必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.7.141.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39885
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.7.141.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 14:28:00 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
193.141.7.80.in-addr.arpa domain name pointer wiga-16-b2-v4wan-169333-cust1472.vm29.cable.virginm.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
193.141.7.80.in-addr.arpa	name = wiga-16-b2-v4wan-169333-cust1472.vm29.cable.virginm.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.103.77.90 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-15 17:12:42
108.162.28.6 attackspam
(imapd) Failed IMAP login from 108.162.28.6 (US/United States/ool-6ca21c06.static.optonline.net): 1 in the last 3600 secs
2020-05-15 17:49:55
180.166.229.4 attackspambots
May 15 06:57:41 IngegnereFirenze sshd[4929]: Failed password for invalid user rust from 180.166.229.4 port 34200 ssh2
...
2020-05-15 17:29:52
193.254.225.87 attackbotsspam
SMB Server BruteForce Attack
2020-05-15 17:17:58
110.80.155.247 attack
China's GFW probe
2020-05-15 17:37:04
222.186.175.215 attackspambots
May 15 11:44:24 ns381471 sshd[8007]: Failed password for root from 222.186.175.215 port 17540 ssh2
May 15 11:44:36 ns381471 sshd[8007]: error: maximum authentication attempts exceeded for root from 222.186.175.215 port 17540 ssh2 [preauth]
2020-05-15 17:45:58
82.64.9.197 attackbotsspam
Invalid user talita from 82.64.9.197 port 52744
2020-05-15 17:40:01
221.11.20.174 attack
China's GFW probe
2020-05-15 17:34:03
41.223.4.155 attackspam
Invalid user ftptest from 41.223.4.155 port 54568
2020-05-15 17:21:19
185.51.114.30 attackbots
20/5/14@23:50:44: FAIL: Alarm-Network address from=185.51.114.30
...
2020-05-15 17:39:24
5.9.140.242 attackspam
20 attempts against mh-misbehave-ban on comet
2020-05-15 17:44:20
162.243.139.95 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-15 17:12:15
112.217.207.130 attack
Invalid user user from 112.217.207.130 port 46064
2020-05-15 17:48:42
87.251.74.200 attack
May 15 10:47:34 debian-2gb-nbg1-2 kernel: \[11791304.581475\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.200 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=31276 PROTO=TCP SPT=49053 DPT=14681 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-15 17:11:25
112.66.102.154 attackbots
China's GFW probe
2020-05-15 17:33:32

最近上报的IP列表

238.198.67.178 142.7.246.92 203.68.187.34 106.225.214.151
239.13.1.247 115.173.200.95 140.39.148.19 189.130.189.192
98.13.176.7 251.154.94.79 227.200.83.0 174.68.55.90
253.0.19.228 86.243.2.139 81.37.60.110 230.108.86.188
214.112.197.102 217.97.158.120 169.243.173.150 247.53.141.191