必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Roggwil

省份(region): Bern

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.16.212.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39507
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.16.212.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025072500 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 25 16:43:57 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
57.212.16.94.in-addr.arpa domain name pointer 57-212-16-94.dyn.fiber.qlnet.ch.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.212.16.94.in-addr.arpa	name = 57-212-16-94.dyn.fiber.qlnet.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
196.218.110.31 attackspam
Invalid user admin from 196.218.110.31 port 34906
2020-01-19 01:32:40
34.76.135.224 attackbotsspam
Jan 18 18:09:55 v22018076622670303 sshd\[32241\]: Invalid user backuppc from 34.76.135.224 port 46192
Jan 18 18:09:55 v22018076622670303 sshd\[32241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.76.135.224
Jan 18 18:09:58 v22018076622670303 sshd\[32241\]: Failed password for invalid user backuppc from 34.76.135.224 port 46192 ssh2
...
2020-01-19 01:24:46
73.164.118.33 attack
Unauthorized connection attempt detected from IP address 73.164.118.33 to port 2220 [J]
2020-01-19 01:58:53
206.189.137.113 attack
Invalid user user from 206.189.137.113 port 59408
2020-01-19 01:30:28
183.89.215.60 attackbots
Invalid user admin from 183.89.215.60 port 47554
2020-01-19 01:36:34
140.143.222.95 attackspam
Invalid user zy from 140.143.222.95 port 35292
2020-01-19 01:43:16
185.117.154.170 attackspam
Invalid user mouse from 185.117.154.170 port 40464
2020-01-19 01:36:14
80.227.12.38 attackspam
Jan 18 17:19:20 pi sshd[20318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.227.12.38 
Jan 18 17:19:23 pi sshd[20318]: Failed password for invalid user local from 80.227.12.38 port 45590 ssh2
2020-01-19 01:58:32
145.239.89.243 attackspam
Autoban   145.239.89.243 CONNECT/AUTH
2020-01-19 01:42:30
187.189.243.22 attack
Invalid user admin from 187.189.243.22 port 41394
2020-01-19 01:35:20
93.40.7.20 attackspam
Invalid user xray from 93.40.7.20 port 59466
2020-01-19 01:57:45
164.132.80.139 attackbotsspam
Jan 18 18:27:38 dedicated sshd[6877]: Invalid user webmaster from 164.132.80.139 port 34350
2020-01-19 01:40:37
52.66.120.148 attack
Invalid user ubuntu from 52.66.120.148 port 36566
2020-01-19 02:03:01
27.72.138.189 attackspambots
Invalid user admin from 27.72.138.189 port 58700
2020-01-19 01:25:24
106.13.77.243 attack
Unauthorized connection attempt detected from IP address 106.13.77.243 to port 2220 [J]
2020-01-19 01:54:15

最近上报的IP列表

111.30.211.132 119.28.140.106 103.42.243.172 47.250.150.79
160.16.90.62 133.18.163.34 217.154.83.126 45.184.108.222
47.81.37.193 28.250.4.160 104.248.225.137 154.219.93.201
43.166.244.66 8.219.164.76 34.77.37.233 240.62.88.142
45.135.194.31 12.8.9.11 128.199.103.219 47.251.33.142