必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.221.104.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44729
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.221.104.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 02:12:16 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 81.104.221.198.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.104.221.198.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.24.27.3 attack
23/tcp
[2019-09-23]1pkt
2019-09-24 01:41:29
219.153.106.35 attackbotsspam
Unauthorized SSH login attempts
2019-09-24 01:41:10
112.5.90.232 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/112.5.90.232/ 
 CN - 1H : (1450)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN9808 
 
 IP : 112.5.90.232 
 
 CIDR : 112.5.88.0/21 
 
 PREFIX COUNT : 3598 
 
 UNIQUE IP COUNT : 18819072 
 
 
 WYKRYTE ATAKI Z ASN9808 :  
  1H - 3 
  3H - 11 
  6H - 23 
 12H - 30 
 24H - 34 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 01:42:35
104.140.73.203 attackbotsspam
104.140.73.203 - - [23/Sep/2019:08:17:49 -0400] "GET /?page=products&action=view&manufacturerID=1&productID=../etc/passwd%00&linkID=3128 HTTP/1.1" 302 - "https://baldwinbrasshardware.com/?page=products&action=view&manufacturerID=1&productID=../etc/passwd%00&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-24 01:08:02
114.38.56.200 attack
port 23 attempt blocked
2019-09-24 01:36:55
162.220.12.144 attackspambots
2019-09-21 10:26:02 server sshd[63638]: Failed password for invalid user xs from 162.220.12.144 port 56296 ssh2
2019-09-24 01:32:06
138.68.128.80 attackspambots
2019-09-23T17:02:39.893960abusebot-7.cloudsearch.cf sshd\[31323\]: Invalid user 123456 from 138.68.128.80 port 49924
2019-09-24 01:03:07
142.93.232.222 attack
Sep 23 06:48:59 friendsofhawaii sshd\[26726\]: Invalid user ax from 142.93.232.222
Sep 23 06:48:59 friendsofhawaii sshd\[26726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.222
Sep 23 06:49:01 friendsofhawaii sshd\[26726\]: Failed password for invalid user ax from 142.93.232.222 port 47088 ssh2
Sep 23 06:53:14 friendsofhawaii sshd\[27090\]: Invalid user nagios from 142.93.232.222
Sep 23 06:53:14 friendsofhawaii sshd\[27090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.222
2019-09-24 01:29:42
81.174.227.28 attackbotsspam
2019-09-23T16:59:21.688016abusebot-4.cloudsearch.cf sshd\[28140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sanyaade.plus.com
2019-09-24 01:43:02
107.175.214.83 attackbotsspam
19/9/23@08:37:18: FAIL: Alarm-Intrusion address from=107.175.214.83
...
2019-09-24 00:58:18
112.64.34.165 attack
Sep 23 18:46:57 microserver sshd[9279]: Invalid user qwerty from 112.64.34.165 port 44199
Sep 23 18:46:57 microserver sshd[9279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
Sep 23 18:46:59 microserver sshd[9279]: Failed password for invalid user qwerty from 112.64.34.165 port 44199 ssh2
Sep 23 18:51:58 microserver sshd[9999]: Invalid user p@55w0rd from 112.64.34.165 port 59103
Sep 23 18:51:58 microserver sshd[9999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
Sep 23 19:02:11 microserver sshd[11447]: Invalid user sx from 112.64.34.165 port 60678
Sep 23 19:02:11 microserver sshd[11447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
Sep 23 19:02:12 microserver sshd[11447]: Failed password for invalid user sx from 112.64.34.165 port 60678 ssh2
Sep 23 19:07:08 microserver sshd[12153]: Invalid user gb@123 from 112.64.34.165 port 47347
Sep 23 19:
2019-09-24 01:17:01
27.111.83.239 attack
Sep 23 12:24:39 aat-srv002 sshd[18408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.111.83.239
Sep 23 12:24:41 aat-srv002 sshd[18408]: Failed password for invalid user brc from 27.111.83.239 port 54501 ssh2
Sep 23 12:28:49 aat-srv002 sshd[18495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.111.83.239
Sep 23 12:28:51 aat-srv002 sshd[18495]: Failed password for invalid user michielan from 27.111.83.239 port 46832 ssh2
...
2019-09-24 01:47:23
221.214.60.17 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/221.214.60.17/ 
 CN - 1H : (1452)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 221.214.60.17 
 
 CIDR : 221.214.0.0/15 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 WYKRYTE ATAKI Z ASN4837 :  
  1H - 48 
  3H - 198 
  6H - 400 
 12H - 554 
 24H - 557 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 01:01:18
177.1.213.19 attackbots
Sep 23 10:20:44 home sshd[11779]: Invalid user miner-new from 177.1.213.19 port 36857
Sep 23 10:20:44 home sshd[11779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.213.19
Sep 23 10:20:44 home sshd[11779]: Invalid user miner-new from 177.1.213.19 port 36857
Sep 23 10:20:46 home sshd[11779]: Failed password for invalid user miner-new from 177.1.213.19 port 36857 ssh2
Sep 23 10:37:52 home sshd[11871]: Invalid user ubnt from 177.1.213.19 port 27542
Sep 23 10:37:52 home sshd[11871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.213.19
Sep 23 10:37:52 home sshd[11871]: Invalid user ubnt from 177.1.213.19 port 27542
Sep 23 10:37:53 home sshd[11871]: Failed password for invalid user ubnt from 177.1.213.19 port 27542 ssh2
Sep 23 10:43:11 home sshd[11908]: Invalid user wangzc from 177.1.213.19 port 45496
Sep 23 10:43:11 home sshd[11908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos
2019-09-24 01:01:06
45.40.203.242 attackspam
Sep 23 18:52:14 ArkNodeAT sshd\[15345\]: Invalid user electrical from 45.40.203.242
Sep 23 18:52:14 ArkNodeAT sshd\[15345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.203.242
Sep 23 18:52:16 ArkNodeAT sshd\[15345\]: Failed password for invalid user electrical from 45.40.203.242 port 43148 ssh2
2019-09-24 01:44:32

最近上报的IP列表

132.197.231.126 191.176.91.200 60.183.109.106 13.117.40.205
20.236.218.197 135.153.210.227 148.84.102.162 128.129.141.253
143.81.41.171 223.18.85.237 141.127.151.75 75.124.119.155
42.110.4.217 227.151.190.51 128.82.215.238 57.53.130.200
242.112.251.186 244.248.97.2 162.212.145.101 144.27.69.117