必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Joensuu

省份(region): Pohjois-Karjala [Finnish] / Norra Karelen [Swedish]

国家(country): Finland

运营商(isp): Elisa

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.197.42.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.197.42.78.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 11:27:38 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
78.42.197.81.in-addr.arpa domain name pointer 81-197-42-78.elisa-laajakaista.fi.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
78.42.197.81.in-addr.arpa	name = 81-197-42-78.elisa-laajakaista.fi.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.99.141.237 attackspambots
Detected by Maltrail
2019-11-14 09:07:15
222.119.97.84 attack
23/tcp 23/tcp
[2019-10-28/11-14]2pkt
2019-11-14 13:08:13
185.43.209.236 attackspambots
Nov 13 22:48:41 heicom postfix/smtpd\[13969\]: warning: unknown\[185.43.209.236\]: SASL LOGIN authentication failed: authentication failure
Nov 13 22:48:41 heicom postfix/smtpd\[13969\]: warning: unknown\[185.43.209.236\]: SASL LOGIN authentication failed: authentication failure
Nov 13 22:48:41 heicom postfix/smtpd\[13969\]: warning: unknown\[185.43.209.236\]: SASL LOGIN authentication failed: authentication failure
Nov 13 22:48:41 heicom postfix/smtpd\[13969\]: warning: unknown\[185.43.209.236\]: SASL LOGIN authentication failed: authentication failure
Nov 13 22:56:58 heicom postfix/smtpd\[14132\]: warning: unknown\[185.43.209.236\]: SASL LOGIN authentication failed: authentication failure
...
2019-11-14 09:16:49
37.59.63.219 attackbotsspam
Detected by Maltrail
2019-11-14 09:14:41
190.13.136.237 attackbots
Detected by Maltrail
2019-11-14 09:00:00
202.147.171.59 attackspambots
Port Scan 1433
2019-11-14 13:09:54
54.194.101.134 attackspam
Looking for resource vulnerabilities
2019-11-14 13:06:38
178.238.227.208 attack
Portscan or hack attempt detected by psad/fwsnort
2019-11-14 09:02:11
74.219.184.26 attackspam
Email IMAP login failure
2019-11-14 09:21:13
185.151.6.252 attackbotsspam
Nov 14 01:39:24 server sshd\[19350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.151.6.252  user=root
Nov 14 01:39:26 server sshd\[19350\]: Failed password for root from 185.151.6.252 port 49114 ssh2
Nov 14 01:56:44 server sshd\[23947\]: Invalid user orner from 185.151.6.252
Nov 14 01:56:44 server sshd\[23947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.151.6.252 
Nov 14 01:56:46 server sshd\[23947\]: Failed password for invalid user orner from 185.151.6.252 port 49768 ssh2
...
2019-11-14 09:28:14
103.121.57.6 attackbotsspam
Detected by Maltrail
2019-11-14 09:09:27
173.249.51.143 attack
Detected by Maltrail
2019-11-14 09:02:58
87.18.139.157 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-14 09:20:50
120.92.138.124 attackbotsspam
Automatic report - Banned IP Access
2019-11-14 13:08:58
89.248.168.202 attack
89.248.168.202 was recorded 54 times by 19 hosts attempting to connect to the following ports: 52389,50389,59389,57389,55389,56389,54389,51389,58389. Incident counter (4h, 24h, all-time): 54, 393, 4001
2019-11-14 09:27:28

最近上报的IP列表

224.138.55.168 141.90.93.167 128.195.182.163 202.203.142.38
1.108.211.248 23.188.235.45 221.31.109.120 154.70.210.217
208.93.39.81 8.15.134.78 36.212.231.20 165.22.167.214
74.179.26.250 175.32.25.179 221.204.195.149 108.64.39.236
225.37.244.13 22.51.34.219 57.60.4.132 37.211.176.144