必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.87.142.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.87.142.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 20:15:40 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 81.142.87.197.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.142.87.197.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.25.189.123 attack
2020-04-01 UTC: (2x) - nproc,root
2020-04-02 18:15:33
222.136.158.195 attackbots
Unauthorised access (Apr  2) SRC=222.136.158.195 LEN=40 TTL=50 ID=64774 TCP DPT=23 WINDOW=50924 SYN
2020-04-02 17:53:59
72.43.141.7 attackbots
fail2ban
2020-04-02 18:20:16
146.88.240.4 attackbotsspam
Apr  2 10:09:27 debian-2gb-nbg1-2 kernel: \[8074012.341289\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=146.88.240.4 DST=195.201.40.59 LEN=81 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=UDP SPT=49724 DPT=389 LEN=61
2020-04-02 17:37:46
141.98.80.204 attack
04/02/2020-05:43:59.111486 141.98.80.204 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-02 18:05:00
46.38.145.179 attack
SSH invalid-user multiple login try
2020-04-02 17:41:04
14.124.112.135 attackspambots
port scan and connect, tcp 23 (telnet)
2020-04-02 17:38:03
121.128.200.146 attackbots
Apr  2 05:52:47 srv01 sshd[16921]: Invalid user P@sswOrd1234 from 121.128.200.146 port 48322
Apr  2 05:52:47 srv01 sshd[16921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.128.200.146
Apr  2 05:52:47 srv01 sshd[16921]: Invalid user P@sswOrd1234 from 121.128.200.146 port 48322
Apr  2 05:52:49 srv01 sshd[16921]: Failed password for invalid user P@sswOrd1234 from 121.128.200.146 port 48322 ssh2
Apr  2 05:54:39 srv01 sshd[17003]: Invalid user Root@2016@ from 121.128.200.146 port 36788
...
2020-04-02 17:35:13
185.176.27.26 attack
04/02/2020-05:44:53.512464 185.176.27.26 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-02 17:46:16
116.12.52.141 attackspam
Apr  2 11:16:04 h1745522 sshd[16560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.52.141  user=root
Apr  2 11:16:05 h1745522 sshd[16560]: Failed password for root from 116.12.52.141 port 38917 ssh2
Apr  2 11:19:55 h1745522 sshd[16794]: Invalid user sy from 116.12.52.141 port 39874
Apr  2 11:19:55 h1745522 sshd[16794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.52.141
Apr  2 11:19:55 h1745522 sshd[16794]: Invalid user sy from 116.12.52.141 port 39874
Apr  2 11:19:57 h1745522 sshd[16794]: Failed password for invalid user sy from 116.12.52.141 port 39874 ssh2
Apr  2 11:23:46 h1745522 sshd[16917]: Invalid user sy from 116.12.52.141 port 40836
Apr  2 11:23:46 h1745522 sshd[16917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.52.141
Apr  2 11:23:46 h1745522 sshd[16917]: Invalid user sy from 116.12.52.141 port 40836
Apr  2 11:23:48 h1745522 s
...
2020-04-02 17:52:17
39.78.232.208 attack
CN China - Failures: 20 ftpd
2020-04-02 17:36:49
160.16.226.158 attackspam
Apr  2 11:25:38 OPSO sshd\[25598\]: Invalid user aron from 160.16.226.158 port 46170
Apr  2 11:25:38 OPSO sshd\[25598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.226.158
Apr  2 11:25:40 OPSO sshd\[25598\]: Failed password for invalid user aron from 160.16.226.158 port 46170 ssh2
Apr  2 11:30:00 OPSO sshd\[26090\]: Invalid user aron from 160.16.226.158 port 44154
Apr  2 11:30:00 OPSO sshd\[26090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.226.158
2020-04-02 17:38:17
49.235.85.117 attackspam
2020-04-02T03:31:54.287552linuxbox-skyline sshd[39362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.85.117  user=root
2020-04-02T03:31:56.777462linuxbox-skyline sshd[39362]: Failed password for root from 49.235.85.117 port 43844 ssh2
...
2020-04-02 17:34:39
93.191.20.34 attackspambots
Invalid user zig from 93.191.20.34 port 48368
2020-04-02 18:07:27
213.32.67.160 attackbots
SSH login attempts.
2020-04-02 18:11:44

最近上报的IP列表

169.230.111.173 74.35.133.95 146.116.10.253 190.93.200.105
206.251.246.5 60.199.169.230 61.215.52.212 83.7.93.246
225.42.9.104 206.47.132.7 154.81.201.252 72.251.220.118
166.126.175.1 152.221.247.146 74.162.138.29 7.150.229.111
164.91.204.165 43.107.249.76 85.30.17.233 169.179.37.71