必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Zürich

省份(region): Zurich

国家(country): Switzerland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.221.171.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.221.171.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:11:28 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
34.171.221.81.in-addr.arpa domain name pointer 34-171-221-81.pool.dsl-net.ch.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.171.221.81.in-addr.arpa	name = 34-171-221-81.pool.dsl-net.ch.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
223.247.223.194 attackspambots
2020-06-07T15:47:43.780560vps773228.ovh.net sshd[18773]: Failed password for root from 223.247.223.194 port 59902 ssh2
2020-06-07T15:52:55.476388vps773228.ovh.net sshd[18831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.223.194  user=root
2020-06-07T15:52:57.486437vps773228.ovh.net sshd[18831]: Failed password for root from 223.247.223.194 port 55900 ssh2
2020-06-07T15:57:54.376747vps773228.ovh.net sshd[18887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.223.194  user=root
2020-06-07T15:57:56.432264vps773228.ovh.net sshd[18887]: Failed password for root from 223.247.223.194 port 51886 ssh2
...
2020-06-08 01:05:16
193.148.70.253 attackbots
Jun  7 15:10:53 server sshd[15325]: Failed password for root from 193.148.70.253 port 54350 ssh2
Jun  7 15:18:02 server sshd[21065]: Failed password for root from 193.148.70.253 port 58348 ssh2
Jun  7 15:25:11 server sshd[27198]: Failed password for root from 193.148.70.253 port 34114 ssh2
2020-06-08 00:41:32
139.59.18.197 attackbots
Jun  7 16:50:05 mellenthin sshd[30921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.197  user=root
Jun  7 16:50:08 mellenthin sshd[30921]: Failed password for invalid user root from 139.59.18.197 port 60820 ssh2
2020-06-08 00:26:17
170.84.140.10 attackbots
DATE:2020-06-07 14:05:41, IP:170.84.140.10, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-06-08 00:35:36
69.94.131.46 attackspambots
Jun  5 17:33:36 mail.srvfarm.net postfix/smtpd[3155924]: NOQUEUE: reject: RCPT from unknown[69.94.131.46]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  5 17:39:13 mail.srvfarm.net postfix/smtpd[3156526]: NOQUEUE: reject: RCPT from unknown[69.94.131.46]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  5 17:40:21 mail.srvfarm.net postfix/smtpd[3156526]: NOQUEUE: reject: RCPT from unknown[69.94.131.46]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  5 17:43:00 mail.srvfarm.net postfix/smtpd[3151339]: NOQUEUE: reject: RCPT from unknown[69.94.131.46]: 450 4.1.8 
2020-06-08 00:18:00
85.239.35.161 attack
Jun  7 19:23:49 server2 sshd\[5795\]: Invalid user  from 85.239.35.161
Jun  7 19:23:50 server2 sshd\[5794\]: Invalid user  from 85.239.35.161
Jun  7 19:23:55 server2 sshd\[5798\]: Invalid user  from 85.239.35.161
Jun  7 19:23:55 server2 sshd\[5799\]: Invalid user admin from 85.239.35.161
Jun  7 19:23:57 server2 sshd\[5817\]: Invalid user user from 85.239.35.161
Jun  7 19:23:58 server2 sshd\[5797\]: Invalid user admin from 85.239.35.161
2020-06-08 00:37:07
80.82.70.118 attack
SmallBizIT.US 4 packets to tcp(3365,8083,9042,9091)
2020-06-08 00:40:37
69.94.131.41 attack
Jun  5 16:40:40 mail.srvfarm.net postfix/smtpd[3129285]: NOQUEUE: reject: RCPT from unknown[69.94.131.41]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  5 16:40:43 mail.srvfarm.net postfix/smtpd[3131409]: NOQUEUE: reject: RCPT from unknown[69.94.131.41]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  5 16:40:45 mail.srvfarm.net postfix/smtpd[3132025]: NOQUEUE: reject: RCPT from unknown[69.94.131.41]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  5 16:40:46 mail.srvfarm.net postfix/smtpd[3131409]: NOQUEUE: reject: RCPT from unknown[69.94.131.41]: 450 4.1.8 :
2020-06-08 00:18:17
217.112.142.203 attackbotsspam
Jun  5 16:27:10 web01.agentur-b-2.de postfix/smtpd[243468]: NOQUEUE: reject: RCPT from unknown[217.112.142.203]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Jun  5 16:34:45 web01.agentur-b-2.de postfix/smtpd[246479]: NOQUEUE: reject: RCPT from unknown[217.112.142.203]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Jun  5 16:34:45 web01.agentur-b-2.de postfix/smtpd[246511]: NOQUEUE: reject: RCPT from unknown[217.112.142.203]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Jun  5 16:34:45 web01.agentur-b-2.de postfix/smtpd[246512]: NOQUEUE: reject: RCPT from unknown[217.112.142.203]: 450 4.7.1 
2020-06-08 00:21:50
69.94.135.194 attack
Jun  5 16:34:11 mail.srvfarm.net postfix/smtpd[3129216]: NOQUEUE: reject: RCPT from unknown[69.94.135.194]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  5 16:34:16 mail.srvfarm.net postfix/smtpd[3129284]: NOQUEUE: reject: RCPT from unknown[69.94.135.194]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  5 16:34:17 mail.srvfarm.net postfix/smtpd[3129250]: NOQUEUE: reject: RCPT from unknown[69.94.135.194]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun  5 16:40:00 mail.srvfarm.net postfix/smtpd[3129216]: NOQUEUE: reject: RCPT from unknown[69.94.135.194]: 450 4.1.8 :
2020-06-08 00:17:38
94.74.133.234 attackbots
Jun  5 15:11:23 mail.srvfarm.net postfix/smtps/smtpd[3108734]: warning: unknown[94.74.133.234]: SASL PLAIN authentication failed: 
Jun  5 15:11:23 mail.srvfarm.net postfix/smtps/smtpd[3108734]: lost connection after AUTH from unknown[94.74.133.234]
Jun  5 15:14:17 mail.srvfarm.net postfix/smtpd[3109366]: warning: unknown[94.74.133.234]: SASL PLAIN authentication failed: 
Jun  5 15:14:17 mail.srvfarm.net postfix/smtpd[3109366]: lost connection after AUTH from unknown[94.74.133.234]
Jun  5 15:15:56 mail.srvfarm.net postfix/smtpd[3109220]: warning: unknown[94.74.133.234]: SASL PLAIN authentication failed:
2020-06-08 01:00:21
159.89.162.203 attackspam
Jun  7 15:18:19 vps647732 sshd[25688]: Failed password for root from 159.89.162.203 port 6340 ssh2
...
2020-06-08 00:33:10
178.17.170.178 attack
Jun  7 11:11:11 rudra sshd[694461]: reveeclipse mapping checking getaddrinfo for 178-17-170-178.static.as43289.net [178.17.170.178] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  7 11:11:11 rudra sshd[694461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.17.170.178  user=r.r
Jun  7 11:11:12 rudra sshd[694461]: Failed password for r.r from 178.17.170.178 port 55678 ssh2
Jun  7 11:11:15 rudra sshd[694461]: Failed password for r.r from 178.17.170.178 port 55678 ssh2
Jun  7 11:11:17 rudra sshd[694461]: Failed password for r.r from 178.17.170.178 port 55678 ssh2
Jun  7 11:11:19 rudra sshd[694461]: Failed password for r.r from 178.17.170.178 port 55678 ssh2
Jun  7 11:11:22 rudra sshd[694461]: Failed password for r.r from 178.17.170.178 port 55678 ssh2
Jun  7 11:11:24 rudra sshd[694461]: Failed password for r.r from 178.17.170.178 port 55678 ssh2
Jun  7 11:11:24 rudra sshd[694461]: PAM 5 more authentication failures; logname= uid=0 euid........
-------------------------------
2020-06-08 01:03:04
179.189.205.88 attackspambots
Jun  5 16:22:15 mail.srvfarm.net postfix/smtpd[3129285]: warning: unknown[179.189.205.88]: SASL PLAIN authentication failed: 
Jun  5 16:22:16 mail.srvfarm.net postfix/smtpd[3129285]: lost connection after AUTH from unknown[179.189.205.88]
Jun  5 16:23:41 mail.srvfarm.net postfix/smtps/smtpd[3130809]: warning: unknown[179.189.205.88]: SASL PLAIN authentication failed: 
Jun  5 16:23:42 mail.srvfarm.net postfix/smtps/smtpd[3130809]: lost connection after AUTH from unknown[179.189.205.88]
Jun  5 16:27:55 mail.srvfarm.net postfix/smtps/smtpd[3130797]: warning: unknown[179.189.205.88]: SASL PLAIN authentication failed:
2020-06-08 00:24:52
87.246.7.106 attackspambots
Jun  6 11:58:38 mail.srvfarm.net postfix/smtpd[3671807]: warning: unknown[87.246.7.106]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 11:58:38 mail.srvfarm.net postfix/smtpd[3671807]: lost connection after AUTH from unknown[87.246.7.106]
Jun  6 11:58:58 mail.srvfarm.net postfix/smtpd[3671808]: warning: unknown[87.246.7.106]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 11:58:58 mail.srvfarm.net postfix/smtpd[3671808]: lost connection after AUTH from unknown[87.246.7.106]
Jun  6 11:59:13 mail.srvfarm.net postfix/smtpd[3671713]: warning: unknown[87.246.7.106]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  6 11:59:13 mail.srvfarm.net postfix/smtpd[3671713]: lost connection after AUTH from unknown[87.246.7.106]
2020-06-08 00:52:18

最近上报的IP列表

164.2.181.53 191.90.57.241 179.215.152.188 222.194.60.224
63.37.169.74 93.90.142.69 62.30.179.130 8.156.188.186
43.178.68.216 241.156.197.46 212.20.141.97 200.80.30.46
139.140.105.136 185.54.124.218 63.254.151.179 206.28.134.64
151.54.241.248 152.151.183.248 69.241.183.219 239.214.20.240