必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.75.81.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47641
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.75.81.0.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 06:41:10 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 0.81.75.141.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.81.75.141.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.215.150 attackspam
Automatic report - Banned IP Access
2019-10-06 02:55:31
180.117.126.46 attackbotsspam
firewall-block, port(s): 22/tcp
2019-10-06 03:16:54
125.110.143.143 attackbots
Time:     Sat Oct  5 07:20:39 2019 -0400
IP:       125.110.143.143 (CN/China/-)
Failures: 10 (ftpd)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-10-06 03:22:36
173.72.101.149 attack
firewall-block, port(s): 5915/tcp
2019-10-06 02:59:10
89.250.17.192 attackspam
SpamReport
2019-10-06 03:15:28
154.70.208.66 attackspam
Oct  1 11:49:39 xb3 sshd[2506]: Failed password for invalid user vvv from 154.70.208.66 port 58712 ssh2
Oct  1 11:49:40 xb3 sshd[2506]: Received disconnect from 154.70.208.66: 11: Bye Bye [preauth]
Oct  1 11:58:22 xb3 sshd[5050]: Failed password for invalid user deploy from 154.70.208.66 port 34150 ssh2
Oct  1 11:58:22 xb3 sshd[5050]: Received disconnect from 154.70.208.66: 11: Bye Bye [preauth]
Oct  1 12:03:08 xb3 sshd[5773]: Failed password for invalid user ross from 154.70.208.66 port 45984 ssh2
Oct  1 12:03:08 xb3 sshd[5773]: Received disconnect from 154.70.208.66: 11: Bye Bye [preauth]
Oct  1 12:07:49 xb3 sshd[6303]: Failed password for invalid user weblogic from 154.70.208.66 port 57828 ssh2
Oct  1 12:07:49 xb3 sshd[6303]: Received disconnect from 154.70.208.66: 11: Bye Bye [preauth]
Oct  1 12:12:32 xb3 sshd[8962]: Failed password for invalid user purala from 154.70.208.66 port 41442 ssh2
Oct  1 12:12:32 xb3 sshd[8962]: Received disconnect from 154.70.208.66: 11: ........
-------------------------------
2019-10-06 02:57:59
210.92.91.223 attackspambots
2019-10-05 13:29:26,636 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 210.92.91.223
2019-10-05 14:07:31,608 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 210.92.91.223
2019-10-05 14:46:04,759 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 210.92.91.223
2019-10-05 15:16:12,469 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 210.92.91.223
2019-10-05 15:46:20,089 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 210.92.91.223
...
2019-10-06 03:23:39
141.98.80.81 attackspam
Oct  5 21:14:25 andromeda postfix/smtpd\[1275\]: warning: unknown\[141.98.80.81\]: SASL PLAIN authentication failed: authentication failure
Oct  5 21:14:27 andromeda postfix/smtpd\[5706\]: warning: unknown\[141.98.80.81\]: SASL PLAIN authentication failed: authentication failure
Oct  5 21:14:40 andromeda postfix/smtpd\[5706\]: warning: unknown\[141.98.80.81\]: SASL PLAIN authentication failed: authentication failure
Oct  5 21:14:42 andromeda postfix/smtpd\[1275\]: warning: unknown\[141.98.80.81\]: SASL PLAIN authentication failed: authentication failure
Oct  5 21:14:51 andromeda postfix/smtpd\[5706\]: warning: unknown\[141.98.80.81\]: SASL PLAIN authentication failed: authentication failure
2019-10-06 03:15:01
2.45.112.239 attackbots
firewall-block, port(s): 34567/tcp
2019-10-06 03:21:49
42.118.71.170 attack
(Oct  5)  LEN=40 TTL=48 ID=30370 TCP DPT=8080 WINDOW=41674 SYN 
 (Oct  5)  LEN=40 TTL=48 ID=28312 TCP DPT=8080 WINDOW=14691 SYN 
 (Oct  5)  LEN=40 TTL=48 ID=50707 TCP DPT=8080 WINDOW=41674 SYN 
 (Oct  5)  LEN=40 TTL=47 ID=39474 TCP DPT=8080 WINDOW=1889 SYN 
 (Oct  5)  LEN=40 TTL=47 ID=46633 TCP DPT=8080 WINDOW=11123 SYN 
 (Oct  4)  LEN=40 TTL=47 ID=58341 TCP DPT=8080 WINDOW=14691 SYN 
 (Oct  4)  LEN=40 TTL=47 ID=54420 TCP DPT=8080 WINDOW=41674 SYN 
 (Oct  4)  LEN=40 TTL=47 ID=5878 TCP DPT=8080 WINDOW=1889 SYN 
 (Oct  3)  LEN=40 TTL=47 ID=41453 TCP DPT=8080 WINDOW=1889 SYN 
 (Oct  3)  LEN=40 TTL=47 ID=15772 TCP DPT=8080 WINDOW=14691 SYN 
 (Oct  3)  LEN=40 TTL=47 ID=32302 TCP DPT=8080 WINDOW=11123 SYN 
 (Oct  2)  LEN=40 TTL=47 ID=18497 TCP DPT=8080 WINDOW=1889 SYN 
 (Oct  2)  LEN=40 TTL=47 ID=40806 TCP DPT=8080 WINDOW=41674 SYN 
 (Oct  2)  LEN=40 TTL=47 ID=17804 TCP DPT=8080 WINDOW=1889 SYN 
 (Oct  2)  LEN=40 TTL=47 ID=62609 TCP DPT=8080 WINDOW=41674 SYN 
 (Oct  2)  LEN=40 TTL=47 ID=604...
2019-10-06 02:54:36
223.16.216.92 attack
Oct  5 02:40:13 auw2 sshd\[26422\]: Invalid user Immobilien123 from 223.16.216.92
Oct  5 02:40:13 auw2 sshd\[26422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.16.216.92
Oct  5 02:40:15 auw2 sshd\[26422\]: Failed password for invalid user Immobilien123 from 223.16.216.92 port 56958 ssh2
Oct  5 02:45:00 auw2 sshd\[26829\]: Invalid user Bedienung2017 from 223.16.216.92
Oct  5 02:45:00 auw2 sshd\[26829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.16.216.92
2019-10-06 03:00:15
159.203.201.239 attack
10/05/2019-07:30:14.570633 159.203.201.239 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-06 03:13:45
222.186.175.169 attack
Oct  5 21:25:20 dcd-gentoo sshd[25222]: User root from 222.186.175.169 not allowed because none of user's groups are listed in AllowGroups
Oct  5 21:25:24 dcd-gentoo sshd[25222]: error: PAM: Authentication failure for illegal user root from 222.186.175.169
Oct  5 21:25:20 dcd-gentoo sshd[25222]: User root from 222.186.175.169 not allowed because none of user's groups are listed in AllowGroups
Oct  5 21:25:24 dcd-gentoo sshd[25222]: error: PAM: Authentication failure for illegal user root from 222.186.175.169
Oct  5 21:25:20 dcd-gentoo sshd[25222]: User root from 222.186.175.169 not allowed because none of user's groups are listed in AllowGroups
Oct  5 21:25:24 dcd-gentoo sshd[25222]: error: PAM: Authentication failure for illegal user root from 222.186.175.169
Oct  5 21:25:24 dcd-gentoo sshd[25222]: Failed keyboard-interactive/pam for invalid user root from 222.186.175.169 port 10428 ssh2
...
2019-10-06 03:27:59
167.99.71.142 attack
Oct  5 09:42:14 xtremcommunity sshd\[206080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.71.142  user=root
Oct  5 09:42:16 xtremcommunity sshd\[206080\]: Failed password for root from 167.99.71.142 port 46434 ssh2
Oct  5 09:47:10 xtremcommunity sshd\[206178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.71.142  user=root
Oct  5 09:47:12 xtremcommunity sshd\[206178\]: Failed password for root from 167.99.71.142 port 57910 ssh2
Oct  5 09:51:55 xtremcommunity sshd\[206274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.71.142  user=root
...
2019-10-06 03:14:42
52.137.63.154 attackspambots
Automatic report - Banned IP Access
2019-10-06 03:13:25

最近上报的IP列表

146.65.211.32 92.100.75.110 4.97.183.44 144.213.112.50
40.59.192.234 254.167.122.95 243.184.30.246 21.56.231.150
72.120.25.87 61.140.174.108 107.139.93.230 214.48.110.229
60.210.4.57 123.178.109.49 6.50.41.198 211.139.33.252
162.84.182.69 154.116.179.181 126.239.229.152 142.232.125.12