必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.162.234.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.162.234.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 00:12:14 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
21.234.162.58.in-addr.arpa domain name pointer cpe-58-162-234-21.static.qld.asp.telstra.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.234.162.58.in-addr.arpa	name = cpe-58-162-234-21.static.qld.asp.telstra.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.59.22.169 attackbotsspam
Sep 14 08:08:44 wbs sshd\[3525\]: Invalid user carlosfarah from 139.59.22.169
Sep 14 08:08:44 wbs sshd\[3525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.22.169
Sep 14 08:08:46 wbs sshd\[3525\]: Failed password for invalid user carlosfarah from 139.59.22.169 port 37298 ssh2
Sep 14 08:13:26 wbs sshd\[3987\]: Invalid user admin from 139.59.22.169
Sep 14 08:13:26 wbs sshd\[3987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.22.169
2019-09-15 09:14:18
106.12.207.197 attack
ssh failed login
2019-09-15 09:22:03
139.162.77.6 attackspam
proto=tcp  .  spt=47723  .  dpt=3389  .  src=139.162.77.6  .  dst=xx.xx.4.1  .     (listed on Alienvault Sep 14)     (766)
2019-09-15 08:46:57
119.60.29.78 attack
[munged]::80 119.60.29.78 - - [14/Sep/2019:20:13:14 +0200] "POST /[munged]: HTTP/1.1" 200 4214 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.60.29.78 - - [14/Sep/2019:20:13:16 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.60.29.78 - - [14/Sep/2019:20:13:17 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.60.29.78 - - [14/Sep/2019:20:13:19 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.60.29.78 - - [14/Sep/2019:20:13:21 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 119.60.29.78 - - [14/Sep/2019:20:13:22 +0200] "POST
2019-09-15 09:12:12
106.243.162.3 attackbots
Sep 14 15:13:20 kapalua sshd\[29252\]: Invalid user contasys from 106.243.162.3
Sep 14 15:13:20 kapalua sshd\[29252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3
Sep 14 15:13:22 kapalua sshd\[29252\]: Failed password for invalid user contasys from 106.243.162.3 port 50999 ssh2
Sep 14 15:18:20 kapalua sshd\[29711\]: Invalid user teacher from 106.243.162.3
Sep 14 15:18:20 kapalua sshd\[29711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3
2019-09-15 09:27:32
35.134.247.210 attackbotsspam
Sep 14 14:51:24 plusreed sshd[15236]: Invalid user windows from 35.134.247.210
...
2019-09-15 09:02:48
149.56.132.202 attackbotsspam
Sep 14 20:03:22 vtv3 sshd\[26762\]: Invalid user cody from 149.56.132.202 port 37706
Sep 14 20:03:22 vtv3 sshd\[26762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202
Sep 14 20:03:25 vtv3 sshd\[26762\]: Failed password for invalid user cody from 149.56.132.202 port 37706 ssh2
Sep 14 20:07:11 vtv3 sshd\[28736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202  user=root
Sep 14 20:07:13 vtv3 sshd\[28736\]: Failed password for root from 149.56.132.202 port 53938 ssh2
Sep 14 20:19:00 vtv3 sshd\[1968\]: Invalid user cfg from 149.56.132.202 port 46078
Sep 14 20:19:00 vtv3 sshd\[1968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202
Sep 14 20:19:02 vtv3 sshd\[1968\]: Failed password for invalid user cfg from 149.56.132.202 port 46078 ssh2
Sep 14 20:23:09 vtv3 sshd\[4182\]: Invalid user wayne from 149.56.132.202 port 34026
Sep 14 20:23:09 vtv3
2019-09-15 09:22:38
14.162.33.111 attack
Chat Spam
2019-09-15 09:25:54
41.46.91.132 attackbotsspam
Sep 14 18:13:46 marvibiene sshd[37856]: Invalid user admin from 41.46.91.132 port 35246
Sep 14 18:13:46 marvibiene sshd[37856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.46.91.132
Sep 14 18:13:46 marvibiene sshd[37856]: Invalid user admin from 41.46.91.132 port 35246
Sep 14 18:13:48 marvibiene sshd[37856]: Failed password for invalid user admin from 41.46.91.132 port 35246 ssh2
...
2019-09-15 08:57:02
77.83.174.234 attackbotsspam
Sep 14 20:08:56 mc1 kernel: \[1035091.183705\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=77.83.174.234 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=59891 PROTO=TCP SPT=50938 DPT=9440 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 14 20:10:08 mc1 kernel: \[1035162.976951\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=77.83.174.234 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=49692 PROTO=TCP SPT=50938 DPT=8885 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep 14 20:13:51 mc1 kernel: \[1035385.717637\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=77.83.174.234 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=6235 PROTO=TCP SPT=50938 DPT=7047 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-15 08:53:54
193.112.123.100 attack
$f2bV_matches
2019-09-15 09:29:11
94.15.4.86 attack
Sep 15 02:10:57 itv-usvr-02 sshd[29013]: Invalid user ubuntu from 94.15.4.86 port 42952
Sep 15 02:10:57 itv-usvr-02 sshd[29013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.15.4.86
Sep 15 02:10:57 itv-usvr-02 sshd[29013]: Invalid user ubuntu from 94.15.4.86 port 42952
Sep 15 02:10:59 itv-usvr-02 sshd[29013]: Failed password for invalid user ubuntu from 94.15.4.86 port 42952 ssh2
Sep 15 02:14:40 itv-usvr-02 sshd[29029]: Invalid user wow from 94.15.4.86 port 52850
2019-09-15 09:15:55
198.27.90.106 attackbots
Sep 14 21:15:18 TORMINT sshd\[25193\]: Invalid user ubuntu from 198.27.90.106
Sep 14 21:15:18 TORMINT sshd\[25193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.90.106
Sep 14 21:15:20 TORMINT sshd\[25193\]: Failed password for invalid user ubuntu from 198.27.90.106 port 43053 ssh2
...
2019-09-15 09:18:38
148.235.57.184 attackspam
F2B jail: sshd. Time: 2019-09-14 22:48:50, Reported by: VKReport
2019-09-15 08:49:33
95.105.89.221 attackbotsspam
proto=tcp  .  spt=56020  .  dpt=25  .     (listed on Blocklist de  Sep 14)     (763)
2019-09-15 08:54:46

最近上报的IP列表

61.35.155.119 149.188.119.142 221.35.103.179 106.205.126.240
57.22.12.38 253.132.41.168 189.183.156.84 180.191.224.216
219.5.251.148 202.36.154.136 126.27.70.144 200.156.22.168
167.217.165.116 225.46.207.99 252.14.228.128 125.6.199.249
82.244.194.255 98.81.44.200 37.189.98.61 159.88.73.228