必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.150.140.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.150.140.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 16:06:06 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
133.140.150.81.in-addr.arpa domain name pointer host81-150-140-133.in-addr.btopenworld.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.140.150.81.in-addr.arpa	name = host81-150-140-133.in-addr.btopenworld.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.69.180.170 attackbots
Port probing on unauthorized port 445
2020-07-07 22:12:20
141.105.137.53 attack
Unauthorized connection attempt from IP address 141.105.137.53 on Port 445(SMB)
2020-07-07 22:06:27
112.33.55.210 attack
Jul  7 12:36:06 ws26vmsma01 sshd[10266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.55.210
Jul  7 12:36:08 ws26vmsma01 sshd[10266]: Failed password for invalid user hundsun from 112.33.55.210 port 37218 ssh2
...
2020-07-07 22:27:16
177.17.76.248 attack
Unauthorized connection attempt from IP address 177.17.76.248 on Port 445(SMB)
2020-07-07 22:09:14
164.132.98.75 attackbots
Jul  7 13:37:52 localhost sshd[97624]: Invalid user devel from 164.132.98.75 port 57838
Jul  7 13:37:52 localhost sshd[97624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.ip-164-132-98.eu
Jul  7 13:37:52 localhost sshd[97624]: Invalid user devel from 164.132.98.75 port 57838
Jul  7 13:37:54 localhost sshd[97624]: Failed password for invalid user devel from 164.132.98.75 port 57838 ssh2
Jul  7 13:47:34 localhost sshd[98717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.ip-164-132-98.eu  user=root
Jul  7 13:47:35 localhost sshd[98717]: Failed password for root from 164.132.98.75 port 57989 ssh2
...
2020-07-07 22:04:53
202.83.161.119 attackbotsspam
Jul  7 15:32:31 abendstille sshd\[15393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.161.119  user=root
Jul  7 15:32:32 abendstille sshd\[15393\]: Failed password for root from 202.83.161.119 port 36598 ssh2
Jul  7 15:36:40 abendstille sshd\[19555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.161.119  user=root
Jul  7 15:36:42 abendstille sshd\[19555\]: Failed password for root from 202.83.161.119 port 57432 ssh2
Jul  7 15:40:48 abendstille sshd\[23607\]: Invalid user administrador from 202.83.161.119
...
2020-07-07 22:35:49
103.25.134.21 attackbotsspam
2020-07-0714:31:21dovecot_plainauthenticatorfailedfor\([94.74.144.30]\)[94.74.144.30]:42612:535Incorrectauthenticationdata\(set_id=info\)2020-07-0714:04:16dovecot_plainauthenticatorfailedfor\([37.239.111.82]\)[37.239.111.82]:44658:535Incorrectauthenticationdata\(set_id=info\)2020-07-0714:13:37dovecot_plainauthenticatorfailedfor\([177.130.162.234]\)[177.130.162.234]:53663:535Incorrectauthenticationdata\(set_id=info\)2020-07-0714:45:24dovecot_plainauthenticatorfailedfor\([91.222.58.28]\)[91.222.58.28]:41038:535Incorrectauthenticationdata\(set_id=info\)2020-07-0714:24:39dovecot_plainauthenticatorfailedfor\([103.109.178.210]\)[103.109.178.210]:40447:535Incorrectauthenticationdata\(set_id=info\)2020-07-0714:19:22dovecot_plainauthenticatorfailedfor\([91.231.246.232]\)[91.231.246.232]:46394:535Incorrectauthenticationdata\(set_id=info\)2020-07-0714:45:00dovecot_plainauthenticatorfailedfor\([177.130.162.178]\)[177.130.162.178]:54313:535Incorrectauthenticationdata\(set_id=info\)2020-07-0714:43:09dovecot_plainauthentica
2020-07-07 22:40:10
88.200.166.18 attackbots
Unauthorized connection attempt from IP address 88.200.166.18 on Port 445(SMB)
2020-07-07 22:42:04
198.71.237.24 attackspam
Automatic report - XMLRPC Attack
2020-07-07 22:05:49
40.117.147.53 attackspam
RDP Brute-Force (honeypot 3)
2020-07-07 22:39:47
123.206.64.77 attackbots
Total attacks: 2
2020-07-07 22:39:11
145.239.7.56 attack
Jul  7 14:47:30 master sshd[2276]: Failed password for invalid user admin from 145.239.7.56 port 56696 ssh2
2020-07-07 22:20:39
46.38.148.18 attackbotsspam
Jul  7 16:12:01 srv01 postfix/smtpd\[24814\]: warning: unknown\[46.38.148.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 16:12:28 srv01 postfix/smtpd\[24820\]: warning: unknown\[46.38.148.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 16:12:54 srv01 postfix/smtpd\[24069\]: warning: unknown\[46.38.148.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 16:13:20 srv01 postfix/smtpd\[24069\]: warning: unknown\[46.38.148.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 16:13:48 srv01 postfix/smtpd\[24820\]: warning: unknown\[46.38.148.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-07 22:28:52
182.68.190.136 attackspambots
Unauthorized connection attempt from IP address 182.68.190.136 on Port 445(SMB)
2020-07-07 22:32:05
176.97.37.134 attack
Unauthorized connection attempt from IP address 176.97.37.134 on Port 445(SMB)
2020-07-07 22:10:25

最近上报的IP列表

13.44.86.152 73.42.129.26 36.220.95.207 255.69.186.38
134.233.176.232 159.231.237.214 205.17.255.116 89.63.41.183
54.91.128.119 226.248.121.183 150.24.224.246 116.25.225.24
30.211.155.151 122.31.74.29 17.154.145.235 204.20.27.201
162.166.179.2 81.126.39.160 212.85.222.149 85.100.21.43