必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.113.103.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.113.103.83.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 11:34:32 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
83.103.113.213.in-addr.arpa domain name pointer c-213-113-103-83.bbcust.telenor.se.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.103.113.213.in-addr.arpa	name = c-213-113-103-83.bbcust.telenor.se.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.109.165.245 attackspam
Unauthorized connection attempt from IP address 190.109.165.245 on Port 445(SMB)
2019-11-27 00:34:45
168.205.216.34 attack
Unauthorized connection attempt from IP address 168.205.216.34 on Port 445(SMB)
2019-11-27 00:46:31
41.218.117.46 attackspambots
Port 1433 Scan
2019-11-27 01:03:58
182.75.77.58 attack
Unauthorized connection attempt from IP address 182.75.77.58 on Port 445(SMB)
2019-11-27 00:50:01
185.53.1.85 attackspambots
SQL Injection
2019-11-27 00:53:25
49.88.112.115 attackbots
Nov 26 17:56:21 root sshd[2739]: Failed password for root from 49.88.112.115 port 60513 ssh2
Nov 26 17:56:23 root sshd[2739]: Failed password for root from 49.88.112.115 port 60513 ssh2
Nov 26 17:56:26 root sshd[2739]: Failed password for root from 49.88.112.115 port 60513 ssh2
...
2019-11-27 00:58:31
180.180.36.33 attackbots
Unauthorized connection attempt from IP address 180.180.36.33 on Port 445(SMB)
2019-11-27 00:30:41
222.175.157.101 attackbotsspam
Unauthorized connection attempt from IP address 222.175.157.101 on Port 445(SMB)
2019-11-27 00:41:16
51.83.98.52 attackspambots
Nov 26 10:47:38 ny01 sshd[10535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.98.52
Nov 26 10:47:41 ny01 sshd[10535]: Failed password for invalid user aemiller from 51.83.98.52 port 53870 ssh2
Nov 26 10:53:48 ny01 sshd[11074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.98.52
2019-11-27 00:28:57
68.183.160.63 attackbotsspam
2019-11-26T16:59:07.043498shield sshd\[25640\]: Invalid user dneufield from 68.183.160.63 port 59622
2019-11-26T16:59:07.048219shield sshd\[25640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-26T16:59:09.028602shield sshd\[25640\]: Failed password for invalid user dneufield from 68.183.160.63 port 59622 ssh2
2019-11-26T17:05:07.862129shield sshd\[26629\]: Invalid user ashah from 68.183.160.63 port 52038
2019-11-26T17:05:07.866308shield sshd\[26629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-27 01:05:36
142.93.1.100 attackbotsspam
Nov 26 16:42:08 venus sshd\[24004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100  user=root
Nov 26 16:42:10 venus sshd\[24004\]: Failed password for root from 142.93.1.100 port 59972 ssh2
Nov 26 16:48:36 venus sshd\[24081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100  user=mail
...
2019-11-27 00:56:28
157.37.184.28 attackbotsspam
Unauthorized connection attempt from IP address 157.37.184.28 on Port 445(SMB)
2019-11-27 01:02:07
116.239.105.95 attackbotsspam
Nov 25 16:48:12 eola postfix/smtpd[7132]: connect from unknown[116.239.105.95]
Nov 25 16:48:13 eola postfix/smtpd[7132]: lost connection after AUTH from unknown[116.239.105.95]
Nov 25 16:48:13 eola postfix/smtpd[7132]: disconnect from unknown[116.239.105.95] ehlo=1 auth=0/1 commands=1/2
Nov 25 16:48:13 eola postfix/smtpd[7132]: connect from unknown[116.239.105.95]
Nov 25 16:48:13 eola postfix/smtpd[7132]: lost connection after AUTH from unknown[116.239.105.95]
Nov 25 16:48:13 eola postfix/smtpd[7132]: disconnect from unknown[116.239.105.95] ehlo=1 auth=0/1 commands=1/2
Nov 25 16:48:14 eola postfix/smtpd[7132]: connect from unknown[116.239.105.95]
Nov 25 16:48:14 eola postfix/smtpd[7132]: lost connection after AUTH from unknown[116.239.105.95]
Nov 25 16:48:14 eola postfix/smtpd[7132]: disconnect from unknown[116.239.105.95] ehlo=1 auth=0/1 commands=1/2
Nov 25 16:48:14 eola postfix/smtpd[7132]: connect from unknown[116.239.105.95]
Nov 25 16:48:15 eola postfix/smtpd[7132]:........
-------------------------------
2019-11-27 01:03:10
206.189.147.196 attack
Nov 25 12:44:04 collab sshd[23423]: Invalid user rognlie from 206.189.147.196
Nov 25 12:44:04 collab sshd[23423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.147.196 
Nov 25 12:44:06 collab sshd[23423]: Failed password for invalid user rognlie from 206.189.147.196 port 39116 ssh2
Nov 25 12:44:07 collab sshd[23423]: Received disconnect from 206.189.147.196: 11: Bye Bye [preauth]
Nov 25 13:25:02 collab sshd[25302]: Invalid user alimorong from 206.189.147.196
Nov 25 13:25:02 collab sshd[25302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.147.196 
Nov 25 13:25:03 collab sshd[25302]: Failed password for invalid user alimorong from 206.189.147.196 port 52368 ssh2
Nov 25 13:25:04 collab sshd[25302]: Received disconnect from 206.189.147.196: 11: Bye Bye [preauth]
Nov 25 13:32:27 collab sshd[25619]: Invalid user markisha from 206.189.147.196
Nov 25 13:32:27 collab sshd[25619]:........
-------------------------------
2019-11-27 00:43:08
198.20.70.114 attack
198.20.70.114 was recorded 10 times by 8 hosts attempting to connect to the following ports: 102,110,18245,2345,9160,9090,789,8834,8126,4730. Incident counter (4h, 24h, all-time): 10, 34, 767
2019-11-27 00:57:32

最近上报的IP列表

226.23.122.187 233.197.230.250 170.53.217.234 166.139.152.37
142.42.12.147 27.179.195.96 48.28.172.15 66.222.26.52
82.176.48.36 43.37.172.126 132.72.194.180 195.201.9.112
88.196.85.76 42.229.244.161 136.4.171.25 189.167.163.205
181.40.61.213 151.30.100.25 159.185.96.182 139.127.139.64