必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.232.114.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45857
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.232.114.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 14:11:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 58.114.232.64.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 64.232.114.58.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.176.27.94 attackspambots
10/17/2019-09:07:50.263154 185.176.27.94 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-17 16:24:53
170.245.49.126 attack
Oct 15 18:46:49 eola sshd[12841]: Invalid user pi from 170.245.49.126 port 34460
Oct 15 18:46:49 eola sshd[12842]: Invalid user pi from 170.245.49.126 port 34462
Oct 15 18:46:49 eola sshd[12841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.49.126 
Oct 15 18:46:50 eola sshd[12842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.49.126 
Oct 15 18:46:51 eola sshd[12841]: Failed password for invalid user pi from 170.245.49.126 port 34460 ssh2
Oct 15 18:46:52 eola sshd[12841]: Connection closed by 170.245.49.126 port 34460 [preauth]
Oct 15 18:46:52 eola sshd[12842]: Failed password for invalid user pi from 170.245.49.126 port 34462 ssh2
Oct 15 18:46:52 eola sshd[12842]: Connection closed by 170.245.49.126 port 34462 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=170.245.49.126
2019-10-17 16:02:03
104.238.110.156 attackbots
Oct 17 11:16:09 master sshd[26546]: Failed password for invalid user cc from 104.238.110.156 port 60132 ssh2
2019-10-17 16:31:36
185.196.118.119 attackbots
Oct 16 22:13:06 hanapaa sshd\[24145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.196.118.119  user=root
Oct 16 22:13:08 hanapaa sshd\[24145\]: Failed password for root from 185.196.118.119 port 55974 ssh2
Oct 16 22:17:01 hanapaa sshd\[24478\]: Invalid user adm from 185.196.118.119
Oct 16 22:17:01 hanapaa sshd\[24478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.196.118.119
Oct 16 22:17:03 hanapaa sshd\[24478\]: Failed password for invalid user adm from 185.196.118.119 port 38706 ssh2
2019-10-17 16:19:30
221.13.232.37 attackspam
Fail2Ban - FTP Abuse Attempt
2019-10-17 16:11:58
212.154.114.130 attackspam
firewall-block, port(s): 445/tcp
2019-10-17 16:15:15
171.25.193.78 attackbots
2019-10-17T08:02:39.245143abusebot.cloudsearch.cf sshd\[16214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-exit4-readme.dfri.se  user=root
2019-10-17 16:21:18
203.195.149.55 attackbots
$f2bV_matches
2019-10-17 16:22:34
34.94.110.129 botsattack
34.94.110.129 - - [17/Oct/2019:16:03:54 +0800] "GET /wp-includes/SimplePie/XML/Declaration/parser.php?info HTTP/1.1" 301 194 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
34.94.110.129 - - [17/Oct/2019:16:03:54 +0800] "GET /wp-includes/SimplePie/XML/Declaration/parser.php?info HTTP/1.1" 404 232 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
46.80.78.203 - - [17/Oct/2019:16:03:57 +0800] "POST /check-ip/ HTTP/2.0" 302 437 "https://ipinfo.asytech.cn/check-ip/193.46.63.75" "Mozilla/5.0 (Windows NT 6.1; rv:69.0) Gecko/20100101 Firefox/69.0"
34.94.110.129 - - [17/Oct/2019:16:04:02 +0800] "GET /check-ip//authorize_old.php?info HTTP/1.1" 301 194 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
34.94.110.129 - - [17/Oct/2019:16:04:03 +0800] "GET /check-ip//authorize_old.php?info HTTP/1.1" 404 232 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
34.94.110.129 - - [17/Oct/2019:16:04:07 +0800] "GET /check-ip//wp-includes/SimplePie/XML/Declaration/parser.php?info HTTP/1.1" 301 194 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
34.94.110.129 - - [17/Oct/2019:16:04:07 +0800] "GET /check-ip//wp-includes/SimplePie/XML/Declaration/parser.php?info HTTP/1.1" 404 232 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
34.94.110.129 - - [17/Oct/2019:16:04:15 +0800] "GET /authorize_old.php?info HTTP/1.1" 301 194 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
34.94.110.129 - - [17/Oct/2019:16:04:16 +0800] "GET /authorize_old.php?info HTTP/1.1" 404 232 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
34.94.110.129 - - [17/Oct/2019:16:04:21 +0800] "GET /wp-includes/SimplePie/XML/Declaration/parser.php?info HTTP/1.1" 301 194 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
34.94.110.129 - - [17/Oct/2019:16:04:22 +0800] "GET /wp-includes/SimplePie/XML/Declaration/parser.php?info HTTP/1.1" 404 232 "-" "Microsoft Internet Explorer/4.0b1 (Windows 95)"
2019-10-17 16:08:16
73.252.161.153 attack
Oct 17 07:45:56 DAAP sshd[16959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.252.161.153  user=root
Oct 17 07:45:58 DAAP sshd[16959]: Failed password for root from 73.252.161.153 port 46782 ssh2
Oct 17 07:52:07 DAAP sshd[17008]: Invalid user lk from 73.252.161.153 port 43158
Oct 17 07:52:07 DAAP sshd[17008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.252.161.153
Oct 17 07:52:07 DAAP sshd[17008]: Invalid user lk from 73.252.161.153 port 43158
Oct 17 07:52:09 DAAP sshd[17008]: Failed password for invalid user lk from 73.252.161.153 port 43158 ssh2
...
2019-10-17 16:25:47
180.165.1.44 attack
Oct 17 04:05:50 game-panel sshd[30159]: Failed password for root from 180.165.1.44 port 33358 ssh2
Oct 17 04:10:17 game-panel sshd[30393]: Failed password for root from 180.165.1.44 port 42988 ssh2
2019-10-17 16:07:22
5.20.196.90 attackspambots
email spam
2019-10-17 16:12:33
27.16.241.48 attackspam
Oct 16 03:39:38 h2034429 sshd[11807]: Invalid user user from 27.16.241.48
Oct 16 03:39:41 h2034429 sshd[11807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.16.241.48
Oct 16 03:39:43 h2034429 sshd[11807]: Failed password for invalid user user from 27.16.241.48 port 40302 ssh2
Oct 16 03:39:43 h2034429 sshd[11807]: Received disconnect from 27.16.241.48 port 40302:11: Bye Bye [preauth]
Oct 16 03:39:43 h2034429 sshd[11807]: Disconnected from 27.16.241.48 port 40302 [preauth]
Oct 16 03:58:46 h2034429 sshd[11946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.16.241.48  user=r.r
Oct 16 03:58:48 h2034429 sshd[11946]: Failed password for r.r from 27.16.241.48 port 56980 ssh2
Oct 16 03:58:48 h2034429 sshd[11946]: Received disconnect from 27.16.241.48 port 56980:11: Bye Bye [preauth]
Oct 16 03:58:48 h2034429 sshd[11946]: Disconnected from 27.16.241.48 port 56980 [preauth]
Oct 16 04:03:18 h2........
-------------------------------
2019-10-17 16:11:19
104.168.248.96 attackspam
2019-10-17T01:43:23.456648ns525875 sshd\[26407\]: Invalid user jarvia from 104.168.248.96 port 60418
2019-10-17T01:43:23.462895ns525875 sshd\[26407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-619003.hostwindsdns.com
2019-10-17T01:43:24.849385ns525875 sshd\[26407\]: Failed password for invalid user jarvia from 104.168.248.96 port 60418 ssh2
2019-10-17T01:50:20.374217ns525875 sshd\[2469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hwsrv-619003.hostwindsdns.com  user=root
...
2019-10-17 16:33:52
104.236.252.162 attackbotsspam
Oct 17 06:51:33 nextcloud sshd\[29477\]: Invalid user jeffm from 104.236.252.162
Oct 17 06:51:33 nextcloud sshd\[29477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.252.162
Oct 17 06:51:36 nextcloud sshd\[29477\]: Failed password for invalid user jeffm from 104.236.252.162 port 54692 ssh2
...
2019-10-17 16:09:47

最近上报的IP列表

205.253.156.148 40.244.243.33 48.36.198.197 131.140.154.124
231.161.96.170 128.225.113.99 243.205.87.127 147.8.205.176
118.62.54.8 145.148.71.206 47.21.67.254 2.34.143.248
68.92.114.149 71.111.206.172 187.2.134.22 91.91.133.129
73.189.66.199 214.90.203.19 106.90.213.164 21.33.234.161