必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Russian Federation (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
81.4.241.185 attackspambots
Invalid user administrator from 81.4.241.185 port 49581
2020-05-29 04:08:03
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.4.241.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43527
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.4.241.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 14:14:56 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
12.241.4.81.in-addr.arpa domain name pointer free.ttknn.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.241.4.81.in-addr.arpa	name = free.ttknn.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
210.212.194.6 attack
$f2bV_matches
2020-01-24 05:53:17
103.74.121.31 attackbotsspam
1579795338 - 01/23/2020 17:02:18 Host: 103.74.121.31/103.74.121.31 Port: 445 TCP Blocked
2020-01-24 05:47:54
159.203.201.163 attackspam
01/23/2020-17:02:07.118881 159.203.201.163 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-24 05:55:29
83.20.142.188 attackspambots
Unauthorized connection attempt detected from IP address 83.20.142.188 to port 2220 [J]
2020-01-24 05:49:53
177.45.78.87 attackspam
unauthorized connection attempt
2020-01-24 06:21:34
186.214.200.169 attack
Unauthorized connection attempt from IP address 186.214.200.169 on Port 445(SMB)
2020-01-24 06:24:15
180.50.107.194 attackspam
Unauthorized connection attempt from IP address 180.50.107.194 on Port 445(SMB)
2020-01-24 06:09:12
27.72.31.185 attackbots
Unauthorized connection attempt from IP address 27.72.31.185 on Port 445(SMB)
2020-01-24 06:12:16
219.91.133.139 attackspambots
GET /wp-login.php
2020-01-24 06:01:28
61.177.172.128 attackspambots
Jan 23 18:51:17 vps46666688 sshd[4112]: Failed password for root from 61.177.172.128 port 63195 ssh2
Jan 23 18:51:29 vps46666688 sshd[4112]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 63195 ssh2 [preauth]
...
2020-01-24 06:02:40
113.90.237.138 attack
Unauthorized connection attempt detected from IP address 113.90.237.138 to port 2220 [J]
2020-01-24 06:11:15
62.150.51.201 attack
Unauthorized connection attempt from IP address 62.150.51.201 on Port 445(SMB)
2020-01-24 06:00:49
163.44.192.198 attackspambots
Jan 23 20:15:01 pkdns2 sshd\[48638\]: Invalid user impala from 163.44.192.198Jan 23 20:15:03 pkdns2 sshd\[48638\]: Failed password for invalid user impala from 163.44.192.198 port 34322 ssh2Jan 23 20:18:32 pkdns2 sshd\[48911\]: Invalid user system from 163.44.192.198Jan 23 20:18:34 pkdns2 sshd\[48911\]: Failed password for invalid user system from 163.44.192.198 port 34372 ssh2Jan 23 20:21:58 pkdns2 sshd\[49122\]: Invalid user tushar from 163.44.192.198Jan 23 20:21:59 pkdns2 sshd\[49122\]: Failed password for invalid user tushar from 163.44.192.198 port 34422 ssh2
...
2020-01-24 06:19:56
206.189.233.76 attack
Unauthorized connection attempt detected from IP address 206.189.233.76 to port 8545 [J]
2020-01-24 05:48:41
114.67.104.242 attack
Unauthorized connection attempt detected from IP address 114.67.104.242 to port 2220 [J]
2020-01-24 05:52:22

最近上报的IP列表

190.19.159.140 137.24.213.156 86.239.237.65 196.152.18.224
16.224.35.177 143.75.110.13 36.23.22.200 168.220.174.210
120.164.37.43 215.202.111.181 123.54.187.52 155.151.155.63
117.204.94.143 218.107.32.37 171.199.203.243 75.102.72.213
180.192.132.56 197.82.242.6 5.169.41.167 101.200.118.227