必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.205.104.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.205.104.211.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:59:29 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
211.104.205.81.in-addr.arpa domain name pointer 81-205-104-211.fixed.kpn.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
211.104.205.81.in-addr.arpa	name = 81-205-104-211.fixed.kpn.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.210.42.209 attackspam
Aug  2 17:55:25 vps691689 sshd[22733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209
Aug  2 17:55:27 vps691689 sshd[22733]: Failed password for invalid user nokia123 from 190.210.42.209 port 3187 ssh2
Aug  2 18:01:36 vps691689 sshd[22765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.210.42.209
...
2019-08-03 00:07:40
39.98.248.2 attackbotsspam
39.98.248.2:58558 [200]: /nmaplowercheck1564734058
39.98.248.2:58554 [200]: /sdk
39.98.248.2:58578 [200]: /NmapUpperCheck1564734058
2019-08-03 01:32:11
71.237.171.150 attackspambots
Invalid user ksgdb from 71.237.171.150 port 34716
2019-08-03 01:36:19
222.108.131.117 attack
Aug  2 16:21:58 MK-Soft-VM6 sshd\[19272\]: Invalid user gfep from 222.108.131.117 port 57591
Aug  2 16:21:58 MK-Soft-VM6 sshd\[19272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.108.131.117
Aug  2 16:22:00 MK-Soft-VM6 sshd\[19272\]: Failed password for invalid user gfep from 222.108.131.117 port 57591 ssh2
...
2019-08-03 01:08:52
198.50.175.246 attack
Jul 30 09:40:50 xb3 sshd[26084]: Failed password for invalid user kuo from 198.50.175.246 port 48821 ssh2
Jul 30 09:40:50 xb3 sshd[26084]: Received disconnect from 198.50.175.246: 11: Bye Bye [preauth]
Jul 30 09:49:02 xb3 sshd[403]: Failed password for invalid user rwyzykiewicz from 198.50.175.246 port 41567 ssh2
Jul 30 09:49:02 xb3 sshd[403]: Received disconnect from 198.50.175.246: 11: Bye Bye [preauth]
Jul 30 09:53:18 xb3 sshd[30310]: Failed password for invalid user commando from 198.50.175.246 port 39732 ssh2
Jul 30 09:53:18 xb3 sshd[30310]: Received disconnect from 198.50.175.246: 11: Bye Bye [preauth]
Jul 30 09:57:30 xb3 sshd[27136]: Failed password for invalid user xxxx from 198.50.175.246 port 37899 ssh2
Jul 30 09:57:30 xb3 sshd[27136]: Received disconnect from 198.50.175.246: 11: Bye Bye [preauth]
Jul 30 10:01:41 xb3 sshd[24654]: Failed password for invalid user tez from 198.50.175.246 port 35928 ssh2
Jul 30 10:01:41 xb3 sshd[24654]: Received disconnect from 1........
-------------------------------
2019-08-03 01:50:59
212.92.121.57 attackspambots
Many RDP login attempts detected by IDS script
2019-08-03 00:10:34
14.225.3.37 attack
Automatic report - Port Scan Attack
2019-08-03 01:50:32
213.32.65.111 attackspam
Aug  2 16:17:03 SilenceServices sshd[3600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.65.111
Aug  2 16:17:05 SilenceServices sshd[3600]: Failed password for invalid user student from 213.32.65.111 port 50836 ssh2
Aug  2 16:21:15 SilenceServices sshd[6741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.65.111
2019-08-03 00:10:06
185.176.27.166 attackspambots
02.08.2019 17:28:58 Connection to port 56700 blocked by firewall
2019-08-03 01:45:57
131.0.8.49 attack
Aug  2 18:35:49 bouncer sshd\[6016\]: Invalid user guan from 131.0.8.49 port 49066
Aug  2 18:35:49 bouncer sshd\[6016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.8.49 
Aug  2 18:35:51 bouncer sshd\[6016\]: Failed password for invalid user guan from 131.0.8.49 port 49066 ssh2
...
2019-08-03 01:33:57
196.52.84.57 attackbots
Many RDP login attempts detected by IDS script
2019-08-03 00:25:34
123.206.44.110 attackbotsspam
Aug  2 10:41:26 rpi sshd[32013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.44.110 
Aug  2 10:41:28 rpi sshd[32013]: Failed password for invalid user castis from 123.206.44.110 port 12127 ssh2
2019-08-03 00:05:37
196.44.191.52 attack
Honeypot attack, port: 23, PTR: broadband52.yoafrica.com.
2019-08-03 01:47:22
117.50.95.121 attackspambots
Aug  2 11:20:25 OPSO sshd\[26894\]: Invalid user rushi from 117.50.95.121 port 37758
Aug  2 11:20:25 OPSO sshd\[26894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.95.121
Aug  2 11:20:27 OPSO sshd\[26894\]: Failed password for invalid user rushi from 117.50.95.121 port 37758 ssh2
Aug  2 11:22:17 OPSO sshd\[27068\]: Invalid user cent from 117.50.95.121 port 55864
Aug  2 11:22:17 OPSO sshd\[27068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.95.121
2019-08-03 00:34:29
118.166.123.32 attack
" "
2019-08-03 01:19:46

最近上报的IP列表

174.20.32.105 67.84.163.70 116.128.179.234 47.218.2.63
188.159.97.26 39.119.243.31 35.119.224.93 22.133.27.44
85.72.223.41 92.241.132.55 145.52.70.89 85.234.111.178
38.47.104.245 226.115.54.193 145.16.161.215 82.215.35.74
20.157.73.170 130.77.146.192 35.64.252.162 21.83.48.201