必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.129.81.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2295
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.129.81.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:46:07 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 48.81.129.197.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.81.129.197.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.249.64.82 attackspam
Automatic report - Banned IP Access
2020-09-14 07:13:33
116.74.23.83 attackbots
IP 116.74.23.83 attacked honeypot on port: 23 at 9/13/2020 9:55:48 AM
2020-09-14 07:05:56
117.50.8.2 attackspambots
Sep 12 05:22:21 efa1 sshd[12427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.8.2  user=r.r
Sep 12 05:22:23 efa1 sshd[12427]: Failed password for r.r from 117.50.8.2 port 34238 ssh2
Sep 12 05:28:33 efa1 sshd[14564]: Invalid user mailman from 117.50.8.2
Sep 12 05:28:33 efa1 sshd[14564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.8.2 
Sep 12 05:28:35 efa1 sshd[14564]: Failed password for invalid user mailman from 117.50.8.2 port 44784 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.50.8.2
2020-09-14 07:00:05
180.168.141.246 attack
Sep 14 00:54:04 vps639187 sshd\[11774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.141.246  user=root
Sep 14 00:54:06 vps639187 sshd\[11774\]: Failed password for root from 180.168.141.246 port 54474 ssh2
Sep 14 00:56:48 vps639187 sshd\[11817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.141.246  user=root
...
2020-09-14 07:22:37
217.218.190.236 attackbotsspam
20/9/13@12:56:11: FAIL: Alarm-Network address from=217.218.190.236
20/9/13@12:56:11: FAIL: Alarm-Network address from=217.218.190.236
...
2020-09-14 07:00:24
185.220.103.6 attack
Time:     Mon Sep 14 00:07:28 2020 +0200
IP:       185.220.103.6 (DE/Germany/karensilkwood.tor-exit.calyxinstitute.org)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 14 00:07:14 ca-3-ams1 sshd[4237]: Failed password for root from 185.220.103.6 port 46052 ssh2
Sep 14 00:07:16 ca-3-ams1 sshd[4237]: Failed password for root from 185.220.103.6 port 46052 ssh2
Sep 14 00:07:18 ca-3-ams1 sshd[4237]: Failed password for root from 185.220.103.6 port 46052 ssh2
Sep 14 00:07:21 ca-3-ams1 sshd[4237]: Failed password for root from 185.220.103.6 port 46052 ssh2
Sep 14 00:07:24 ca-3-ams1 sshd[4237]: Failed password for root from 185.220.103.6 port 46052 ssh2
2020-09-14 07:10:17
179.217.63.192 attack
(sshd) Failed SSH login from 179.217.63.192 (BR/Brazil/b3d93fc0.virtua.com.br): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 13 16:10:59 optimus sshd[28671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.217.63.192  user=root
Sep 13 16:11:01 optimus sshd[28671]: Failed password for root from 179.217.63.192 port 58276 ssh2
Sep 13 16:27:37 optimus sshd[1276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.217.63.192  user=root
Sep 13 16:27:38 optimus sshd[1276]: Failed password for root from 179.217.63.192 port 36436 ssh2
Sep 13 16:31:52 optimus sshd[2478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.217.63.192  user=root
2020-09-14 07:04:48
188.152.189.220 attackbotsspam
(sshd) Failed SSH login from 188.152.189.220 (IT/Italy/net-188-152-189-220.cust.vodafonedsl.it): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 13 21:44:14 amsweb01 sshd[5074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.152.189.220  user=root
Sep 13 21:44:15 amsweb01 sshd[5074]: Failed password for root from 188.152.189.220 port 49452 ssh2
Sep 13 22:05:48 amsweb01 sshd[16614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.152.189.220  user=root
Sep 13 22:05:50 amsweb01 sshd[16614]: Failed password for root from 188.152.189.220 port 51588 ssh2
Sep 13 22:09:52 amsweb01 sshd[17382]: Invalid user root2 from 188.152.189.220 port 57434
2020-09-14 06:57:10
203.172.66.216 attackbotsspam
Sep  9 13:43:22 Ubuntu-1404-trusty-64-minimal sshd\[16340\]: Invalid user st4ck from 203.172.66.216
Sep  9 13:43:22 Ubuntu-1404-trusty-64-minimal sshd\[16340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.216
Sep  9 13:43:25 Ubuntu-1404-trusty-64-minimal sshd\[16340\]: Failed password for invalid user st4ck from 203.172.66.216 port 59604 ssh2
Sep  9 13:57:18 Ubuntu-1404-trusty-64-minimal sshd\[25917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.66.216  user=root
Sep  9 13:57:19 Ubuntu-1404-trusty-64-minimal sshd\[25917\]: Failed password for root from 203.172.66.216 port 44590 ssh2
2020-09-14 07:23:32
34.123.149.227 attackspam
2020-09-13T22:00:50.409746abusebot-4.cloudsearch.cf sshd[23646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=227.149.123.34.bc.googleusercontent.com  user=root
2020-09-13T22:00:52.124638abusebot-4.cloudsearch.cf sshd[23646]: Failed password for root from 34.123.149.227 port 45544 ssh2
2020-09-13T22:04:30.684553abusebot-4.cloudsearch.cf sshd[23712]: Invalid user kouki from 34.123.149.227 port 58330
2020-09-13T22:04:30.691612abusebot-4.cloudsearch.cf sshd[23712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=227.149.123.34.bc.googleusercontent.com
2020-09-13T22:04:30.684553abusebot-4.cloudsearch.cf sshd[23712]: Invalid user kouki from 34.123.149.227 port 58330
2020-09-13T22:04:32.942616abusebot-4.cloudsearch.cf sshd[23712]: Failed password for invalid user kouki from 34.123.149.227 port 58330 ssh2
2020-09-13T22:08:17.075286abusebot-4.cloudsearch.cf sshd[23727]: pam_unix(sshd:auth): authentication failur
...
2020-09-14 06:55:08
45.141.84.69 attackspam
RDP brute-forcing
2020-09-14 06:51:45
222.186.175.151 attackbotsspam
2020-09-13T22:52:16.407272abusebot-7.cloudsearch.cf sshd[30276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
2020-09-13T22:52:18.443014abusebot-7.cloudsearch.cf sshd[30276]: Failed password for root from 222.186.175.151 port 33304 ssh2
2020-09-13T22:52:21.445268abusebot-7.cloudsearch.cf sshd[30276]: Failed password for root from 222.186.175.151 port 33304 ssh2
2020-09-13T22:52:16.407272abusebot-7.cloudsearch.cf sshd[30276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
2020-09-13T22:52:18.443014abusebot-7.cloudsearch.cf sshd[30276]: Failed password for root from 222.186.175.151 port 33304 ssh2
2020-09-13T22:52:21.445268abusebot-7.cloudsearch.cf sshd[30276]: Failed password for root from 222.186.175.151 port 33304 ssh2
2020-09-13T22:52:16.407272abusebot-7.cloudsearch.cf sshd[30276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2020-09-14 06:52:34
89.248.162.161 attack
Multiport scan : 34 ports scanned 4011 4013 4018 4021 4025 4026 4028 4034 4039 4043 4044 4047 4048 4049 4052 4059 4062 4064 4066 4067 4069 4070 4071 4074 4075 4077 4080 4082 4083 4087 4089 4095 4097 4099
2020-09-14 07:16:52
222.186.42.7 attackbots
Sep 14 01:02:37 MainVPS sshd[32596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Sep 14 01:02:40 MainVPS sshd[32596]: Failed password for root from 222.186.42.7 port 59976 ssh2
Sep 14 01:02:46 MainVPS sshd[384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Sep 14 01:02:48 MainVPS sshd[384]: Failed password for root from 222.186.42.7 port 47344 ssh2
Sep 14 01:02:46 MainVPS sshd[384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Sep 14 01:02:48 MainVPS sshd[384]: Failed password for root from 222.186.42.7 port 47344 ssh2
Sep 14 01:02:50 MainVPS sshd[384]: Failed password for root from 222.186.42.7 port 47344 ssh2
...
2020-09-14 07:06:55
180.76.54.158 attack
Sep 13 20:43:45 vm0 sshd[16184]: Failed password for root from 180.76.54.158 port 35594 ssh2
Sep 13 20:53:56 vm0 sshd[3420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.54.158
...
2020-09-14 06:53:23

最近上报的IP列表

196.132.247.39 225.243.117.44 40.136.56.46 68.49.142.98
169.199.65.220 136.162.94.158 143.210.124.236 230.254.69.43
156.51.232.80 132.62.227.141 225.145.36.141 149.91.252.139
232.117.238.103 116.225.117.251 27.88.118.248 17.200.127.193
24.221.188.217 27.254.19.252 234.151.78.103 163.22.158.252