53 attackbotsspam
Sep  9 01:45:18 SilenceServices sshd[2624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.57.53
Sep  9 01:45:21 SilenceServices sshd[2624]: Failed password for invalid user tomcat from 118.24.57.53 port 48142 ssh2
Sep  9 01:48:25 SilenceServices sshd[5002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.57.53
2019-09-09 09:10:06
192.227.136.69 attackspam
Sep  9 03:29:05 server sshd\[18355\]: Invalid user tom from 192.227.136.69 port 39258
Sep  9 03:29:05 server sshd\[18355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.136.69
Sep  9 03:29:06 server sshd\[18355\]: Failed password for invalid user tom from 192.227.136.69 port 39258 ssh2
Sep  9 03:34:28 server sshd\[409\]: Invalid user debian from 192.227.136.69 port 54420
Sep  9 03:34:28 server sshd\[409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.136.69
2019-09-09 08:36:31
175.171.244.120 attackbotsspam
22/tcp
[2019-09-08]1pkt
2019-09-09 08:53:15
13.79.144.183 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-09-09 08:54:44
193.112.27.92 attackbotsspam
Sep  9 00:20:43 localhost sshd\[100896\]: Invalid user uftp from 193.112.27.92 port 60172
Sep  9 00:20:43 localhost sshd\[100896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.92
Sep  9 00:20:45 localhost sshd\[100896\]: Failed password for invalid user uftp from 193.112.27.92 port 60172 ssh2
Sep  9 00:34:12 localhost sshd\[101268\]: Invalid user test from 193.112.27.92 port 60548
Sep  9 00:34:12 localhost sshd\[101268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.92
...
2019-09-09 08:52:18
194.96.90.239 attack
Sep  8 21:29:04 ubuntu-2gb-fsn1-1 sshd[9047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.96.90.239
Sep  8 21:29:05 ubuntu-2gb-fsn1-1 sshd[9049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.96.90.239
...
2019-09-09 09:09:01
54.37.69.113 attackspambots
Sep  9 00:47:52 hb sshd\[32582\]: Invalid user hduser from 54.37.69.113
Sep  9 00:47:52 hb sshd\[32582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.ip-54-37-69.eu
Sep  9 00:47:54 hb sshd\[32582\]: Failed password for invalid user hduser from 54.37.69.113 port 37347 ssh2
Sep  9 00:53:20 hb sshd\[652\]: Invalid user user2 from 54.37.69.113
Sep  9 00:53:20 hb sshd\[652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.ip-54-37-69.eu
2019-09-09 09:04:55
190.64.137.171 attackbotsspam
Sep  9 04:23:59 areeb-Workstation sshd[11484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.137.171
Sep  9 04:24:01 areeb-Workstation sshd[11484]: Failed password for invalid user test from 190.64.137.171 port 55884 ssh2
...
2019-09-09 09:16:00
37.59.110.165 attackbotsspam
Sep  9 01:55:59 tux-35-217 sshd\[26397\]: Invalid user admin from 37.59.110.165 port 53448
Sep  9 01:55:59 tux-35-217 sshd\[26397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.110.165
Sep  9 01:56:01 tux-35-217 sshd\[26397\]: Failed password for invalid user admin from 37.59.110.165 port 53448 ssh2
Sep  9 02:01:18 tux-35-217 sshd\[26445\]: Invalid user ts from 37.59.110.165 port 59280
Sep  9 02:01:18 tux-35-217 sshd\[26445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.110.165
...
2019-09-09 09:05:34
89.109.23.190 attack
Sep  9 02:34:58 eventyay sshd[13736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.23.190
Sep  9 02:34:59 eventyay sshd[13736]: Failed password for invalid user minecraft1 from 89.109.23.190 port 45054 ssh2
Sep  9 02:39:25 eventyay sshd[13813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.23.190
...
2019-09-09 08:43:12
61.238.109.121 attack
Sep  8 22:20:51 pkdns2 sshd\[58436\]: Invalid user amsftp from 61.238.109.121Sep  8 22:20:53 pkdns2 sshd\[58436\]: Failed password for invalid user amsftp from 61.238.109.121 port 52550 ssh2Sep  8 22:24:47 pkdns2 sshd\[58596\]: Invalid user guest from 61.238.109.121Sep  8 22:24:49 pkdns2 sshd\[58596\]: Failed password for invalid user guest from 61.238.109.121 port 38310 ssh2Sep  8 22:28:54 pkdns2 sshd\[58791\]: Invalid user sysadmin from 61.238.109.121Sep  8 22:28:56 pkdns2 sshd\[58791\]: Failed password for invalid user sysadmin from 61.238.109.121 port 52308 ssh2
...
2019-09-09 09:16:33
89.19.180.249 attackbotsspam
23/tcp 23/tcp
[2019-07-10/09-08]2pkt
2019-09-09 09:20:18

最近上报的IP列表

241.146.154.25 103.5.233.15 71.117.181.200 183.215.53.231
25.35.13.110 201.198.201.228 124.23.142.153 246.151.102.217
82.164.24.70 144.103.98.222 37.44.249.192 222.197.127.78
36.226.189.87 200.15.148.196 217.186.132.202 170.201.38.220
248.177.45.102 177.12.135.92 20.83.113.250 123.186.102.54