必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Amanuma

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.93.80.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.93.80.157.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025042701 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 28 03:30:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
157.80.93.58.in-addr.arpa domain name pointer i58-93-80-157.s41.a013.ap.plala.or.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.80.93.58.in-addr.arpa	name = i58-93-80-157.s41.a013.ap.plala.or.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.196.94.211 attack
Bruteforce detected by fail2ban
2020-05-12 02:24:15
122.51.130.21 attack
$f2bV_matches
2020-05-12 02:21:18
159.89.142.25 attackbots
Lines containing failures of 159.89.142.25
May 11 13:26:38 shared01 sshd[4080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.142.25  user=admin
May 11 13:26:39 shared01 sshd[4080]: Failed password for admin from 159.89.142.25 port 48062 ssh2
May 11 13:26:40 shared01 sshd[4080]: Received disconnect from 159.89.142.25 port 48062:11: Bye Bye [preauth]
May 11 13:26:40 shared01 sshd[4080]: Disconnected from authenticating user admin 159.89.142.25 port 48062 [preauth]
May 11 14:00:32 shared01 sshd[17275]: Invalid user applprod from 159.89.142.25 port 60250
May 11 14:00:32 shared01 sshd[17275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.142.25
May 11 14:00:33 shared01 sshd[17275]: Failed password for invalid user applprod from 159.89.142.25 port 60250 ssh2
May 11 14:00:34 shared01 sshd[17275]: Received disconnect from 159.89.142.25 port 60250:11: Bye Bye [preauth]
May 11 14:00:........
------------------------------
2020-05-12 02:17:48
110.8.67.146 attack
Total attacks: 2
2020-05-12 02:01:34
66.36.234.74 attackbots
[2020-05-11 13:53:32] NOTICE[1157][C-000032e3] chan_sip.c: Call from '' (66.36.234.74:55596) to extension '901146406820596' rejected because extension not found in context 'public'.
[2020-05-11 13:53:32] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-11T13:53:32.714-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146406820596",SessionID="0x7f5f10905838",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/66.36.234.74/55596",ACLName="no_extension_match"
[2020-05-11 13:55:04] NOTICE[1157][C-000032e6] chan_sip.c: Call from '' (66.36.234.74:50588) to extension '801146406820596' rejected because extension not found in context 'public'.
[2020-05-11 13:55:04] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-11T13:55:04.374-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="801146406820596",SessionID="0x7f5f106f5588",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/66.
...
2020-05-12 01:59:24
222.186.173.215 attackbotsspam
May 11 20:09:16 server sshd[37393]: Failed none for root from 222.186.173.215 port 57816 ssh2
May 11 20:09:19 server sshd[37393]: Failed password for root from 222.186.173.215 port 57816 ssh2
May 11 20:09:23 server sshd[37393]: Failed password for root from 222.186.173.215 port 57816 ssh2
2020-05-12 02:12:55
171.247.128.110 attackspambots
May 11 14:03:16 ArkNodeAT sshd\[17050\]: Invalid user sniffer from 171.247.128.110
May 11 14:03:16 ArkNodeAT sshd\[17050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.247.128.110
May 11 14:03:19 ArkNodeAT sshd\[17050\]: Failed password for invalid user sniffer from 171.247.128.110 port 61217 ssh2
2020-05-12 02:20:05
113.179.29.88 attack
Lines containing failures of 113.179.29.88
May 11 13:56:01 mx-in-02 sshd[9883]: Did not receive identification string from 113.179.29.88 port 61546
May 11 13:56:05 mx-in-02 sshd[9884]: Invalid user ubnt from 113.179.29.88 port 61802
May 11 13:56:06 mx-in-02 sshd[9884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.179.29.88 
May 11 13:56:08 mx-in-02 sshd[9884]: Failed password for invalid user ubnt from 113.179.29.88 port 61802 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.179.29.88
2020-05-12 02:23:03
40.112.62.127 attack
Time:     Mon May 11 12:26:53 2020 -0300
IP:       40.112.62.127 (US/United States/-)
Failures: 20 (WordPressBruteForcePOST)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-05-12 02:19:14
180.76.103.63 attackspambots
May 11 16:12:13 minden010 sshd[11150]: Failed password for root from 180.76.103.63 port 47386 ssh2
May 11 16:17:24 minden010 sshd[13820]: Failed password for root from 180.76.103.63 port 43518 ssh2
May 11 16:21:57 minden010 sshd[15317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.103.63
...
2020-05-12 01:50:16
59.27.78.16 attackspam
May 11 14:04:01 debian-2gb-nbg1-2 kernel: \[11457509.158027\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=59.27.78.16 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=48030 PROTO=TCP SPT=50931 DPT=23 WINDOW=52179 RES=0x00 SYN URGP=0
2020-05-12 01:53:13
51.254.32.133 attackspambots
2020-05-11T17:36:10.341840abusebot-7.cloudsearch.cf sshd[21627]: Invalid user csgoserver from 51.254.32.133 port 52444
2020-05-11T17:36:10.348551abusebot-7.cloudsearch.cf sshd[21627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.ip-51-254-32.eu
2020-05-11T17:36:10.341840abusebot-7.cloudsearch.cf sshd[21627]: Invalid user csgoserver from 51.254.32.133 port 52444
2020-05-11T17:36:11.945329abusebot-7.cloudsearch.cf sshd[21627]: Failed password for invalid user csgoserver from 51.254.32.133 port 52444 ssh2
2020-05-11T17:39:40.987130abusebot-7.cloudsearch.cf sshd[21841]: Invalid user gmodserver from 51.254.32.133 port 55768
2020-05-11T17:39:40.996781abusebot-7.cloudsearch.cf sshd[21841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.ip-51-254-32.eu
2020-05-11T17:39:40.987130abusebot-7.cloudsearch.cf sshd[21841]: Invalid user gmodserver from 51.254.32.133 port 55768
2020-05-11T17:39:42.927877abusebot
...
2020-05-12 02:16:50
61.72.255.26 attackbotsspam
May 11 06:01:01 server1 sshd\[10923\]: Invalid user admin from 61.72.255.26
May 11 06:01:01 server1 sshd\[10923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.72.255.26 
May 11 06:01:03 server1 sshd\[10923\]: Failed password for invalid user admin from 61.72.255.26 port 59856 ssh2
May 11 06:03:36 server1 sshd\[11647\]: Invalid user oracle from 61.72.255.26
May 11 06:03:36 server1 sshd\[11647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.72.255.26 
...
2020-05-12 02:16:18
165.22.234.212 attackbots
" "
2020-05-12 02:03:24
167.172.175.9 attackspam
May 11 16:37:45 ns3033917 sshd[22200]: Invalid user ykim from 167.172.175.9 port 39438
May 11 16:37:47 ns3033917 sshd[22200]: Failed password for invalid user ykim from 167.172.175.9 port 39438 ssh2
May 11 16:43:50 ns3033917 sshd[22307]: Invalid user admin from 167.172.175.9 port 46322
...
2020-05-12 02:31:35

最近上报的IP列表

113.215.189.233 18.118.23.137 49.149.76.137 89.226.146.255
190.43.92.188 185.19.234.194 193.71.81.3 5.241.186.222
124.165.83.143 113.215.188.43 113.215.189.242 218.38.30.13
218.38.30.16 215.6.146.30 238.163.81.252 20.118.208.198
150.197.32.231 245.156.90.194 167.94.146.56 84.220.241.104