必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.57.214.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17693
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.57.214.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:46:52 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 81.214.57.48.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.214.57.48.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
186.189.224.80 attackspam
2020-06-15T15:04:20+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-06-15 21:29:27
193.112.50.203 attackbotsspam
Jun 15 14:56:45 mout sshd[17392]: Invalid user ysop from 193.112.50.203 port 10692
2020-06-15 21:13:25
106.13.203.62 attackspam
2020-06-15T14:20:59.414997+02:00  sshd[26327]: Failed password for invalid user postgres from 106.13.203.62 port 50348 ssh2
2020-06-15 21:37:34
173.245.202.110 attack
Fail2Ban Ban Triggered
2020-06-15 21:37:11
36.72.172.227 attackspambots
1592223666 - 06/15/2020 14:21:06 Host: 36.72.172.227/36.72.172.227 Port: 445 TCP Blocked
2020-06-15 21:38:01
95.107.199.90 attackbotsspam
DATE:2020-06-15 14:21:21, IP:95.107.199.90, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-06-15 21:14:24
150.109.99.243 attackbotsspam
Jun 15 14:21:12 jane sshd[28668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.99.243 
Jun 15 14:21:14 jane sshd[28668]: Failed password for invalid user natural from 150.109.99.243 port 55586 ssh2
...
2020-06-15 21:27:23
218.92.0.202 attackspambots
Jun 15 14:18:02 santamaria sshd\[22992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
Jun 15 14:18:04 santamaria sshd\[22992\]: Failed password for root from 218.92.0.202 port 51670 ssh2
Jun 15 14:21:35 santamaria sshd\[23037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
...
2020-06-15 21:03:25
122.171.208.211 attack
Port probing on unauthorized port 445
2020-06-15 20:55:29
78.128.113.115 attackspam
2020-06-15 15:15:51 dovecot_plain authenticator failed for \(ip-113-115.4vendeta.com.\) \[78.128.113.115\]: 535 Incorrect authentication data \(set_id=remo.martinoli@opso.it\)
2020-06-15 15:15:55 dovecot_plain authenticator failed for \(ip-113-115.4vendeta.com.\) \[78.128.113.115\]: 535 Incorrect authentication data
2020-06-15 15:15:57 dovecot_plain authenticator failed for \(ip-113-115.4vendeta.com.\) \[78.128.113.115\]: 535 Incorrect authentication data
2020-06-15 15:16:04 dovecot_plain authenticator failed for \(ip-113-115.4vendeta.com.\) \[78.128.113.115\]: 535 Incorrect authentication data
2020-06-15 15:16:06 dovecot_plain authenticator failed for \(ip-113-115.4vendeta.com.\) \[78.128.113.115\]: 535 Incorrect authentication data
2020-06-15 21:23:36
45.14.148.95 attackbotsspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-15 21:28:25
198.98.59.29 attackspam
Jun 15 13:21:07 l03 sshd[23685]: Invalid user ubnt from 198.98.59.29 port 55413
...
2020-06-15 21:36:15
144.76.176.171 attackbotsspam
20 attempts against mh-misbehave-ban on pluto
2020-06-15 21:10:44
211.39.149.53 attackspambots
Jun 15 14:38:20 OPSO sshd\[23610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.39.149.53  user=root
Jun 15 14:38:22 OPSO sshd\[23610\]: Failed password for root from 211.39.149.53 port 37440 ssh2
Jun 15 14:41:14 OPSO sshd\[24415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.39.149.53  user=admin
Jun 15 14:41:16 OPSO sshd\[24415\]: Failed password for admin from 211.39.149.53 port 48082 ssh2
Jun 15 14:44:17 OPSO sshd\[24879\]: Invalid user tomas from 211.39.149.53 port 58710
Jun 15 14:44:17 OPSO sshd\[24879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.39.149.53
2020-06-15 21:01:08
115.231.221.129 attackbots
Jun 15 13:22:00 django-0 sshd\[8165\]: Failed password for root from 115.231.221.129 port 52166 ssh2Jun 15 13:25:43 django-0 sshd\[8276\]: Failed password for root from 115.231.221.129 port 40200 ssh2Jun 15 13:29:23 django-0 sshd\[8361\]: Invalid user zmh from 115.231.221.129
...
2020-06-15 21:34:13

最近上报的IP列表

91.58.87.91 204.37.28.200 22.122.98.19 122.15.37.229
144.232.226.26 82.69.214.227 13.158.38.62 187.43.108.42
145.246.26.253 151.145.35.101 89.35.20.130 16.6.174.52
44.2.206.127 235.148.139.36 4.158.134.180 42.178.150.205
139.155.239.245 142.91.214.91 195.145.167.242 92.83.235.6