必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Madrid

省份(region): Madrid

国家(country): Spain

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.45.20.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30203
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.45.20.27.			IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110300 1800 900 604800 86400

;; Query time: 239 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 18:27:00 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
27.20.45.81.in-addr.arpa domain name pointer 27.red-81-45-20.staticip.rima-tde.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
27.20.45.81.in-addr.arpa	name = 27.red-81-45-20.staticip.rima-tde.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.234.33.229 attackbotsspam
5x Failed Password
2019-10-29 19:26:46
146.185.142.200 attackspam
146.185.142.200 - - [29/Oct/2019:11:38:25 +0100] "GET /wp-login.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
146.185.142.200 - - [29/Oct/2019:11:38:25 +0100] "GET /wp-login.php HTTP/1.1" 302 335 "http://wiki.univ-lyon3.fr/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
146.185.142.200 - - [29/Oct/2019:11:38:25 +0100] "GET /wp-login.php HTTP/1.1" 302 335 "https://cas.univ-lyon3.fr/cas/login?service=https%3A%2F%2Fwiki.univ-lyon3.fr%2Fwp-login.php&gateway=true" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
146.185.142.200 - - [29/Oct/2019:11:38:26 +0100] "GET /wp-login.php HTTP/1.1" 302 335 "https://cas.univ-lyon3.fr/cas/login?service=https%3A%2F%2Fwiki.univ-lyon3.fr%2Fwp-login.php&gateway=true" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
146.185.142.200 - - [29/Oct/2019:11:38:26 +0100] "GET /wp-login.php HTTP/1.1" 302 335 "https://cas.univ-l
2019-10-29 19:25:08
46.101.26.63 attack
Oct 29 00:25:35 eddieflores sshd\[12247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.26.63  user=daemon
Oct 29 00:25:37 eddieflores sshd\[12247\]: Failed password for daemon from 46.101.26.63 port 36487 ssh2
Oct 29 00:29:19 eddieflores sshd\[12524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.26.63  user=root
Oct 29 00:29:22 eddieflores sshd\[12524\]: Failed password for root from 46.101.26.63 port 55656 ssh2
Oct 29 00:33:04 eddieflores sshd\[12795\]: Invalid user admin from 46.101.26.63
Oct 29 00:33:04 eddieflores sshd\[12795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.26.63
2019-10-29 19:36:17
187.178.66.27 attackspambots
Automatic report - Port Scan
2019-10-29 19:23:47
79.143.182.235 attack
$f2bV_matches
2019-10-29 19:14:18
92.119.160.106 attackspambots
Oct 29 11:48:36 mc1 kernel: \[3632442.962199\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=38489 PROTO=TCP SPT=46784 DPT=34894 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 29 11:51:43 mc1 kernel: \[3632629.936866\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=11050 PROTO=TCP SPT=46784 DPT=35451 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 29 11:55:05 mc1 kernel: \[3632831.621793\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=56182 PROTO=TCP SPT=46784 DPT=35360 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-29 19:04:26
31.163.32.148 attackspambots
Chat Spam
2019-10-29 19:32:22
218.153.159.222 attackspam
Oct 29 16:25:37 areeb-Workstation sshd[14795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.153.159.222
Oct 29 16:25:39 areeb-Workstation sshd[14795]: Failed password for invalid user amit from 218.153.159.222 port 42004 ssh2
...
2019-10-29 19:07:27
14.231.146.225 attack
failed_logins
2019-10-29 19:01:11
106.75.157.9 attackspambots
Oct 29 08:50:57 jane sshd[14181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.157.9 
Oct 29 08:51:00 jane sshd[14181]: Failed password for invalid user politia112 from 106.75.157.9 port 47750 ssh2
...
2019-10-29 19:34:04
217.68.214.18 attackbots
slow and persistent scanner
2019-10-29 19:40:31
179.108.83.11 attackspambots
Dating Fraud Spam

Return-Path: 
Received: from 179-108-83-11.netturbo.com.br (unknown [179.108.83.11])
Message-ID: <_____@netturbo.com.br>
Date: Mon, 28 Oct 2019 13:56:18 -1100
From: "Makayla" 
User-Agent: QUALCOMM Windows Eudora Version 5.1
To: "Makayla" <_____>
Subject: can you meet me on the weekend
2019-10-29 19:08:21
138.197.208.219 attack
Oct 29 11:17:22 hcbbdb sshd\[28546\]: Invalid user wnghks from 138.197.208.219
Oct 29 11:17:22 hcbbdb sshd\[28546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.208.219
Oct 29 11:17:24 hcbbdb sshd\[28546\]: Failed password for invalid user wnghks from 138.197.208.219 port 44858 ssh2
Oct 29 11:21:48 hcbbdb sshd\[29002\]: Invalid user angga from 138.197.208.219
Oct 29 11:21:48 hcbbdb sshd\[29002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.208.219
2019-10-29 19:35:43
106.51.2.108 attackbotsspam
Invalid user serial from 106.51.2.108 port 17153
2019-10-29 19:12:54
103.218.2.137 attackspambots
frenzy
2019-10-29 19:24:07

最近上报的IP列表

81.92.242.104 171.224.181.83 153.214.188.144 136.169.243.176
112.231.81.83 118.68.137.222 112.135.226.216 112.133.237.7
103.92.225.146 103.7.37.13 95.18.157.105 167.172.201.128
103.69.9.238 1.171.203.103 57.246.152.224 54.141.199.97
34.115.245.225 34.77.181.223 68.64.26.5 4.13.185.217