必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Zhukovsky

省份(region): Moscow (Province)

国家(country): Russia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.1.138.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.1.138.146.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 19:03:41 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 146.138.1.81.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.138.1.81.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.23.198 attack
" "
2020-05-15 23:36:32
193.56.28.208 attackbotsspam
May 14 13:16:04 web postfix/smtpd\[28099\]: warning: unknown\[193.56.28.208\]: SASL LOGIN authentication failed: authentication failureMay 14 13:33:27 web postfix/smtpd\[30366\]: warning: unknown\[193.56.28.208\]: SASL LOGIN authentication failed: authentication failureMay 14 13:51:32 web postfix/smtpd\[32052\]: warning: unknown\[193.56.28.208\]: SASL LOGIN authentication failed: authentication failureMay 14 14:11:03 web postfix/smtpd\[7972\]: warning: unknown\[193.56.28.208\]: SASL LOGIN authentication failed: authentication failureMay 14 14:30:16 web postfix/smtpd\[10811\]: warning: unknown\[193.56.28.208\]: SASL LOGIN authentication failed: authentication failureMay 14 14:49:29 web postfix/smtpd\[12768\]: warning: unknown\[193.56.28.208\]: SASL LOGIN authentication failed: authentication failureMay 15 15:05:54 web postfix/smtpd\[19204\]: warning: unknown\[193.56.28.208\]: SASL LOGIN authentication failed: authentication failureMay 15 15:23:26 web postfix/smtpd\[21074\]: warning: unk
...
2020-05-15 23:22:47
181.30.28.83 attackbotsspam
May 13 21:06:36 zulu1842 sshd[7677]: reveeclipse mapping checking getaddrinfo for 83-28-30-181.fibertel.com.ar [181.30.28.83] failed - POSSIBLE BREAK-IN ATTEMPT!
May 13 21:06:36 zulu1842 sshd[7677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.83  user=r.r
May 13 21:06:37 zulu1842 sshd[7677]: Failed password for r.r from 181.30.28.83 port 44870 ssh2
May 13 21:06:37 zulu1842 sshd[7677]: Received disconnect from 181.30.28.83: 11: Bye Bye [preauth]
May 13 22:00:18 zulu1842 sshd[11437]: reveeclipse mapping checking getaddrinfo for 83-28-30-181.fibertel.com.ar [181.30.28.83] failed - POSSIBLE BREAK-IN ATTEMPT!
May 13 22:00:18 zulu1842 sshd[11437]: Invalid user user1 from 181.30.28.83
May 13 22:00:18 zulu1842 sshd[11437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.83 
May 13 22:00:19 zulu1842 sshd[11437]: Failed password for invalid user user1 from 181.30.28.83 port 386........
-------------------------------
2020-05-15 23:25:26
160.16.144.52 attack
(smtpauth) Failed SMTP AUTH login from 160.16.144.52 (JP/Japan/tk2-408-45048.vs.sakura.ne.jp): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-15 16:55:19 login authenticator failed for tk2-408-45048.vs.sakura.ne.jp (ADMIN) [160.16.144.52]: 535 Incorrect authentication data (set_id=test@nazeranyekta.ir)
2020-05-15 23:24:04
114.242.117.12 attackbotsspam
2020-05-15T08:12:27.477660linuxbox-skyline sshd[23950]: Invalid user iolanda from 114.242.117.12 port 58978
...
2020-05-15 23:43:50
178.33.12.237 attackbots
May 15 17:23:12 meumeu sshd[14224]: Invalid user hldmsserver from 178.33.12.237 port 55589
May 15 17:23:12 meumeu sshd[14224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.12.237 
May 15 17:23:12 meumeu sshd[14224]: Invalid user hldmsserver from 178.33.12.237 port 55589
May 15 17:23:13 meumeu sshd[14224]: Failed password for invalid user hldmsserver from 178.33.12.237 port 55589 ssh2
May 15 17:26:34 meumeu sshd[15844]: Invalid user test2 from 178.33.12.237 port 45971
May 15 17:26:34 meumeu sshd[15844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.12.237 
May 15 17:26:34 meumeu sshd[15844]: Invalid user test2 from 178.33.12.237 port 45971
May 15 17:26:37 meumeu sshd[15844]: Failed password for invalid user test2 from 178.33.12.237 port 45971 ssh2
May 15 17:30:20 meumeu sshd[16502]: Invalid user 10091009 from 178.33.12.237 port 43654
...
2020-05-15 23:46:02
220.129.149.177 attackspam
Telnet Server BruteForce Attack
2020-05-15 23:50:09
123.207.249.145 attackspam
May 15 14:15:50 vps687878 sshd\[8020\]: Failed password for invalid user test from 123.207.249.145 port 55616 ssh2
May 15 14:20:24 vps687878 sshd\[8481\]: Invalid user eric from 123.207.249.145 port 49518
May 15 14:20:24 vps687878 sshd\[8481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.249.145
May 15 14:20:26 vps687878 sshd\[8481\]: Failed password for invalid user eric from 123.207.249.145 port 49518 ssh2
May 15 14:24:45 vps687878 sshd\[8730\]: Invalid user server from 123.207.249.145 port 43422
May 15 14:24:45 vps687878 sshd\[8730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.249.145
...
2020-05-15 23:31:32
113.174.55.245 attackbots
Automatic report - Port Scan Attack
2020-05-15 23:49:47
210.5.151.231 attackbots
May 15 19:20:23 itv-usvr-01 sshd[17176]: Invalid user enrique from 210.5.151.231
May 15 19:20:23 itv-usvr-01 sshd[17176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.5.151.231
May 15 19:20:23 itv-usvr-01 sshd[17176]: Invalid user enrique from 210.5.151.231
May 15 19:20:24 itv-usvr-01 sshd[17176]: Failed password for invalid user enrique from 210.5.151.231 port 36267 ssh2
May 15 19:25:19 itv-usvr-01 sshd[17389]: Invalid user test from 210.5.151.231
2020-05-15 23:30:19
103.148.150.4 attack
RDP Brute-Force (Grieskirchen RZ2)
2020-05-16 00:01:54
69.28.234.137 attackbots
" "
2020-05-15 23:47:34
49.235.203.242 attackbotsspam
$f2bV_matches
2020-05-15 23:40:29
197.238.143.11 attack
port scan and connect, tcp 23 (telnet)
2020-05-15 23:33:24
105.212.94.49 attackspam
Automatic report - Port Scan Attack
2020-05-15 23:18:39

最近上报的IP列表

123.33.215.134 21.237.161.128 232.131.177.235 246.41.192.61
159.44.10.204 234.131.144.236 38.114.223.2 255.73.193.250
223.46.149.201 234.204.88.20 92.224.17.26 204.7.187.65
65.35.222.38 65.94.141.40 93.74.134.23 55.179.173.62
89.84.80.229 72.17.216.74 180.93.198.221 123.185.44.20