必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Teufen AR

省份(region): Appenzell Ausserrhoden

国家(country): Switzerland

运营商(isp): Sunrise

主机名(hostname): unknown

机构(organization): Sunrise Communications AG

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.164.27.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60090
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;31.164.27.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070600 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 07 01:41:49 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
21.27.164.31.in-addr.arpa domain name pointer xdsl-31-164-27-21.adslplus.ch.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
21.27.164.31.in-addr.arpa	name = xdsl-31-164-27-21.adslplus.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.246.23.156 attackbotsspam
Scanning
2019-12-12 19:54:54
134.209.171.203 attackspambots
Dec 12 12:26:42 lnxmysql61 sshd[13488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.171.203
2019-12-12 19:35:45
183.56.211.38 attackbotsspam
Dec 12 12:15:00 nextcloud sshd\[8627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.211.38  user=root
Dec 12 12:15:02 nextcloud sshd\[8627\]: Failed password for root from 183.56.211.38 port 53831 ssh2
Dec 12 12:23:46 nextcloud sshd\[23266\]: Invalid user odette from 183.56.211.38
Dec 12 12:23:46 nextcloud sshd\[23266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.211.38
...
2019-12-12 19:31:48
68.183.142.240 attackbots
Dec 12 11:57:08 sip sshd[24124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.240
Dec 12 11:57:09 sip sshd[24124]: Failed password for invalid user bisson from 68.183.142.240 port 57556 ssh2
Dec 12 12:04:30 sip sshd[24206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.142.240
2019-12-12 19:18:34
14.160.39.78 attackbotsspam
Unauthorized connection attempt detected from IP address 14.160.39.78 to port 445
2019-12-12 19:21:01
195.9.138.78 attackspam
Dec 12 11:55:09 areeb-Workstation sshd[16605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.138.78 
Dec 12 11:55:11 areeb-Workstation sshd[16605]: Failed password for invalid user admin from 195.9.138.78 port 55649 ssh2
...
2019-12-12 19:50:33
68.183.134.134 attack
68.183.134.134 - - \[12/Dec/2019:07:25:32 +0100\] "POST /wp-login.php HTTP/1.0" 200 7524 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
68.183.134.134 - - \[12/Dec/2019:07:25:39 +0100\] "POST /wp-login.php HTTP/1.0" 200 7391 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
68.183.134.134 - - \[12/Dec/2019:07:25:45 +0100\] "POST /wp-login.php HTTP/1.0" 200 7387 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-12 19:25:43
185.156.73.38 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-12 19:27:25
106.12.74.141 attackspambots
Dec 12 11:59:29 mail sshd[18897]: Invalid user nfs from 106.12.74.141
Dec 12 11:59:29 mail sshd[18897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.141
Dec 12 11:59:29 mail sshd[18897]: Invalid user nfs from 106.12.74.141
Dec 12 11:59:31 mail sshd[18897]: Failed password for invalid user nfs from 106.12.74.141 port 47714 ssh2
Dec 12 12:12:38 mail sshd[21685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.141  user=dovecot
Dec 12 12:12:40 mail sshd[21685]: Failed password for dovecot from 106.12.74.141 port 45350 ssh2
...
2019-12-12 19:44:15
209.17.96.98 attack
209.17.96.98 was recorded 11 times by 9 hosts attempting to connect to the following ports: 5903,9443,5984,30303,5632,5986,9002,3388,5909,6002. Incident counter (4h, 24h, all-time): 11, 42, 1528
2019-12-12 19:26:21
77.247.109.59 attackbotsspam
\[2019-12-12 06:31:37\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-12T06:31:37.479-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="84201148632170012",SessionID="0x7f0fb4767338",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.59/57771",ACLName="no_extension_match"
\[2019-12-12 06:31:59\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-12T06:31:59.119-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="197201148122518001",SessionID="0x7f0fb404fe78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.59/55736",ACLName="no_extension_match"
\[2019-12-12 06:32:23\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-12T06:32:23.843-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="305401148134454001",SessionID="0x7f0fb4987948",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.59/49710",ACLName
2019-12-12 19:32:55
54.37.230.164 attackspambots
Dec 12 07:54:43 l02a sshd[3271]: Invalid user squid from 54.37.230.164
Dec 12 07:54:46 l02a sshd[3271]: Failed password for invalid user squid from 54.37.230.164 port 50116 ssh2
Dec 12 07:54:43 l02a sshd[3271]: Invalid user squid from 54.37.230.164
Dec 12 07:54:46 l02a sshd[3271]: Failed password for invalid user squid from 54.37.230.164 port 50116 ssh2
2019-12-12 19:48:16
118.25.103.132 attackspambots
Dec 11 23:56:50 web1 sshd\[27463\]: Invalid user Administrator from 118.25.103.132
Dec 11 23:56:50 web1 sshd\[27463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.103.132
Dec 11 23:56:52 web1 sshd\[27463\]: Failed password for invalid user Administrator from 118.25.103.132 port 58604 ssh2
Dec 12 00:02:56 web1 sshd\[28063\]: Invalid user root@root from 118.25.103.132
Dec 12 00:02:56 web1 sshd\[28063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.103.132
2019-12-12 19:42:12
211.193.58.173 attack
$f2bV_matches
2019-12-12 19:42:40
51.68.123.192 attackbotsspam
2019-12-12T11:40:57.354732shield sshd\[15418\]: Invalid user sa from 51.68.123.192 port 42368
2019-12-12T11:40:57.357764shield sshd\[15418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-51-68-123.eu
2019-12-12T11:40:59.401269shield sshd\[15418\]: Failed password for invalid user sa from 51.68.123.192 port 42368 ssh2
2019-12-12T11:46:24.764078shield sshd\[17510\]: Invalid user rk from 51.68.123.192 port 51288
2019-12-12T11:46:24.768432shield sshd\[17510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-51-68-123.eu
2019-12-12 19:51:04

最近上报的IP列表

199.71.172.188 184.45.91.187 155.196.128.142 109.99.10.216
12.80.104.13 113.198.157.5 134.73.161.217 166.186.0.227
140.239.245.191 128.20.86.202 99.27.130.98 162.174.1.48
178.220.144.187 46.200.106.212 185.106.31.207 83.203.236.254
150.222.105.244 134.73.161.124 131.226.155.77 202.84.33.214