必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Türkiye

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.212.142.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.212.142.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 09:48:49 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
85.142.212.81.in-addr.arpa domain name pointer 81.212.142.85.static.turktelekom.com.tr.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.142.212.81.in-addr.arpa	name = 81.212.142.85.static.turktelekom.com.tr.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.15.123.133 attackbotsspam
suspicious action Fri, 06 Mar 2020 10:30:55 -0300
2020-03-07 01:26:46
1.34.51.82 attackbots
Honeypot attack, port: 81, PTR: 1-34-51-82.HINET-IP.hinet.net.
2020-03-07 01:24:54
187.16.96.35 attackbots
suspicious action Fri, 06 Mar 2020 12:46:31 -0300
2020-03-07 01:10:10
66.175.189.208 attackbots
Unauthorized connection attempt from IP address 66.175.189.208 on Port 445(SMB)
2020-03-07 01:35:13
218.92.0.171 attackbots
Mar  6 07:29:27 sachi sshd\[18078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Mar  6 07:29:29 sachi sshd\[18078\]: Failed password for root from 218.92.0.171 port 46891 ssh2
Mar  6 07:29:47 sachi sshd\[18100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Mar  6 07:29:49 sachi sshd\[18100\]: Failed password for root from 218.92.0.171 port 3793 ssh2
Mar  6 07:30:02 sachi sshd\[18100\]: Failed password for root from 218.92.0.171 port 3793 ssh2
2020-03-07 01:31:27
85.172.89.94 attackbots
Unauthorized connection attempt from IP address 85.172.89.94 on Port 445(SMB)
2020-03-07 01:22:12
46.255.159.209 attack
Scan detected and blocked 2020.03.06 14:31:00
2020-03-07 01:19:43
186.52.106.106 attack
Unauthorized connection attempt from IP address 186.52.106.106 on Port 445(SMB)
2020-03-07 01:28:22
183.150.63.174 attackspam
suspicious action Fri, 06 Mar 2020 10:31:02 -0300
2020-03-07 01:15:43
92.223.105.220 attackspam
15 attempts against mh-mag-login-ban on ice
2020-03-07 01:21:56
202.141.225.37 attack
Unauthorized connection attempt from IP address 202.141.225.37 on Port 445(SMB)
2020-03-07 01:43:06
188.216.161.237 attackbotsspam
Honeypot attack, port: 5555, PTR: net-188-216-161-237.cust.vodafonedsl.it.
2020-03-07 01:43:24
81.22.30.237 attack
Honeypot attack, port: 445, PTR: static.ip.81.22.30.237.kalaam.com.
2020-03-07 01:30:22
39.108.52.114 attack
xmlrpc attack
2020-03-07 01:35:43
178.217.56.163 attackspam
Unauthorized connection attempt from IP address 178.217.56.163 on Port 445(SMB)
2020-03-07 01:36:56

最近上报的IP列表

58.30.161.126 185.246.42.66 169.194.152.159 33.11.244.52
123.170.205.33 170.165.23.153 132.86.178.68 78.25.16.35
38.89.239.205 42.21.246.115 144.150.138.46 118.162.222.230
180.67.36.127 131.74.163.200 159.216.91.220 227.109.221.173
174.246.46.81 204.29.208.253 34.60.93.165 209.87.182.84