必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.116.136.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.116.136.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:53:47 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
8.136.116.81.in-addr.arpa domain name pointer host-81-116-136-8.business.telecomitalia.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.136.116.81.in-addr.arpa	name = host-81-116-136-8.business.telecomitalia.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.102.51.95 attackspambots
Port scan on 6 port(s): 12192 26095 31623 41608 54544 59228
2020-08-06 19:16:23
141.98.10.198 attackspambots
Aug  6 12:40:58 inter-technics sshd[4875]: Invalid user Administrator from 141.98.10.198 port 40683
Aug  6 12:40:58 inter-technics sshd[4875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.198
Aug  6 12:40:58 inter-technics sshd[4875]: Invalid user Administrator from 141.98.10.198 port 40683
Aug  6 12:41:00 inter-technics sshd[4875]: Failed password for invalid user Administrator from 141.98.10.198 port 40683 ssh2
Aug  6 12:41:33 inter-technics sshd[4957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.198  user=root
Aug  6 12:41:35 inter-technics sshd[4957]: Failed password for root from 141.98.10.198 port 34441 ssh2
...
2020-08-06 19:00:20
188.148.136.99 attackspam
SSH Scan
2020-08-06 19:17:34
51.254.248.18 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 41 - port: 20637 proto: tcp cat: Misc Attackbytes: 60
2020-08-06 19:12:07
222.186.175.163 attackbots
Aug  6 13:07:53 pve1 sshd[19356]: Failed password for root from 222.186.175.163 port 45964 ssh2
Aug  6 13:07:58 pve1 sshd[19356]: Failed password for root from 222.186.175.163 port 45964 ssh2
...
2020-08-06 19:14:12
194.26.29.96 attack
 TCP (SYN) 194.26.29.96:40301 -> port 8146, len 44
2020-08-06 18:43:44
114.35.54.71 attackspambots
Port probing on unauthorized port 23
2020-08-06 19:03:59
69.162.79.242 attackbots
Attempt to hack Wordpress Login, XMLRPC or other login
2020-08-06 19:21:44
203.86.7.110 attackspambots
DATE:2020-08-06 12:38:53,IP:203.86.7.110,MATCHES:10,PORT:ssh
2020-08-06 19:02:33
54.38.211.228 attack
 TCP (SYN) 54.38.211.228:45996 -> port 3389, len 40
2020-08-06 18:42:31
51.158.70.82 attackbots
2020-08-05 UTC: (41x) - root(41x)
2020-08-06 19:22:38
37.49.224.49 attackbots
 TCP (SYN) 37.49.224.49:43641 -> port 5038, len 44
2020-08-06 18:47:46
115.159.157.103 attack
Unauthorised access (Aug  6) SRC=115.159.157.103 LEN=40 TTL=236 ID=20925 TCP DPT=1433 WINDOW=1024 SYN
2020-08-06 19:13:29
176.74.13.170 attack
SSH Bruteforce
2020-08-06 18:59:43
36.72.16.216 attack
20/8/6@01:19:30: FAIL: Alarm-Network address from=36.72.16.216
20/8/6@01:19:30: FAIL: Alarm-Network address from=36.72.16.216
...
2020-08-06 19:13:08

最近上报的IP列表

187.194.156.244 128.50.219.80 93.40.30.79 36.64.177.17
25.153.205.205 145.242.160.16 43.169.11.40 130.67.97.157
99.78.109.234 18.252.68.146 83.55.90.247 228.114.45.227
124.97.138.2 98.35.198.221 228.177.253.22 146.185.33.17
147.196.200.153 148.153.75.33 9.72.228.222 80.148.118.255