必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Alcobaça

省份(region): Leiria

国家(country): Portugal

运营商(isp): PT Comunicacoes S.A.

主机名(hostname): unknown

机构(organization): Servicos De Comunicacoes E Multimedia S.A.

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
2019-07-03 15:12:56 unexpected disconnection while reading SMTP command from bl4-147-116.dsl.telepac.pt [81.193.147.116]:13909 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-03 15:13:13 unexpected disconnection while reading SMTP command from bl4-147-116.dsl.telepac.pt [81.193.147.116]:24338 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-03 15:13:19 unexpected disconnection while reading SMTP command from bl4-147-116.dsl.telepac.pt [81.193.147.116]:24139 I=[10.100.18.21]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.193.147.116
2019-07-04 01:17:36
相同子网IP讨论:
IP 类型 评论内容 时间
81.193.147.69 attackspam
unauthorized connection attempt
2020-02-19 18:04:56
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.193.147.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27409
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.193.147.116.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070302 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 04 01:17:28 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
116.147.193.81.in-addr.arpa domain name pointer bl4-147-116.dsl.telepac.pt.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
116.147.193.81.in-addr.arpa	name = bl4-147-116.dsl.telepac.pt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.235.171.114 attack
Invalid user ubuntu from 124.235.171.114 port 32637
2020-04-24 08:04:14
60.12.124.24 attack
$f2bV_matches
2020-04-24 07:50:47
222.186.175.216 attack
Apr 24 01:50:18 server sshd[5388]: Failed none for root from 222.186.175.216 port 57304 ssh2
Apr 24 01:50:21 server sshd[5388]: Failed password for root from 222.186.175.216 port 57304 ssh2
Apr 24 01:50:24 server sshd[5388]: Failed password for root from 222.186.175.216 port 57304 ssh2
2020-04-24 07:54:46
85.93.20.34 attackspam
1 attempts against mh-modsecurity-ban on sand
2020-04-24 07:33:54
136.49.109.217 attack
Invalid user admin123 from 136.49.109.217 port 50546
2020-04-24 07:39:18
103.84.9.96 attack
Invalid user test from 103.84.9.96 port 39388
2020-04-24 07:42:43
111.68.104.156 attack
Invalid user ji from 111.68.104.156 port 3455
2020-04-24 07:33:07
185.156.73.45 attack
Multiport scan : 7 ports scanned 8188 8189 8222 8390 8399 8444 8489
2020-04-24 07:46:05
13.78.236.55 attackbotsspam
2020-04-23T17:20:45Z - RDP login failed multiple times. (13.78.236.55)
2020-04-24 07:31:46
94.41.10.126 attackspam
Port probing on unauthorized port 9530
2020-04-24 07:53:47
162.243.128.185 attack
9080/tcp 3050/tcp 7473/tcp...
[2020-03-14/04-22]34pkt,29pt.(tcp)
2020-04-24 07:53:16
202.147.198.154 attackspambots
SSH Invalid Login
2020-04-24 07:41:20
118.89.69.159 attackspam
Invalid user gituser from 118.89.69.159 port 53572
2020-04-24 07:56:00
163.44.149.177 attackbots
Invalid user fn from 163.44.149.177 port 33248
2020-04-24 07:38:58
137.117.245.201 attack
Repeated RDP login failures. Last user: administrator
2020-04-24 07:52:26

最近上报的IP列表

4.40.165.33 157.55.39.110 210.145.44.72 106.51.80.18
55.100.21.232 99.170.203.175 40.89.142.211 73.159.12.72
202.47.188.204 103.18.0.34 31.206.222.24 154.102.113.184
8.155.80.222 207.33.61.173 113.211.41.117 103.133.105.244
14.139.18.90 178.138.97.98 113.4.182.125 81.213.67.54