必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.42.53.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.42.53.164.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120900 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 19:58:30 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
164.53.42.81.in-addr.arpa domain name pointer 164.red-81-42-53.staticip.rima-tde.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.53.42.81.in-addr.arpa	name = 164.red-81-42-53.staticip.rima-tde.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
24.5.225.247 attackspambots
SSH brute-force attempt
2020-06-04 02:05:57
37.11.163.29 attackbotsspam
Hits on port : 445
2020-06-04 02:33:09
185.104.71.76 attackspam
xmlrpc attack
2020-06-04 02:08:32
219.250.188.219 attack
Jun  3 14:55:13 firewall sshd[5936]: Failed password for root from 219.250.188.219 port 50645 ssh2
Jun  3 14:58:16 firewall sshd[6037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.219  user=root
Jun  3 14:58:17 firewall sshd[6037]: Failed password for root from 219.250.188.219 port 45340 ssh2
...
2020-06-04 02:09:24
82.228.108.208 attackspambots
Attempted connection to port 23.
2020-06-04 02:24:01
182.61.2.67 attack
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-04 02:12:15
213.55.95.177 attackbots
20/6/3@07:49:40: FAIL: Alarm-Network address from=213.55.95.177
...
2020-06-04 02:06:58
51.38.48.127 attackspam
...
2020-06-04 02:29:04
209.97.134.47 attack
SSH bruteforce
2020-06-04 02:04:14
139.99.135.175 attack
DATE:2020-06-03 13:49:39, IP:139.99.135.175, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-06-04 02:07:27
138.97.239.9 attack
2020-06-03T15:30:55.079307struts4.enskede.local sshd\[10571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.239.9  user=root
2020-06-03T15:30:57.984504struts4.enskede.local sshd\[10571\]: Failed password for root from 138.97.239.9 port 57648 ssh2
2020-06-03T15:35:20.566661struts4.enskede.local sshd\[10606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.239.9  user=root
2020-06-03T15:35:23.537446struts4.enskede.local sshd\[10606\]: Failed password for root from 138.97.239.9 port 60017 ssh2
2020-06-03T15:39:47.811111struts4.enskede.local sshd\[10617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.97.239.9  user=root
...
2020-06-04 02:00:06
27.150.172.24 attackbotsspam
2020-06-03T17:56:37.671411sd-86998 sshd[2282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.150.172.24  user=root
2020-06-03T17:56:39.728122sd-86998 sshd[2282]: Failed password for root from 27.150.172.24 port 52367 ssh2
2020-06-03T17:58:19.536951sd-86998 sshd[2837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.150.172.24  user=root
2020-06-03T17:58:21.598400sd-86998 sshd[2837]: Failed password for root from 27.150.172.24 port 59750 ssh2
2020-06-03T17:59:55.948131sd-86998 sshd[3289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.150.172.24  user=root
2020-06-03T17:59:57.854163sd-86998 sshd[3289]: Failed password for root from 27.150.172.24 port 38900 ssh2
...
2020-06-04 02:26:35
120.71.147.115 attackspambots
Jun  3 13:43:03 eventyay sshd[16551]: Failed password for root from 120.71.147.115 port 43868 ssh2
Jun  3 13:46:04 eventyay sshd[16666]: Failed password for root from 120.71.147.115 port 56408 ssh2
...
2020-06-04 02:22:46
95.217.218.140 attack
Automatic report - XMLRPC Attack
2020-06-04 02:14:11
35.237.12.174 attack
Automatic report - XMLRPC Attack
2020-06-04 02:30:36

最近上报的IP列表

187.214.87.102 243.95.57.202 89.93.117.234 36.87.119.182
156.243.206.234 13.18.28.182 63.144.104.172 172.196.123.215
205.195.151.21 52.52.42.177 5.125.33.58 98.180.132.254
127.150.125.178 215.63.244.178 125.38.19.61 28.161.92.27
154.179.58.47 179.109.212.96 228.70.185.204 44.43.61.137