必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.39.52.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63132
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.39.52.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:45:54 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 81.52.39.168.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.52.39.168.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.89.131.172 attackbots
May  1 00:42:18 srv206 sshd[12928]: Invalid user audio from 159.89.131.172
May  1 00:42:18 srv206 sshd[12928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=brokeredin.com
May  1 00:42:18 srv206 sshd[12928]: Invalid user audio from 159.89.131.172
May  1 00:42:20 srv206 sshd[12928]: Failed password for invalid user audio from 159.89.131.172 port 55114 ssh2
...
2020-05-01 06:56:17
221.6.22.203 attackbotsspam
k+ssh-bruteforce
2020-05-01 06:50:36
150.109.170.84 attackspambots
Honeypot hit.
2020-05-01 06:47:43
210.1.228.35 attack
2020-04-30T22:46:16.511647vps773228.ovh.net sshd[13256]: Failed password for root from 210.1.228.35 port 39856 ssh2
2020-04-30T22:53:41.717249vps773228.ovh.net sshd[13361]: Invalid user user from 210.1.228.35 port 53112
2020-04-30T22:53:41.736070vps773228.ovh.net sshd[13361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.1.228.35
2020-04-30T22:53:41.717249vps773228.ovh.net sshd[13361]: Invalid user user from 210.1.228.35 port 53112
2020-04-30T22:53:43.402874vps773228.ovh.net sshd[13361]: Failed password for invalid user user from 210.1.228.35 port 53112 ssh2
...
2020-05-01 06:35:12
122.51.18.119 attackbotsspam
Apr 30 23:35:10 meumeu sshd[22384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.18.119 
Apr 30 23:35:12 meumeu sshd[22384]: Failed password for invalid user administrator from 122.51.18.119 port 49702 ssh2
Apr 30 23:38:18 meumeu sshd[22876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.18.119 
...
2020-05-01 06:27:17
106.53.75.42 attack
SASL PLAIN auth failed: ruser=...
2020-05-01 06:44:10
94.23.148.235 attack
SSH Invalid Login
2020-05-01 06:49:08
177.242.106.198 attack
Honeypot attack, port: 445, PTR: customer-LEON-MCA-106-198.megared.net.mx.
2020-05-01 06:28:08
212.55.214.194 attackbotsspam
Automatic report - Windows Brute-Force Attack
2020-05-01 06:40:06
160.153.153.142 attackbotsspam
SQL injection attempt.
2020-05-01 06:37:59
164.132.197.108 attackspam
Invalid user ks from 164.132.197.108 port 55570
2020-05-01 06:26:13
34.84.101.187 attackbots
$f2bV_matches
2020-05-01 06:33:14
2604:a880:2:d0::3c6:1 attack
Brute-force general attack.
2020-05-01 06:58:56
71.38.84.147 attackspam
Automatic report - Port Scan Attack
2020-05-01 06:49:29
190.144.119.70 attack
Automatic report - Banned IP Access
2020-05-01 06:33:58

最近上报的IP列表

194.143.137.28 200.60.55.103 132.2.44.113 39.206.33.11
163.97.208.232 231.145.72.241 36.52.92.99 160.181.203.42
140.130.189.18 68.69.32.129 30.177.14.175 124.181.159.29
190.118.184.199 56.55.138.152 127.193.210.38 180.171.228.196
141.210.143.182 190.132.86.216 89.2.25.226 22.144.109.150