必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Rosiorii de Vede

省份(region): Teleorman

国家(country): Romania

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.196.19.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.196.19.29.			IN	A

;; AUTHORITY SECTION:
.			568	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100901 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 10 03:47:33 CST 2019
;; MSG SIZE  rcvd: 116
HOST信息:
29.19.196.81.in-addr.arpa domain name pointer 81-196-19-29.rdsnet.ro.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.19.196.81.in-addr.arpa	name = 81-196-19-29.rdsnet.ro.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.122.148.204 attack
Unauthorized access detected from black listed ip!
2020-05-03 17:08:41
80.82.78.192 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 66 - port: 5181 proto: TCP cat: Misc Attack
2020-05-03 17:15:33
13.90.249.129 attackbots
May  3 09:36:43 DAAP sshd[29768]: Invalid user mahesh from 13.90.249.129 port 53194
May  3 09:36:43 DAAP sshd[29768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.90.249.129
May  3 09:36:43 DAAP sshd[29768]: Invalid user mahesh from 13.90.249.129 port 53194
May  3 09:36:45 DAAP sshd[29768]: Failed password for invalid user mahesh from 13.90.249.129 port 53194 ssh2
May  3 09:43:24 DAAP sshd[29896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.90.249.129  user=root
May  3 09:43:26 DAAP sshd[29896]: Failed password for root from 13.90.249.129 port 44080 ssh2
...
2020-05-03 17:20:58
218.92.0.145 attackspam
prod8
...
2020-05-03 17:05:17
142.93.53.113 attackbots
May  3 11:06:13 debian-2gb-nbg1-2 kernel: \[10755677.222658\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=142.93.53.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=29840 PROTO=TCP SPT=48732 DPT=15885 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-03 17:29:00
13.78.131.155 attack
Automatic report - XMLRPC Attack
2020-05-03 17:23:28
178.141.201.161 attackbotsspam
firewall-block, port(s): 23/tcp
2020-05-03 17:32:14
167.71.175.204 attackspambots
167.71.175.204 - - [03/May/2020:10:08:08 +0200] "GET /wp-login.php HTTP/1.1" 200 6435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.175.204 - - [03/May/2020:10:08:09 +0200] "POST /wp-login.php HTTP/1.1" 200 6686 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.71.175.204 - - [03/May/2020:10:08:11 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-03 17:21:20
37.187.197.113 attackspam
37.187.197.113 - - [03/May/2020:10:34:02 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.187.197.113 - - [03/May/2020:10:34:03 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.187.197.113 - - [03/May/2020:10:34:03 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-03 17:24:24
157.245.42.253 attack
05/03/2020-08:37:19.081794 157.245.42.253 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-05-03 17:25:46
45.164.40.102 attackbots
Unauthorized access detected from black listed ip!
2020-05-03 17:20:35
80.82.78.96 attack
May  3 11:04:06 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.78.96, lip=185.118.197.126, session=
May  3 11:06:12 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.78.96, lip=185.118.197.126, session=
May  3 11:06:50 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.78.96, lip=185.118.197.126, session=
May  3 11:09:26 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.78.96, lip=185.118.197.126, session=
May  3 11:09:48 mail.srvfarm.net dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.78.96, lip=185.
2020-05-03 17:33:09
195.28.70.220 attack
5x Failed Password
2020-05-03 17:39:43
129.211.51.65 attackbotsspam
Failed password for invalid user nagios from 129.211.51.65 port 62971 ssh2
2020-05-03 17:09:06
106.13.52.234 attackbotsspam
Invalid user jose from 106.13.52.234 port 33796
2020-05-03 17:20:15

最近上报的IP列表

107.133.11.169 35.178.202.189 36.71.45.84 149.233.208.37
147.75.72.105 154.225.148.120 174.80.106.11 188.152.9.128
51.91.110.151 216.57.240.203 32.119.146.27 188.133.58.138
90.175.41.47 151.20.45.12 105.61.224.108 174.138.23.45
66.209.240.83 195.209.208.20 182.189.141.126 221.143.38.88