必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.99.122.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 936
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.99.122.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 01:46:45 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 81.122.99.61.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.122.99.61.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
13.92.102.213 attack
May  8 07:38:40 server sshd[13396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.92.102.213
May  8 07:38:42 server sshd[13396]: Failed password for invalid user wdk from 13.92.102.213 port 40276 ssh2
May  8 07:43:08 server sshd[14202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.92.102.213
...
2020-05-08 13:56:13
217.113.10.250 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-05-08 13:55:22
54.38.188.93 attackspambots
May  8 08:41:37 pkdns2 sshd\[44380\]: Invalid user user from 54.38.188.93May  8 08:41:38 pkdns2 sshd\[44380\]: Failed password for invalid user user from 54.38.188.93 port 41026 ssh2May  8 08:44:43 pkdns2 sshd\[44518\]: Invalid user nancy from 54.38.188.93May  8 08:44:44 pkdns2 sshd\[44518\]: Failed password for invalid user nancy from 54.38.188.93 port 40094 ssh2May  8 08:47:57 pkdns2 sshd\[44700\]: Failed password for root from 54.38.188.93 port 39172 ssh2May  8 08:50:58 pkdns2 sshd\[44886\]: Invalid user bernardo from 54.38.188.93May  8 08:51:00 pkdns2 sshd\[44886\]: Failed password for invalid user bernardo from 54.38.188.93 port 38250 ssh2
...
2020-05-08 14:01:05
49.234.76.196 attackspambots
$f2bV_matches
2020-05-08 13:51:37
67.143.176.81 attack
Brute forcing email accounts
2020-05-08 14:07:28
51.91.78.238 attackbots
May  8 04:11:28 onepixel sshd[1052898]: Failed password for root from 51.91.78.238 port 58318 ssh2
May  8 04:15:08 onepixel sshd[1054709]: Invalid user allison from 51.91.78.238 port 40180
May  8 04:15:08 onepixel sshd[1054709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.78.238 
May  8 04:15:08 onepixel sshd[1054709]: Invalid user allison from 51.91.78.238 port 40180
May  8 04:15:10 onepixel sshd[1054709]: Failed password for invalid user allison from 51.91.78.238 port 40180 ssh2
2020-05-08 14:25:18
193.34.131.57 attackspambots
May  8 08:05:54 vmd48417 sshd[24804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.34.131.57
2020-05-08 14:19:40
106.13.71.1 attackbotsspam
May  8 07:22:49 srv-ubuntu-dev3 sshd[50485]: Invalid user dirk from 106.13.71.1
May  8 07:22:49 srv-ubuntu-dev3 sshd[50485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.71.1
May  8 07:22:49 srv-ubuntu-dev3 sshd[50485]: Invalid user dirk from 106.13.71.1
May  8 07:22:51 srv-ubuntu-dev3 sshd[50485]: Failed password for invalid user dirk from 106.13.71.1 port 53922 ssh2
May  8 07:26:48 srv-ubuntu-dev3 sshd[51044]: Invalid user xt from 106.13.71.1
May  8 07:26:48 srv-ubuntu-dev3 sshd[51044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.71.1
May  8 07:26:48 srv-ubuntu-dev3 sshd[51044]: Invalid user xt from 106.13.71.1
May  8 07:26:50 srv-ubuntu-dev3 sshd[51044]: Failed password for invalid user xt from 106.13.71.1 port 38892 ssh2
May  8 07:30:20 srv-ubuntu-dev3 sshd[51596]: Invalid user leon from 106.13.71.1
...
2020-05-08 14:06:31
186.247.173.44 attackspam
Automatic report - Port Scan Attack
2020-05-08 14:00:15
40.117.116.202 attack
40.117.116.202 - - [08/May/2020:07:27:19 +0200] "POST //wp-login.php HTTP/1.1" 200 5637 "https://idpi.univ-lyon3.fr//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0 Safari/537.36"
40.117.116.202 - - [08/May/2020:07:27:19 +0200] "POST //wp-login.php HTTP/1.1" 200 5637 "https://idpi.univ-lyon3.fr//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0 Safari/537.36"
40.117.116.202 - - [08/May/2020:07:27:20 +0200] "POST //wp-login.php HTTP/1.1" 200 5637 "https://idpi.univ-lyon3.fr//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0 Safari/537.36"
40.117.116.202 - - [08/May/2020:07:27:20 +0200] "POST //wp-login.php HTTP/1.1" 200 5637 "https://idpi.univ-lyon3.fr//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0 Safari/537.36"
40.117.116.202 - - [08/May/2020:07:27:20
...
2020-05-08 13:47:59
67.205.142.246 attackspam
2020-05-08T03:51:39.905491abusebot-8.cloudsearch.cf sshd[28352]: Invalid user magna from 67.205.142.246 port 59134
2020-05-08T03:51:39.918173abusebot-8.cloudsearch.cf sshd[28352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.142.246
2020-05-08T03:51:39.905491abusebot-8.cloudsearch.cf sshd[28352]: Invalid user magna from 67.205.142.246 port 59134
2020-05-08T03:51:41.863970abusebot-8.cloudsearch.cf sshd[28352]: Failed password for invalid user magna from 67.205.142.246 port 59134 ssh2
2020-05-08T03:56:20.133703abusebot-8.cloudsearch.cf sshd[28623]: Invalid user ftpuser from 67.205.142.246 port 45768
2020-05-08T03:56:20.143615abusebot-8.cloudsearch.cf sshd[28623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.142.246
2020-05-08T03:56:20.133703abusebot-8.cloudsearch.cf sshd[28623]: Invalid user ftpuser from 67.205.142.246 port 45768
2020-05-08T03:56:22.334937abusebot-8.cloudsearch.cf sshd[286
...
2020-05-08 14:20:05
113.133.176.204 attackspam
May  8 00:57:15 vps46666688 sshd[10805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.133.176.204
May  8 00:57:17 vps46666688 sshd[10805]: Failed password for invalid user cui from 113.133.176.204 port 33436 ssh2
...
2020-05-08 13:29:53
118.24.129.251 attackbots
$f2bV_matches
2020-05-08 13:42:58
212.64.28.77 attackspam
$f2bV_matches
2020-05-08 14:17:26
178.138.63.109 attackspam
Port probing on unauthorized port 8080
2020-05-08 14:23:36

最近上报的IP列表

65.28.78.116 159.215.44.122 88.17.249.244 9.89.103.192
185.229.104.112 217.93.17.227 63.12.203.156 93.56.227.20
6.16.170.53 163.108.145.252 71.115.22.173 109.235.50.194
181.86.235.188 199.247.47.138 70.163.223.158 151.106.150.225
13.128.140.47 230.209.171.137 225.25.57.72 60.66.169.3