必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Argentina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.81.164.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9761
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.81.164.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:33:39 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
139.164.81.181.in-addr.arpa domain name pointer host139.181-81-164.telecom.net.ar.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.164.81.181.in-addr.arpa	name = host139.181-81-164.telecom.net.ar.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.196.116.205 attackbotsspam
failed root login
2020-06-27 22:39:18
112.85.42.172 attack
Jun 27 09:14:46 debian sshd[21657]: Unable to negotiate with 112.85.42.172 port 46747: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Jun 27 10:41:07 debian sshd[30455]: Unable to negotiate with 112.85.42.172 port 35633: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-06-27 22:55:12
89.205.68.83 attackbotsspam
Jun 27 08:41:03 Tower sshd[20539]: Connection from 89.205.68.83 port 43080 on 192.168.10.220 port 22 rdomain ""
Jun 27 08:41:05 Tower sshd[20539]: Invalid user suporte from 89.205.68.83 port 43080
Jun 27 08:41:05 Tower sshd[20539]: error: Could not get shadow information for NOUSER
Jun 27 08:41:05 Tower sshd[20539]: Failed password for invalid user suporte from 89.205.68.83 port 43080 ssh2
Jun 27 08:41:05 Tower sshd[20539]: Received disconnect from 89.205.68.83 port 43080:11: Bye Bye [preauth]
Jun 27 08:41:05 Tower sshd[20539]: Disconnected from invalid user suporte 89.205.68.83 port 43080 [preauth]
2020-06-27 22:58:25
93.80.129.190 attack
Jun 27 15:10:39 master sshd[2583]: Failed password for invalid user admin from 93.80.129.190 port 48106 ssh2
2020-06-27 22:31:08
37.187.113.144 attackspam
2020-06-27T15:41:40.197392vps751288.ovh.net sshd\[31235\]: Invalid user est from 37.187.113.144 port 39644
2020-06-27T15:41:40.205164vps751288.ovh.net sshd\[31235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dedi-max.ovh
2020-06-27T15:41:41.524281vps751288.ovh.net sshd\[31235\]: Failed password for invalid user est from 37.187.113.144 port 39644 ssh2
2020-06-27T15:47:03.486529vps751288.ovh.net sshd\[31271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dedi-max.ovh  user=root
2020-06-27T15:47:05.480584vps751288.ovh.net sshd\[31271\]: Failed password for root from 37.187.113.144 port 40766 ssh2
2020-06-27 22:24:50
51.81.118.106 attack
Scanning an empty webserver with deny all robots.txt
2020-06-27 22:45:44
191.255.128.100 attackbotsspam
Automatic report - Port Scan Attack
2020-06-27 22:23:16
185.143.75.81 attack
Jun 27 15:53:47 mail postfix/smtpd\[7256\]: warning: unknown\[185.143.75.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 27 16:24:00 mail postfix/smtpd\[8343\]: warning: unknown\[185.143.75.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 27 16:24:51 mail postfix/smtpd\[8343\]: warning: unknown\[185.143.75.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 27 16:25:41 mail postfix/smtpd\[8366\]: warning: unknown\[185.143.75.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-06-27 22:25:41
170.0.143.81 attackbots
port scan and connect, tcp 23 (telnet)
2020-06-27 22:21:28
114.33.20.159 attackbotsspam
Telnet Server BruteForce Attack
2020-06-27 22:49:54
182.61.170.211 attackspambots
Fail2Ban Ban Triggered
2020-06-27 22:56:01
180.89.58.27 attackbots
Jun 27 15:26:41 h2779839 sshd[560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.89.58.27  user=root
Jun 27 15:26:43 h2779839 sshd[560]: Failed password for root from 180.89.58.27 port 5833 ssh2
Jun 27 15:30:47 h2779839 sshd[595]: Invalid user admin from 180.89.58.27 port 29035
Jun 27 15:30:47 h2779839 sshd[595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.89.58.27
Jun 27 15:30:47 h2779839 sshd[595]: Invalid user admin from 180.89.58.27 port 29035
Jun 27 15:30:50 h2779839 sshd[595]: Failed password for invalid user admin from 180.89.58.27 port 29035 ssh2
Jun 27 15:34:37 h2779839 sshd[615]: Invalid user kubernetes from 180.89.58.27 port 52227
Jun 27 15:34:37 h2779839 sshd[615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.89.58.27
Jun 27 15:34:37 h2779839 sshd[615]: Invalid user kubernetes from 180.89.58.27 port 52227
Jun 27 15:34:39 h2779839 sshd
...
2020-06-27 22:47:33
81.18.67.251 attackbots
Jun 27 13:20:11 ms-srv sshd[37771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.18.67.251
Jun 27 13:20:13 ms-srv sshd[37771]: Failed password for invalid user janice from 81.18.67.251 port 32983 ssh2
2020-06-27 22:57:36
51.255.172.77 attack
Jun 27 15:04:20 cdc sshd[7584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.172.77  user=root
Jun 27 15:04:22 cdc sshd[7584]: Failed password for invalid user root from 51.255.172.77 port 48754 ssh2
2020-06-27 22:31:41
114.40.185.21 attackbots
port scan and connect, tcp 23 (telnet)
2020-06-27 22:42:08

最近上报的IP列表

97.136.26.18 62.133.151.136 250.127.9.72 6.101.168.173
224.144.141.102 163.140.3.215 18.150.160.97 57.81.32.150
123.209.108.115 14.99.154.154 127.135.70.226 30.248.203.121
222.83.199.22 33.48.179.15 187.118.230.16 128.116.89.194
81.98.102.134 40.7.71.221 157.55.178.28 247.50.166.28