必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.159.20.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.159.20.47.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120901 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 06:07:00 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
47.20.159.81.in-addr.arpa domain name pointer host81-159-20-47.range81-159.btcentralplus.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
47.20.159.81.in-addr.arpa	name = host81-159-20-47.range81-159.btcentralplus.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.170.139.169 attackspambots
Jul 14 13:21:46 bouncer sshd\[26202\]: Invalid user ubuntu from 200.170.139.169 port 33152
Jul 14 13:21:46 bouncer sshd\[26202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.170.139.169 
Jul 14 13:21:48 bouncer sshd\[26202\]: Failed password for invalid user ubuntu from 200.170.139.169 port 33152 ssh2
...
2019-07-15 04:26:18
222.127.30.130 attackbots
Jul 14 21:34:56 vmd38886 sshd\[32252\]: Invalid user sleepy from 222.127.30.130 port 3686
Jul 14 21:34:56 vmd38886 sshd\[32252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.30.130
Jul 14 21:34:58 vmd38886 sshd\[32252\]: Failed password for invalid user sleepy from 222.127.30.130 port 3686 ssh2
2019-07-15 03:48:28
51.38.152.200 attackbots
Jul 14 19:54:13 vps647732 sshd[16726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.152.200
Jul 14 19:54:15 vps647732 sshd[16726]: Failed password for invalid user peter from 51.38.152.200 port 53954 ssh2
...
2019-07-15 03:58:36
157.230.110.62 attack
recursive dns scanner
2019-07-15 04:14:14
192.241.181.125 attackspam
7/tcp 4369/tcp 5094/udp...
[2019-05-23/07-14]95pkt,73pt.(tcp),1pt.(udp)
2019-07-15 04:15:28
118.163.149.163 attackspam
Automatic report - Banned IP Access
2019-07-15 04:25:31
37.47.34.10 attackbots
2019-07-14T12:09:08.401234MailD x@x
2019-07-14T12:09:10.048547MailD x@x
2019-07-14T12:09:11.366398MailD x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.47.34.10
2019-07-15 03:58:55
139.59.106.82 attackspambots
Jul 14 20:08:02 core01 sshd\[22516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.106.82  user=list
Jul 14 20:08:04 core01 sshd\[22516\]: Failed password for list from 139.59.106.82 port 57090 ssh2
...
2019-07-15 03:50:47
191.53.220.168 attackbotsspam
$f2bV_matches
2019-07-15 03:54:01
41.32.223.149 attack
Jul 14 12:12:56 server378 sshd[1181224]: Did not receive identification string from 41.32.223.149
Jul 14 12:13:01 server378 sshd[1181225]: reveeclipse mapping checking getaddrinfo for host-41.32.223.149.tedata.net [41.32.223.149] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 14 12:13:01 server378 sshd[1181225]: Invalid user adminixxxr from 41.32.223.149
Jul 14 12:13:01 server378 sshd[1181225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.32.223.149
Jul 14 12:13:04 server378 sshd[1181225]: Failed password for invalid user adminixxxr from 41.32.223.149 port 55559 ssh2
Jul 14 12:13:04 server378 sshd[1181225]: Connection closed by 41.32.223.149 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.32.223.149
2019-07-15 04:06:57
167.86.69.26 attackbots
WordPress brute force
2019-07-15 04:28:02
185.176.27.42 attackbots
14.07.2019 17:53:00 Connection to port 4324 blocked by firewall
2019-07-15 03:50:02
206.189.151.97 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-07-15 04:04:08
177.85.116.242 attackspambots
Jul 14 14:09:39 aat-srv002 sshd[13803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.85.116.242
Jul 14 14:09:42 aat-srv002 sshd[13803]: Failed password for invalid user git from 177.85.116.242 port 11270 ssh2
Jul 14 14:24:47 aat-srv002 sshd[14097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.85.116.242
Jul 14 14:24:48 aat-srv002 sshd[14097]: Failed password for invalid user catchall from 177.85.116.242 port 48823 ssh2
...
2019-07-15 04:16:45
189.91.3.135 attack
Currently 7 failed/unauthorized logins attempts via SMTP/IMAP whostnameh 5 different usernames and wrong password:
2019-07-14T12:12:58+02:00 x@x
2019-07-13T17:32:51+02:00 x@x
2019-07-11T19:36:36+02:00 x@x
2019-07-11T19:12:55+02:00 x@x
2019-07-11T17:40:35+02:00 x@x
2019-07-10T21:45:26+02:00 x@x
2019-06-23T09:18:59+02:00 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=189.91.3.135
2019-07-15 04:04:28

最近上报的IP列表

61.180.239.0 227.61.177.186 63.27.48.240 252.167.63.234
191.214.154.6 56.225.204.165 144.155.196.66 174.161.41.112
155.145.32.193 166.179.89.227 52.125.142.35 185.249.104.99
138.22.9.96 255.9.54.69 243.100.233.8 187.200.140.27
122.60.37.123 210.102.189.46 217.178.130.142 117.0.180.246