必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.27.131.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.27.131.83.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:00:13 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
83.131.27.213.in-addr.arpa domain name pointer 213.27.131.83.es.colt.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.131.27.213.in-addr.arpa	name = 213.27.131.83.es.colt.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.54.160.202 attack
ET DROP Dshield Block Listed Source group 1 - port: 23924 proto: TCP cat: Misc Attack
2020-07-09 02:55:04
85.209.0.206 attackbots
Jul 08 06:34:19 askasleikir sshd[36323]: Failed password for root from 85.209.0.206 port 30882 ssh2
Jul 08 06:34:18 askasleikir sshd[36322]: Failed password for root from 85.209.0.206 port 31106 ssh2
2020-07-09 03:09:04
212.95.137.19 attackspam
(sshd) Failed SSH login from 212.95.137.19 (HK/Hong Kong/-): 5 in the last 3600 secs
2020-07-09 03:17:43
106.75.64.251 attackspam
Jul  8 11:51:32 ny01 sshd[8776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.64.251
Jul  8 11:51:34 ny01 sshd[8776]: Failed password for invalid user zabbix from 106.75.64.251 port 51054 ssh2
Jul  8 11:55:29 ny01 sshd[9674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.64.251
2020-07-09 02:48:24
156.96.128.152 attack
[2020-07-08 12:09:43] NOTICE[1150][C-00000aa4] chan_sip.c: Call from '' (156.96.128.152:53143) to extension '9981011442037692067' rejected because extension not found in context 'public'.
[2020-07-08 12:09:43] SECURITY[1167] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-08T12:09:43.144-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9981011442037692067",SessionID="0x7fcb4c07a778",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.128.152/53143",ACLName="no_extension_match"
[2020-07-08 12:10:14] NOTICE[1150][C-00000aa5] chan_sip.c: Call from '' (156.96.128.152:57718) to extension '9982011442037692067' rejected because extension not found in context 'public'.
[2020-07-08 12:10:14] SECURITY[1167] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-07-08T12:10:14.702-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9982011442037692067",SessionID="0x7fcb4c096bf8",LocalAddress="IPV4/UDP/192.168.244.6/5060",Remot
...
2020-07-09 03:01:46
106.110.12.222 attack
Firewall Dropped Connection
2020-07-09 03:17:06
14.226.60.32 attack
445/tcp
[2020-07-08]1pkt
2020-07-09 03:10:06
14.116.154.173 attackspambots
Jul  8 19:27:01 serwer sshd\[8279\]: Invalid user jobs from 14.116.154.173 port 55984
Jul  8 19:27:01 serwer sshd\[8279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.154.173
Jul  8 19:27:03 serwer sshd\[8279\]: Failed password for invalid user jobs from 14.116.154.173 port 55984 ssh2
...
2020-07-09 03:19:54
177.70.153.119 attack
Unauthorized connection attempt from IP address 177.70.153.119 on Port 445(SMB)
2020-07-09 02:52:51
125.162.203.134 attack
1594210485 - 07/08/2020 14:14:45 Host: 125.162.203.134/125.162.203.134 Port: 445 TCP Blocked
2020-07-09 02:48:06
116.196.99.196 attack
Jul  7 18:07:06 pl3server sshd[17007]: Invalid user hartmut from 116.196.99.196 port 58302
Jul  7 18:07:06 pl3server sshd[17007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.99.196
Jul  7 18:07:08 pl3server sshd[17007]: Failed password for invalid user hartmut from 116.196.99.196 port 58302 ssh2
Jul  7 18:07:08 pl3server sshd[17007]: Received disconnect from 116.196.99.196 port 58302:11: Bye Bye [preauth]
Jul  7 18:07:08 pl3server sshd[17007]: Disconnected from 116.196.99.196 port 58302 [preauth]
Jul  7 18:17:00 pl3server sshd[26947]: Invalid user admin from 116.196.99.196 port 59404
Jul  7 18:17:00 pl3server sshd[26947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.99.196


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.196.99.196
2020-07-09 02:43:41
187.75.69.44 attack
22/tcp 8291/tcp...
[2020-07-08]5pkt,2pt.(tcp)
2020-07-09 03:14:05
162.243.137.169 attackbotsspam
[Thu May 28 02:00:39 2020] - DDoS Attack From IP: 162.243.137.169 Port: 57347
2020-07-09 03:21:08
121.103.170.17 attack
8080/tcp
[2020-07-08]1pkt
2020-07-09 02:51:22
49.230.133.110 attack
Unauthorized connection attempt from IP address 49.230.133.110 on Port 445(SMB)
2020-07-09 02:44:11

最近上报的IP列表

167.4.97.110 94.213.162.202 136.20.0.211 120.54.114.49
184.42.159.100 44.219.132.118 126.113.163.58 123.208.171.227
119.192.53.143 225.118.7.217 104.124.117.115 62.193.51.176
101.250.176.124 130.67.244.155 74.231.57.67 51.59.164.39
44.104.81.236 56.72.1.161 233.202.108.183 84.130.112.253