必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ciudad Real

省份(region): Comunidad Autónoma de Castilla-La Mancha

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.67.104.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.67.104.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 08:05:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
213.104.67.161.in-addr.arpa domain name pointer nodo.red104.uclm.es.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.104.67.161.in-addr.arpa	name = nodo.red104.uclm.es.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.46.163.3 attackspambots
failed_logins
2019-07-16 17:08:25
103.88.48.56 attackspambots
MagicSpam Rule: valid_helo_domain; Spammer IP: 103.88.48.56
2019-07-16 16:50:07
188.165.206.185 attack
[Aegis] @ 2019-07-16 09:14:39  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-07-16 16:44:50
85.209.0.115 attack
Port scan on 6 port(s): 19720 20253 33812 37478 37727 50599
2019-07-16 17:26:25
185.222.211.2 attack
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[185.222.211.2\]\>
Jul 16 10:03:11 relay postfix/smtpd\[16494\]: NOQUEUE: reject: RCPT from unknown\[185.222.211.2\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ p
...
2019-07-16 17:12:22
42.236.139.27 attackbots
Jul 16 05:26:15 rpi sshd[22393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.236.139.27 
Jul 16 05:26:17 rpi sshd[22393]: Failed password for invalid user csgo from 42.236.139.27 port 38938 ssh2
2019-07-16 17:21:11
197.54.168.61 attackbots
Automatic report - Port Scan Attack
2019-07-16 17:22:26
1.162.119.160 attackspambots
Jul 16 11:06:26 core01 sshd\[8312\]: Invalid user java from 1.162.119.160 port 41468
Jul 16 11:06:26 core01 sshd\[8312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.162.119.160
...
2019-07-16 17:10:42
115.73.25.215 attackspambots
Unauthorised access (Jul 16) SRC=115.73.25.215 LEN=52 TTL=111 ID=5950 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-16 17:06:18
200.68.136.223 attackbots
MagicSpam Rule: valid_helo_domain; Spammer IP: 200.68.136.223
2019-07-16 16:52:34
193.9.114.139 attack
Jul 16 10:23:02 MK-Soft-Root2 sshd\[4928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.9.114.139  user=root
Jul 16 10:23:04 MK-Soft-Root2 sshd\[4928\]: Failed password for root from 193.9.114.139 port 35120 ssh2
Jul 16 10:23:06 MK-Soft-Root2 sshd\[4928\]: Failed password for root from 193.9.114.139 port 35120 ssh2
...
2019-07-16 17:12:02
103.88.48.16 attack
MagicSpam Rule: valid_helo_domain; Spammer IP: 103.88.48.16
2019-07-16 16:51:13
188.165.221.36 attack
Time:     Mon Jul 15 21:11:27 2019 -0400
IP:       188.165.221.36 (FR/France/ns3010566.ip-188-165-221.eu)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-07-16 16:57:24
82.64.8.132 attack
Jul 16 09:28:30 shared02 sshd[7516]: Invalid user mao from 82.64.8.132
Jul 16 09:28:30 shared02 sshd[7516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.8.132
Jul 16 09:28:32 shared02 sshd[7516]: Failed password for invalid user mao from 82.64.8.132 port 37144 ssh2
Jul 16 09:28:32 shared02 sshd[7516]: Received disconnect from 82.64.8.132 port 37144:11: Bye Bye [preauth]
Jul 16 09:28:32 shared02 sshd[7516]: Disconnected from 82.64.8.132 port 37144 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=82.64.8.132
2019-07-16 17:09:25
154.121.19.37 attack
MagicSpam Rule: valid_helo_domain; Spammer IP: 154.121.19.37
2019-07-16 17:00:52

最近上报的IP列表

224.196.225.58 74.253.215.231 164.168.148.76 141.72.219.134
63.91.244.182 81.62.3.76 88.70.3.36 27.100.241.137
157.169.146.125 30.62.122.88 243.212.235.203 220.166.107.251
233.163.73.144 237.189.218.11 227.35.201.136 217.36.75.44
156.238.108.16 120.146.171.91 94.85.15.167 99.150.214.189