必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): Infolink LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attack
3388/tcp 3377/tcp 3385/tcp...
[2019-12-09/2020-02-07]121pkt,33pt.(tcp)
2020-02-08 08:02:22
attackbotsspam
2019-12-27T16:53:31.738064+01:00 lumpi kernel: [2751929.625462] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.80 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=24105 PROTO=TCP SPT=55861 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-28 00:02:36
attackbotsspam
3389/tcp 3389/tcp 3389/tcp...
[2019-10-25/12-22]98pkt,1pt.(tcp)
2019-12-24 04:26:27
attack
TCP 3389 (RDP)
2019-12-16 23:23:45
attackspam
Dec 11 07:59:36 debian-2gb-nbg1-2 kernel: \[24329121.406117\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.80 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=24401 PROTO=TCP SPT=55629 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-11 15:46:10
attack
proto=tcp  .  spt=49395  .  dpt=3389  .  src=81.22.45.80  .  dst=xx.xx.4.1  .     (Found on   Alienvault Nov 21)     (45)
2019-11-22 09:24:51
attack
Unauthorised access (Nov 20) SRC=81.22.45.80 LEN=40 TTL=248 ID=36813 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Nov 17) SRC=81.22.45.80 LEN=40 TTL=248 ID=29204 TCP DPT=3389 WINDOW=1024 SYN
2019-11-20 08:52:44
attack
firewall-block, port(s): 3389/tcp
2019-11-07 04:02:13
attackbotsspam
2019-11-05T23:38:28.281010+01:00 lumpi kernel: [2815893.079627] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.80 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=7297 PROTO=TCP SPT=57470 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-06 07:19:05
attack
ET CINS Active Threat Intelligence Poor Reputation IP group 76 - port: 3389 proto: TCP cat: Misc Attack
2019-10-28 07:33:17
attackbots
ET DROP Dshield Block Listed Source group 1 - port: 3389 proto: TCP cat: Misc Attack
2019-10-26 07:32:21
attackspam
firewall-block, port(s): 3389/tcp
2019-10-15 04:35:23
attackspambots
proto=tcp  .  spt=57489  .  dpt=3389  .  src=81.22.45.80  .  dst=xx.xx.4.1  .     (CINS badguys  Sep 24)     (775)
2019-09-25 07:11:43
attack
Sep 22 23:32:22 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.80 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54848 PROTO=TCP SPT=59465 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-23 07:26:59
attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-22 09:22:26
attackspambots
Aug  5 02:47:09 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.80 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=57794 PROTO=TCP SPT=48217 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-05 13:47:06
相同子网IP讨论:
IP 类型 评论内容 时间
81.22.45.71 attackspam
suspicious action Sat, 29 Feb 2020 11:28:01 -0300
2020-02-29 22:46:31
81.22.45.133 attack
2020-02-19T00:19:18.463055+01:00 lumpi kernel: [7357790.238387] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.133 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=60679 PROTO=TCP SPT=50449 DPT=7000 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-19 07:37:59
81.22.45.133 attack
2020-02-18T20:40:14.685548+01:00 lumpi kernel: [7344646.660249] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.133 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=12495 PROTO=TCP SPT=50449 DPT=7777 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-19 03:45:04
81.22.45.106 attackspam
02/17/2020-20:00:28.393431 81.22.45.106 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 83
2020-02-18 09:54:53
81.22.45.100 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 5322 proto: TCP cat: Misc Attack
2020-02-18 01:32:12
81.22.45.106 attackspam
Fail2Ban Ban Triggered
2020-02-17 05:29:15
81.22.45.100 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 01:03:51
81.22.45.182 attack
Feb  8 10:02:23 mail kernel: [562000.917378] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=56258 PROTO=TCP SPT=42357 DPT=16115 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-08 17:07:08
81.22.45.71 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 3389 proto: TCP cat: Misc Attack
2020-02-08 08:03:25
81.22.45.83 attack
Unauthorized connection attempt from IP address 81.22.45.83 on Port 3389(RDP)
2020-02-07 22:43:48
81.22.45.182 attackspam
Feb  6 17:32:05 mail kernel: [416183.709828] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=30608 PROTO=TCP SPT=50336 DPT=10904 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-07 00:32:25
81.22.45.182 attackspambots
Feb  6 08:44:36 mail kernel: [384534.949997] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=55760 PROTO=TCP SPT=50336 DPT=10994 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-06 15:48:06
81.22.45.104 attackbotsspam
Unauthorised access (Feb  6) SRC=81.22.45.104 LEN=40 TTL=249 ID=41689 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Feb  4) SRC=81.22.45.104 LEN=40 TTL=249 ID=63055 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Feb  2) SRC=81.22.45.104 LEN=40 TTL=248 ID=40974 TCP DPT=3389 WINDOW=1024 SYN
2020-02-06 08:35:53
81.22.45.182 attackspambots
Feb  6 01:19:32 mail kernel: [357831.266667] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=40878 PROTO=TCP SPT=50336 DPT=10137 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-06 08:29:58
81.22.45.85 attackbots
2020-02-05T16:27:24.910370+01:00 lumpi kernel: [6206298.189738] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.85 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=19368 PROTO=TCP SPT=47987 DPT=43389 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-05 23:28:35
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.22.45.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5774
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.22.45.80.			IN	A

;; AUTHORITY SECTION:
.			1108	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080501 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 05 13:46:56 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 80.45.22.81.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 80.45.22.81.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
99.185.76.161 attackbotsspam
99.185.76.161 (US/United States/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 16 01:27:13 server5 sshd[8928]: Failed password for root from 185.38.3.138 port 46678 ssh2
Sep 16 01:26:16 server5 sshd[8441]: Failed password for root from 99.185.76.161 port 38076 ssh2
Sep 16 01:26:28 server5 sshd[8483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.207.238  user=root
Sep 16 01:26:30 server5 sshd[8483]: Failed password for root from 128.199.207.238 port 51238 ssh2
Sep 16 01:27:28 server5 sshd[8991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.55.171  user=root

IP Addresses Blocked:

185.38.3.138 (FI/Finland/-)
2020-09-16 14:17:51
180.249.166.2 attack
Unauthorized connection attempt from IP address 180.249.166.2 on Port 445(SMB)
2020-09-16 14:13:14
112.197.138.134 attack
2020-09-16T00:01:10.624453Z b011c210790c New connection: 112.197.138.134:56337 (172.17.0.2:2222) [session: b011c210790c]
2020-09-16T00:01:10.625611Z 802d037fb53c New connection: 112.197.138.134:56470 (172.17.0.2:2222) [session: 802d037fb53c]
2020-09-16 13:40:52
2.186.229.131 attackbotsspam
Unauthorized connection attempt from IP address 2.186.229.131 on Port 445(SMB)
2020-09-16 13:39:34
116.89.93.209 attack
Sep 15 17:00:28 scw-focused-cartwright sshd[10152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.89.93.209
Sep 15 17:00:30 scw-focused-cartwright sshd[10152]: Failed password for invalid user admin from 116.89.93.209 port 39548 ssh2
2020-09-16 14:09:12
188.166.58.29 attack
Sep 16 07:48:41 host1 sshd[559419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.58.29  user=root
Sep 16 07:48:43 host1 sshd[559419]: Failed password for root from 188.166.58.29 port 53922 ssh2
Sep 16 07:52:28 host1 sshd[559739]: Invalid user shania from 188.166.58.29 port 36610
Sep 16 07:52:28 host1 sshd[559739]: Invalid user shania from 188.166.58.29 port 36610
...
2020-09-16 14:13:00
1.230.26.66 attackspam
Brute-force attempt banned
2020-09-16 13:42:39
220.87.172.196 attackbotsspam
10 attempts against mh-pma-try-ban on pole
2020-09-16 13:41:57
123.206.111.27 attackbotsspam
Sep 16 07:28:33 ns381471 sshd[31547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.111.27
Sep 16 07:28:35 ns381471 sshd[31547]: Failed password for invalid user logger from 123.206.111.27 port 43422 ssh2
2020-09-16 13:50:06
89.188.125.250 attackbotsspam
Port scan denied
2020-09-16 13:48:39
114.112.72.130 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-16 14:06:57
157.245.108.109 attack
$f2bV_matches
2020-09-16 13:57:10
116.72.27.215 attackbotsspam
GPON Home Routers Remote Code Execution Vulnerability
2020-09-16 13:50:33
5.160.243.153 attackbots
Sep 16 04:36:01 marvibiene sshd[6279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.243.153  user=root
Sep 16 04:36:03 marvibiene sshd[6279]: Failed password for root from 5.160.243.153 port 35888 ssh2
Sep 16 04:39:22 marvibiene sshd[6393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.160.243.153  user=root
Sep 16 04:39:24 marvibiene sshd[6393]: Failed password for root from 5.160.243.153 port 48622 ssh2
2020-09-16 14:16:42
116.232.49.123 attack
Unauthorized connection attempt from IP address 116.232.49.123 on Port 445(SMB)
2020-09-16 13:55:34

最近上报的IP列表

89.217.110.31 66.249.79.30 209.95.60.122 144.3.131.82
89.211.232.148 89.211.137.53 89.210.157.52 89.210.143.54
89.206.44.82 89.181.45.127 160.153.245.247 89.176.40.117
89.163.152.184 89.163.141.16 89.159.101.24 89.157.18.233
89.154.37.160 85.204.78.28 172.68.46.212 89.153.25.60