必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.16.116.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.16.116.126.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 17:08:43 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
126.116.16.80.in-addr.arpa domain name pointer host-80-16-116-126.business.telecomitalia.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
126.116.16.80.in-addr.arpa	name = host-80-16-116-126.business.telecomitalia.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.210.185.4 attack
62.210.185.4 - - [08/Sep/2020:18:08:20 +0200] "POST /wp-login.php HTTP/1.0" 200 4794 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-09 01:40:09
188.19.46.138 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-09 01:52:38
91.212.38.68 attack
Sep  8 15:08:53 jumpserver sshd[69143]: Failed password for root from 91.212.38.68 port 39956 ssh2
Sep  8 15:12:26 jumpserver sshd[69179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.212.38.68  user=root
Sep  8 15:12:29 jumpserver sshd[69179]: Failed password for root from 91.212.38.68 port 44690 ssh2
...
2020-09-09 01:16:01
81.129.253.102 attack
Automatic report - Port Scan Attack
2020-09-09 01:59:25
222.186.180.8 attackspambots
Sep  8 19:23:46 nextcloud sshd\[1232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Sep  8 19:23:48 nextcloud sshd\[1232\]: Failed password for root from 222.186.180.8 port 8628 ssh2
Sep  8 19:24:04 nextcloud sshd\[1474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
2020-09-09 01:43:26
185.220.101.211 attack
Sep  8 18:04:02 ns308116 sshd[7581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.211  user=root
Sep  8 18:04:04 ns308116 sshd[7581]: Failed password for root from 185.220.101.211 port 14820 ssh2
Sep  8 18:04:06 ns308116 sshd[7581]: Failed password for root from 185.220.101.211 port 14820 ssh2
Sep  8 18:04:08 ns308116 sshd[7581]: Failed password for root from 185.220.101.211 port 14820 ssh2
Sep  8 18:04:10 ns308116 sshd[7581]: Failed password for root from 185.220.101.211 port 14820 ssh2
...
2020-09-09 01:22:19
79.124.62.55 attackspambots
 TCP (SYN) 79.124.62.55:55339 -> port 3389, len 44
2020-09-09 01:16:33
2.57.122.186 attackbots
 TCP (SYN) 2.57.122.186:55782 -> port 5555, len 44
2020-09-09 01:58:33
91.134.242.199 attackbotsspam
2020-09-08T07:39:16.340663linuxbox-skyline sshd[153327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.242.199  user=root
2020-09-08T07:39:18.596967linuxbox-skyline sshd[153327]: Failed password for root from 91.134.242.199 port 54040 ssh2
...
2020-09-09 01:44:21
222.186.42.155 attackspam
Sep  8 19:51:17 abendstille sshd\[24361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Sep  8 19:51:19 abendstille sshd\[24361\]: Failed password for root from 222.186.42.155 port 56884 ssh2
Sep  8 19:51:25 abendstille sshd\[24599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Sep  8 19:51:27 abendstille sshd\[24599\]: Failed password for root from 222.186.42.155 port 41668 ssh2
Sep  8 19:51:34 abendstille sshd\[24704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
...
2020-09-09 01:57:43
109.132.116.56 attack
Sep  8 10:47:06 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=109.132.116.56, lip=172.104.140.148, session=<4fcZYcmuaulthHQ4>
Sep  8 10:47:12 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=109.132.116.56, lip=172.104.140.148, session=<14c3YcmubulthHQ4>
Sep  8 10:47:12 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=109.132.116.56, lip=172.104.140.148, session=
Sep  8 10:47:23 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=109.132.116.56, lip=172.104.140.148, session=<7cDfYcmud+lthHQ4>
Sep  8 10:47:25 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=109.132.116.56, lip=172.104.140.14
...
2020-09-09 01:56:35
46.41.140.71 attackbots
Sep  8 14:36:26 vps46666688 sshd[6146]: Failed password for root from 46.41.140.71 port 39014 ssh2
...
2020-09-09 01:50:36
81.136.206.92 attackbots
Sep  7 18:40:03 vps34202 sshd[6450]: Invalid user admin from 81.136.206.92
Sep  7 18:40:05 vps34202 sshd[6450]: Failed password for invalid user admin from 81.136.206.92 port 52875 ssh2
Sep  7 18:40:05 vps34202 sshd[6450]: Received disconnect from 81.136.206.92: 11: Bye Bye [preauth]
Sep  7 18:40:06 vps34202 sshd[6452]: Invalid user admin from 81.136.206.92


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.136.206.92
2020-09-09 01:40:52
144.34.165.26 attackbotsspam
SSH bruteforce
2020-09-09 01:37:19
2.57.121.112 attack
Port scanning [4 denied]
2020-09-09 01:22:45

最近上报的IP列表

80.45.91.188 185.191.20.26 230.26.33.214 151.45.46.98
9.129.130.249 164.95.95.234 116.249.0.158 47.187.1.176
76.99.85.135 166.42.135.226 136.123.24.254 217.107.202.93
50.208.174.215 201.168.67.221 252.12.241.22 28.207.229.28
65.198.125.77 201.190.209.125 69.29.98.215 191.46.40.29