必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Chengdu

省份(region): Sichuan

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.157.55.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.157.55.57.			IN	A

;; AUTHORITY SECTION:
.			418	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023021300 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 13 23:36:32 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
57.55.157.61.in-addr.arpa domain name pointer 57.55.157.61.dial.dy.sc.dynamic.163data.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.55.157.61.in-addr.arpa	name = 57.55.157.61.dial.dy.sc.dynamic.163data.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.106.29.106 attackbotsspam
Port scan on 3 port(s): 9893 9894 9898
2019-08-25 17:29:53
185.156.1.99 attackbotsspam
Aug 25 09:42:00 localhost sshd\[50137\]: Invalid user www from 185.156.1.99 port 45484
Aug 25 09:42:00 localhost sshd\[50137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.156.1.99
Aug 25 09:42:02 localhost sshd\[50137\]: Failed password for invalid user www from 185.156.1.99 port 45484 ssh2
Aug 25 09:46:21 localhost sshd\[50280\]: Invalid user test from 185.156.1.99 port 39993
Aug 25 09:46:21 localhost sshd\[50280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.156.1.99
...
2019-08-25 18:08:42
117.247.233.25 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-25 18:04:53
46.21.100.222 attackspam
Sun 25 02:45:01 123/udp
2019-08-25 18:30:54
45.114.182.54 attack
Unauthorized connection attempt from IP address 45.114.182.54 on Port 445(SMB)
2019-08-25 17:31:46
203.95.212.41 attackspam
Aug 25 10:13:02 hb sshd\[20727\]: Invalid user mysftp from 203.95.212.41
Aug 25 10:13:02 hb sshd\[20727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41
Aug 25 10:13:04 hb sshd\[20727\]: Failed password for invalid user mysftp from 203.95.212.41 port 58989 ssh2
Aug 25 10:20:40 hb sshd\[21341\]: Invalid user admin from 203.95.212.41
Aug 25 10:20:40 hb sshd\[21341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.95.212.41
2019-08-25 18:34:20
106.52.89.128 attackspam
Aug 24 23:23:29 lcprod sshd\[22349\]: Invalid user dummy from 106.52.89.128
Aug 24 23:23:29 lcprod sshd\[22349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.89.128
Aug 24 23:23:32 lcprod sshd\[22349\]: Failed password for invalid user dummy from 106.52.89.128 port 45132 ssh2
Aug 24 23:28:49 lcprod sshd\[22901\]: Invalid user zope from 106.52.89.128
Aug 24 23:28:49 lcprod sshd\[22901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.89.128
2019-08-25 17:40:56
157.230.97.200 attackbots
Aug 25 00:11:49 lcprod sshd\[27044\]: Invalid user gituser from 157.230.97.200
Aug 25 00:11:49 lcprod sshd\[27044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.97.200
Aug 25 00:11:51 lcprod sshd\[27044\]: Failed password for invalid user gituser from 157.230.97.200 port 60022 ssh2
Aug 25 00:15:57 lcprod sshd\[27396\]: Invalid user operator from 157.230.97.200
Aug 25 00:15:57 lcprod sshd\[27396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.97.200
2019-08-25 18:26:33
218.237.64.36 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-25 18:21:35
137.74.47.22 attackspambots
Aug 25 11:36:40 legacy sshd[31528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.47.22
Aug 25 11:36:42 legacy sshd[31528]: Failed password for invalid user mgeweb from 137.74.47.22 port 54746 ssh2
Aug 25 11:40:31 legacy sshd[31665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.47.22
...
2019-08-25 17:55:11
188.79.207.159 attackbotsspam
Automatic report - Port Scan Attack
2019-08-25 17:50:27
142.93.240.79 attackbotsspam
Aug 25 10:06:41 MK-Soft-VM7 sshd\[2692\]: Invalid user monitor from 142.93.240.79 port 48372
Aug 25 10:06:41 MK-Soft-VM7 sshd\[2692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.240.79
Aug 25 10:06:43 MK-Soft-VM7 sshd\[2692\]: Failed password for invalid user monitor from 142.93.240.79 port 48372 ssh2
...
2019-08-25 18:29:28
185.176.27.174 attack
08/25/2019-04:46:02.890964 185.176.27.174 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-25 18:22:14
62.197.207.160 attack
Honeypot attack, port: 23, PTR: ttxd160.ttx-net.sk.
2019-08-25 17:33:59
111.125.208.90 attackbotsspam
Unauthorized connection attempt from IP address 111.125.208.90 on Port 445(SMB)
2019-08-25 17:52:00

最近上报的IP列表

62.230.196.248 60.61.233.31 58.233.235.81 54.41.176.67
98.24.251.64 170.64.129.211 44.140.138.136 40.84.86.119
39.203.49.249 36.54.146.221 31.166.18.194 246.34.60.35
245.165.86.231 242.180.225.58 231.98.197.99 229.91.245.51
228.32.194.4 225.248.185.247 224.17.245.236 221.185.29.219