必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Cluj-Napoca

省份(region): Cluj

国家(country): Romania

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.196.150.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39156
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.196.150.43.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042801 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 10:40:42 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
43.150.196.81.in-addr.arpa domain name pointer 43.150.196.81.static.cluj.rdsnet.ro.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
43.150.196.81.in-addr.arpa	name = 43.150.196.81.static.cluj.rdsnet.ro.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.89.189.176 attack
Invalid user raker from 118.89.189.176 port 46014
2020-05-27 17:01:50
180.76.176.126 attackbotsspam
May 27 06:44:29 lukav-desktop sshd\[6003\]: Invalid user zb from 180.76.176.126
May 27 06:44:29 lukav-desktop sshd\[6003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126
May 27 06:44:31 lukav-desktop sshd\[6003\]: Failed password for invalid user zb from 180.76.176.126 port 41155 ssh2
May 27 06:51:35 lukav-desktop sshd\[6068\]: Invalid user anglais from 180.76.176.126
May 27 06:51:35 lukav-desktop sshd\[6068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126
2020-05-27 16:56:23
103.253.113.173 attackspam
2020-05-27T05:34:42.666620vps773228.ovh.net sshd[14115]: Failed password for invalid user ching from 103.253.113.173 port 36317 ssh2
2020-05-27T05:43:10.784852vps773228.ovh.net sshd[14253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.113.173  user=root
2020-05-27T05:43:13.276364vps773228.ovh.net sshd[14253]: Failed password for root from 103.253.113.173 port 59893 ssh2
2020-05-27T05:51:20.358324vps773228.ovh.net sshd[14354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.113.173  user=root
2020-05-27T05:51:22.118086vps773228.ovh.net sshd[14354]: Failed password for root from 103.253.113.173 port 55237 ssh2
...
2020-05-27 17:07:49
114.34.228.63 attackspambots
port scan and connect, tcp 23 (telnet)
2020-05-27 16:31:43
37.49.226.64 attackbotsspam
May 27 09:15:00 *host* sshd\[27736\]: Unable to negotiate with 37.49.226.64 port 33948: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\]
2020-05-27 16:58:25
106.13.232.67 attackspambots
May 27 05:46:36 serwer sshd\[4533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.67  user=root
May 27 05:46:38 serwer sshd\[4533\]: Failed password for root from 106.13.232.67 port 60224 ssh2
May 27 05:51:44 serwer sshd\[5132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.67  user=root
...
2020-05-27 16:48:42
54.38.240.23 attackbotsspam
2020-05-27T07:51:29.100516  sshd[16037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.240.23
2020-05-27T07:51:29.087187  sshd[16037]: Invalid user abc from 54.38.240.23 port 43540
2020-05-27T07:51:30.197035  sshd[16037]: Failed password for invalid user abc from 54.38.240.23 port 43540 ssh2
2020-05-27T09:52:50.421055  sshd[18942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.240.23  user=root
2020-05-27T09:52:53.072461  sshd[18942]: Failed password for root from 54.38.240.23 port 37884 ssh2
...
2020-05-27 16:49:55
182.151.60.73 attack
Fail2Ban - SSH Bruteforce Attempt
2020-05-27 16:35:46
49.114.143.90 attackspambots
May 27 06:33:56 marvibiene sshd[558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.114.143.90  user=lp
May 27 06:33:58 marvibiene sshd[558]: Failed password for lp from 49.114.143.90 port 46040 ssh2
May 27 06:55:17 marvibiene sshd[1073]: Invalid user chef from 49.114.143.90 port 58556
...
2020-05-27 16:27:48
71.246.210.34 attack
Invalid user ljm from 71.246.210.34 port 41014
2020-05-27 17:03:37
193.186.15.35 attack
May 27 10:28:13 electroncash sshd[64748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.186.15.35  user=root
May 27 10:28:15 electroncash sshd[64748]: Failed password for root from 193.186.15.35 port 38239 ssh2
May 27 10:30:35 electroncash sshd[65418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.186.15.35  user=root
May 27 10:30:37 electroncash sshd[65418]: Failed password for root from 193.186.15.35 port 56953 ssh2
May 27 10:32:54 electroncash sshd[852]: Invalid user quincy from 193.186.15.35 port 47435
...
2020-05-27 16:55:09
106.12.200.70 attack
May 26 23:53:30 pixelmemory sshd[3978342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.200.70 
May 26 23:53:30 pixelmemory sshd[3978342]: Invalid user office from 106.12.200.70 port 50130
May 26 23:53:32 pixelmemory sshd[3978342]: Failed password for invalid user office from 106.12.200.70 port 50130 ssh2
May 26 23:59:06 pixelmemory sshd[3987286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.200.70  user=root
May 26 23:59:08 pixelmemory sshd[3987286]: Failed password for root from 106.12.200.70 port 60162 ssh2
...
2020-05-27 16:52:32
87.251.74.121 attackbots
234 packets to ports 7001 7004 7009 7011 7014 7016 7018 7028 7031 7051 7055 7056 7059 7071 7078 7082 7087 7120 7121 7125 7130 7131 7141 7149 7154 7159 7161 7171 7175 7178 7185 7187 7191 7194 7199 7203 7215 7218 7230 7233 7236 7238 7241 7256 7260 7269 7270 7273, etc.
2020-05-27 16:38:08
77.247.110.58 attack
Port scanning [3 denied]
2020-05-27 16:33:59
207.194.35.197 attackspam
May 27 08:44:31 ns382633 sshd\[10183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.194.35.197  user=root
May 27 08:44:32 ns382633 sshd\[10183\]: Failed password for root from 207.194.35.197 port 46534 ssh2
May 27 08:49:42 ns382633 sshd\[11039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.194.35.197  user=root
May 27 08:49:44 ns382633 sshd\[11039\]: Failed password for root from 207.194.35.197 port 51542 ssh2
May 27 08:51:33 ns382633 sshd\[11622\]: Invalid user martin from 207.194.35.197 port 50804
May 27 08:51:33 ns382633 sshd\[11622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.194.35.197
2020-05-27 16:39:51

最近上报的IP列表

204.11.187.174 60.98.65.46 24.31.226.102 59.149.189.193
108.219.5.106 126.97.117.158 65.193.223.9 111.163.168.147
83.81.48.252 220.199.183.2 52.53.127.214 87.137.251.194
70.176.221.191 146.251.79.76 209.102.153.69 131.151.245.230
148.74.128.178 129.64.0.10 75.35.238.151 2.99.181.155