必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.135.95.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58325
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.135.95.145.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 06:32:09 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
145.95.135.81.in-addr.arpa domain name pointer host81-135-95-145.range81-135.btcentralplus.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.95.135.81.in-addr.arpa	name = host81-135-95-145.range81-135.btcentralplus.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.29.13.20 attackbotsspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-10-27 16:50:17
91.215.244.12 attackspam
Invalid user fachbereich from 91.215.244.12 port 41404
2019-10-27 16:22:35
156.208.17.6 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/156.208.17.6/ 
 
 EG - 1H : (31)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EG 
 NAME ASN : ASN8452 
 
 IP : 156.208.17.6 
 
 CIDR : 156.208.0.0/18 
 
 PREFIX COUNT : 833 
 
 UNIQUE IP COUNT : 7610368 
 
 
 ATTACKS DETECTED ASN8452 :  
  1H - 12 
  3H - 23 
  6H - 23 
 12H - 27 
 24H - 27 
 
 DateTime : 2019-10-27 04:50:32 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-27 16:38:06
77.247.110.161 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 9754 proto: TCP cat: Misc Attack
2019-10-27 16:29:38
218.4.169.82 attackspambots
fail2ban
2019-10-27 16:22:54
159.192.133.106 attackspam
Oct 27 01:58:55 firewall sshd[29416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.133.106
Oct 27 01:58:55 firewall sshd[29416]: Invalid user voravut from 159.192.133.106
Oct 27 01:58:57 firewall sshd[29416]: Failed password for invalid user voravut from 159.192.133.106 port 49681 ssh2
...
2019-10-27 16:14:56
119.29.119.151 attackbots
Oct 26 18:33:12 php1 sshd\[8483\]: Invalid user ozzy from 119.29.119.151
Oct 26 18:33:12 php1 sshd\[8483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.119.151
Oct 26 18:33:14 php1 sshd\[8483\]: Failed password for invalid user ozzy from 119.29.119.151 port 34000 ssh2
Oct 26 18:38:42 php1 sshd\[9070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.119.151  user=root
Oct 26 18:38:44 php1 sshd\[9070\]: Failed password for root from 119.29.119.151 port 41424 ssh2
2019-10-27 16:51:03
46.105.124.52 attackspam
invalid user
2019-10-27 16:43:27
200.149.1.106 attackbotsspam
(From webuydomains@bigwidewebpro.com) Dear owner for bafilefamilychiro.com,

We came across your site and wanted to see are you considering selling your domain and website?

If you have considered it could you let us know by going to bigwidewebpro.com for additional info on what we would like to buy.

We would just have a few questions to help us make a proper offer for your site, look forward to hearing!

Thanks
James Harrison
bigwidewebpro.com
2019-10-27 16:33:05
109.91.37.227 attackspam
Looking for resource vulnerabilities
2019-10-27 16:42:19
113.210.98.241 attackbots
PHI,WP GET /wp-login.php
2019-10-27 16:49:34
54.39.246.33 attackbotsspam
2019-10-27T06:10:39.421556shield sshd\[2103\]: Invalid user lwen from 54.39.246.33 port 35924
2019-10-27T06:10:39.431458shield sshd\[2103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip33.ip-54-39-246.net
2019-10-27T06:10:41.582464shield sshd\[2103\]: Failed password for invalid user lwen from 54.39.246.33 port 35924 ssh2
2019-10-27T06:14:39.993345shield sshd\[3567\]: Invalid user vncuser from 54.39.246.33 port 49034
2019-10-27T06:14:40.000356shield sshd\[3567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip33.ip-54-39-246.net
2019-10-27 16:26:47
187.0.221.222 attackspambots
Oct 27 06:54:34 cvbnet sshd[27582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.0.221.222 
Oct 27 06:54:35 cvbnet sshd[27582]: Failed password for invalid user yzy9136 from 187.0.221.222 port 42416 ssh2
...
2019-10-27 16:41:51
195.231.67.105 attackbots
2019-10-27T07:13:28.601851abusebot-8.cloudsearch.cf sshd\[8624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.67.105  user=root
2019-10-27 16:33:20
182.84.66.165 attackbots
2019-10-26 22:49:54 dovecot_login authenticator failed for (glibswqzdl.com) [182.84.66.165]:53968 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-10-26 22:50:02 dovecot_login authenticator failed for (glibswqzdl.com) [182.84.66.165]:54375 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-10-26 22:50:14 dovecot_login authenticator failed for (glibswqzdl.com) [182.84.66.165]:54979 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
...
2019-10-27 16:47:42

最近上报的IP列表

198.145.163.252 28.117.122.130 223.130.112.53 61.120.163.80
129.108.47.88 213.161.66.87 177.178.31.161 91.226.138.135
226.50.194.203 38.24.183.228 104.169.71.94 101.93.48.127
131.17.204.174 88.95.126.116 168.73.228.19 86.132.238.200
80.219.97.87 22.89.205.145 103.234.150.103 169.69.198.42