必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kwai Chung

省份(region): Kwai Tsing New Territories

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '81.181.132.0 - 81.181.135.255'

% Abuse contact for '81.181.132.0 - 81.181.135.255' is 'abuse@lir.ro'

inetnum:        81.181.132.0 - 81.181.135.255
netname:        TEEN-TELECOM-24
descr:          Teen Telecom SRL
descr:          Str. G-ral Gheorghe Lupu, Nr. 22
descr:          Sector 4, Bucuresti
country:        RO
geofeed:        https://teentelecom.com/geofeed.csv
admin-c:        LP12052-RIPE
tech-c:         LP12052-RIPE
mnt-routes:     TEEN-MNT
status:         ASSIGNED PA
mnt-by:         AS3233-MNT
created:        2024-02-13T12:58:28Z
last-modified:  2025-07-29T05:58:26Z
source:         RIPE # Filtered

person:         Liviu Poenaru
address:        Complex Agroindustrial Unirea II, Corp A, et 1, camera 1
address:        030605
address:        Bucharest
address:        ROMANIA
phone:          +40213142299
nic-hdl:        LP12052-RIPE
mnt-by:         TEEN-MNT
created:        2018-12-27T15:01:21Z
last-modified:  2018-12-27T15:01:21Z
source:         RIPE

% Information related to '81.181.132.0/22AS47690'

route:          81.181.132.0/22
origin:         AS47690
descr:          TNG-NET
mnt-by:         TEEN-MNT
created:        2025-07-29T07:05:10Z
last-modified:  2025-07-29T07:05:10Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.181.135.255
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.181.135.255.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 15:22:55 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 255.135.181.81.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 81.181.135.255.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
95.130.168.234 attack
Mar  1 23:19:48 vpn01 sshd[16297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.130.168.234
Mar  1 23:19:50 vpn01 sshd[16297]: Failed password for invalid user user1 from 95.130.168.234 port 46722 ssh2
...
2020-03-02 06:38:51
223.152.134.51 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:26:15
163.172.62.124 attackspam
$f2bV_matches
2020-03-02 06:01:19
101.16.139.68 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-02 06:23:23
203.137.182.54 attackbotsspam
Fail2Ban Ban Triggered
2020-03-02 06:25:43
220.130.250.187 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:35:43
165.227.65.140 attackbots
Unauthorized connection attempt detected from IP address 165.227.65.140 to port 8545 [J]
2020-03-02 06:06:04
221.228.203.170 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:32:57
152.136.222.162 attack
Mar  1 23:13:38 ns381471 sshd[7637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.222.162
Mar  1 23:13:41 ns381471 sshd[7637]: Failed password for invalid user mq from 152.136.222.162 port 44063 ssh2
2020-03-02 06:19:02
112.85.42.188 attackspambots
03/01/2020-17:23:23.178110 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-02 06:24:14
165.227.67.64 attack
Mar  1 17:02:39 plusreed sshd[25440]: Invalid user kristof from 165.227.67.64
...
2020-03-02 06:14:47
45.143.221.45 attackspambots
45.143.221.45 was recorded 5 times by 2 hosts attempting to connect to the following ports: 5062,15060,5160,5066,5060. Incident counter (4h, 24h, all-time): 5, 7, 51
2020-03-02 06:21:41
221.1.154.15 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 06:34:52
101.25.128.90 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-02 06:01:44
101.22.123.54 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-02 06:03:15

最近上报的IP列表

31.169.82.68 57.141.16.97 35.208.217.108 202.144.137.94
110.78.153.121 2606:4700:10::6814:5318 2606:4700:10::6816:4140 20.221.68.74
10.223.24.110 119.28.100.147 134.35.157.43 2606:4700:10::6814:8420
2003:d6:a729:7200:81d8:b8be:f73d:9c8a 99.10.76.25 34.85.82.221 35.187.220.208
43.156.18.240 2606:4700:10::6814:6575 69.189.152.90 204.0.23.7