必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.129.20.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.129.20.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 15:19:05 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
81.20.129.57.in-addr.arpa domain name pointer ns3030184.ip-57-129-20.eu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.20.129.57.in-addr.arpa	name = ns3030184.ip-57-129-20.eu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.80.214.103 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 02-10-2019 04:45:27.
2019-10-02 19:04:33
38.77.204.66 attackspambots
Oct  2 05:57:15 pl3server sshd[2548946]: Invalid user mj from 38.77.204.66
Oct  2 05:57:15 pl3server sshd[2548946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.77.204.66
Oct  2 05:57:17 pl3server sshd[2548946]: Failed password for invalid user mj from 38.77.204.66 port 21826 ssh2
Oct  2 05:57:17 pl3server sshd[2548946]: Received disconnect from 38.77.204.66: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=38.77.204.66
2019-10-02 18:53:03
38.18.176.181 attackbots
DATE:2019-10-02 05:45:09, IP:38.18.176.181, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-02 19:23:44
37.115.205.210 attack
B: zzZZzz blocked content access
2019-10-02 19:13:32
92.222.47.41 attackbotsspam
Oct  2 12:17:52 icinga sshd[6356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.47.41
Oct  2 12:17:54 icinga sshd[6356]: Failed password for invalid user shushant from 92.222.47.41 port 38504 ssh2
...
2019-10-02 19:03:13
216.144.254.102 attackspam
10/02/2019-11:26:18.587238 216.144.254.102 Protocol: 17 ET SCAN Sipvicious Scan
2019-10-02 19:14:34
49.234.116.13 attackspambots
Oct  1 21:34:04 hanapaa sshd\[15452\]: Invalid user db2iadm1 from 49.234.116.13
Oct  1 21:34:04 hanapaa sshd\[15452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.116.13
Oct  1 21:34:06 hanapaa sshd\[15452\]: Failed password for invalid user db2iadm1 from 49.234.116.13 port 59616 ssh2
Oct  1 21:37:56 hanapaa sshd\[15768\]: Invalid user terminfo from 49.234.116.13
Oct  1 21:37:56 hanapaa sshd\[15768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.116.13
2019-10-02 19:34:54
159.65.109.148 attackbotsspam
Oct  1 18:29:15 kapalua sshd\[6494\]: Invalid user testdb from 159.65.109.148
Oct  1 18:29:15 kapalua sshd\[6494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.109.148
Oct  1 18:29:17 kapalua sshd\[6494\]: Failed password for invalid user testdb from 159.65.109.148 port 36896 ssh2
Oct  1 18:33:26 kapalua sshd\[6917\]: Invalid user user from 159.65.109.148
Oct  1 18:33:26 kapalua sshd\[6917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.109.148
2019-10-02 19:18:57
95.246.155.183 attackspambots
Automatic report - Port Scan Attack
2019-10-02 18:50:56
77.247.110.202 attack
\[2019-10-02 07:00:39\] NOTICE\[1948\] chan_sip.c: Registration from '\' failed for '77.247.110.202:55479' - Wrong password
\[2019-10-02 07:00:39\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-02T07:00:39.018-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2284",SessionID="0x7f1e1c2bed58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.202/55479",Challenge="018abff3",ReceivedChallenge="018abff3",ReceivedHash="b8336a69dfda1256a59a1deb50db214c"
\[2019-10-02 07:00:39\] NOTICE\[1948\] chan_sip.c: Registration from '\' failed for '77.247.110.202:55481' - Wrong password
\[2019-10-02 07:00:39\] SECURITY\[2006\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-02T07:00:39.019-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2284",SessionID="0x7f1e1c3735b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.202/55481",
2019-10-02 19:13:59
128.199.142.0 attack
Oct  2 13:22:26 vps01 sshd[12231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0
Oct  2 13:22:28 vps01 sshd[12231]: Failed password for invalid user postgres from 128.199.142.0 port 40980 ssh2
2019-10-02 19:26:51
193.112.74.3 attackbots
Oct  2 11:50:40 OPSO sshd\[29022\]: Invalid user yf from 193.112.74.3 port 38940
Oct  2 11:50:40 OPSO sshd\[29022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.74.3
Oct  2 11:50:41 OPSO sshd\[29022\]: Failed password for invalid user yf from 193.112.74.3 port 38940 ssh2
Oct  2 11:55:35 OPSO sshd\[30078\]: Invalid user mirror01 from 193.112.74.3 port 38112
Oct  2 11:55:35 OPSO sshd\[30078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.74.3
2019-10-02 18:59:32
114.88.116.42 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/114.88.116.42/ 
 CN - 1H : (686)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4812 
 
 IP : 114.88.116.42 
 
 CIDR : 114.88.0.0/16 
 
 PREFIX COUNT : 543 
 
 UNIQUE IP COUNT : 8614144 
 
 
 WYKRYTE ATAKI Z ASN4812 :  
  1H - 1 
  3H - 3 
  6H - 8 
 12H - 14 
 24H - 31 
 
 DateTime : 2019-10-02 05:45:18 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-02 19:15:25
183.111.227.5 attackbots
Oct  2 00:10:29 web9 sshd\[5321\]: Invalid user testftp from 183.111.227.5
Oct  2 00:10:29 web9 sshd\[5321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.5
Oct  2 00:10:31 web9 sshd\[5321\]: Failed password for invalid user testftp from 183.111.227.5 port 57440 ssh2
Oct  2 00:16:35 web9 sshd\[6208\]: Invalid user jia from 183.111.227.5
Oct  2 00:16:35 web9 sshd\[6208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.5
2019-10-02 19:23:12
51.79.71.142 attackspambots
Oct  2 13:26:37 lnxmysql61 sshd[30407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.71.142
2019-10-02 19:28:06

最近上报的IP列表

179.123.4.95 79.27.75.85 143.180.64.140 155.37.50.173
86.155.65.41 198.87.35.25 9.136.158.157 34.58.218.71
229.56.155.156 167.99.65.104 34.188.92.126 207.129.42.255
221.52.248.57 233.199.167.155 136.162.244.49 7.163.123.44
232.70.186.135 168.222.127.59 41.4.160.230 93.233.138.136