必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Banja Luka

省份(region): Republika Srpska

国家(country): Bosnia and Herzegovina

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.93.90.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.93.90.140.			IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020083101 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 01 08:37:27 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
Host 140.90.93.81.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.90.93.81.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.225.58.46 attack
Sep  2 21:51:11 vps200512 sshd\[10955\]: Invalid user matias from 103.225.58.46
Sep  2 21:51:11 vps200512 sshd\[10955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.58.46
Sep  2 21:51:13 vps200512 sshd\[10955\]: Failed password for invalid user matias from 103.225.58.46 port 42142 ssh2
Sep  2 21:59:25 vps200512 sshd\[11058\]: Invalid user martinez from 103.225.58.46
Sep  2 21:59:25 vps200512 sshd\[11058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.58.46
2019-09-03 10:14:04
178.62.252.89 attackbots
Automatic report - Banned IP Access
2019-09-03 10:28:18
141.98.9.195 attackspambots
2019-09-03T07:32:08.321597ns1.unifynetsol.net postfix/smtpd\[25089\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: authentication failure
2019-09-03T07:33:18.251079ns1.unifynetsol.net postfix/smtpd\[25089\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: authentication failure
2019-09-03T07:34:28.539585ns1.unifynetsol.net postfix/smtpd\[25089\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: authentication failure
2019-09-03T07:35:37.264637ns1.unifynetsol.net postfix/smtpd\[25092\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: authentication failure
2019-09-03T07:36:48.049748ns1.unifynetsol.net postfix/smtpd\[25089\]: warning: unknown\[141.98.9.195\]: SASL LOGIN authentication failed: authentication failure
2019-09-03 10:07:39
110.249.212.46 attackbotsspam
A portscan was detected. Details about the event:

Time.............: 2019-09-03 00:48:19

Source IP address: 110.249.212.46
2019-09-03 10:29:53
190.221.50.90 attackspam
Sep  2 16:01:59 wbs sshd\[24856\]: Invalid user ftptest from 190.221.50.90
Sep  2 16:01:59 wbs sshd\[24856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.50.90
Sep  2 16:02:01 wbs sshd\[24856\]: Failed password for invalid user ftptest from 190.221.50.90 port 29058 ssh2
Sep  2 16:07:10 wbs sshd\[25349\]: Invalid user shutdown from 190.221.50.90
Sep  2 16:07:10 wbs sshd\[25349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.50.90
2019-09-03 10:11:52
222.186.52.124 attackspambots
Sep  2 15:48:42 web9 sshd\[24417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.124  user=root
Sep  2 15:48:45 web9 sshd\[24417\]: Failed password for root from 222.186.52.124 port 34892 ssh2
Sep  2 15:55:26 web9 sshd\[25789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.124  user=root
Sep  2 15:55:28 web9 sshd\[25789\]: Failed password for root from 222.186.52.124 port 53366 ssh2
Sep  2 15:55:30 web9 sshd\[25789\]: Failed password for root from 222.186.52.124 port 53366 ssh2
2019-09-03 10:00:28
114.118.91.64 attack
Sep  2 15:29:23 kapalua sshd\[25869\]: Invalid user web1 from 114.118.91.64
Sep  2 15:29:23 kapalua sshd\[25869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.91.64
Sep  2 15:29:26 kapalua sshd\[25869\]: Failed password for invalid user web1 from 114.118.91.64 port 41438 ssh2
Sep  2 15:34:02 kapalua sshd\[26317\]: Invalid user vnc from 114.118.91.64
Sep  2 15:34:02 kapalua sshd\[26317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.91.64
2019-09-03 10:34:14
139.198.122.76 attack
Sep  2 16:24:20 eddieflores sshd\[11233\]: Invalid user zimbra from 139.198.122.76
Sep  2 16:24:20 eddieflores sshd\[11233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.76
Sep  2 16:24:22 eddieflores sshd\[11233\]: Failed password for invalid user zimbra from 139.198.122.76 port 44294 ssh2
Sep  2 16:29:31 eddieflores sshd\[11664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.122.76  user=root
Sep  2 16:29:33 eddieflores sshd\[11664\]: Failed password for root from 139.198.122.76 port 59646 ssh2
2019-09-03 10:35:02
78.167.249.184 attackbotsspam
Automatic report - Port Scan Attack
2019-09-03 10:24:51
181.48.28.13 attackbots
2019-09-03T01:44:29.230035abusebot.cloudsearch.cf sshd\[31334\]: Invalid user ayesha from 181.48.28.13 port 36716
2019-09-03T01:44:29.235397abusebot.cloudsearch.cf sshd\[31334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13
2019-09-03 10:09:46
180.165.10.130 attackbotsspam
Sep  3 04:02:35 vps647732 sshd[26595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.165.10.130
Sep  3 04:02:37 vps647732 sshd[26595]: Failed password for invalid user livia from 180.165.10.130 port 6212 ssh2
...
2019-09-03 10:33:31
206.189.89.157 attack
Sep  2 23:53:00 vtv3 sshd\[19593\]: Invalid user stefania from 206.189.89.157 port 37178
Sep  2 23:53:00 vtv3 sshd\[19593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.89.157
Sep  2 23:53:02 vtv3 sshd\[19593\]: Failed password for invalid user stefania from 206.189.89.157 port 37178 ssh2
Sep  2 23:57:34 vtv3 sshd\[21865\]: Invalid user lionel from 206.189.89.157 port 54096
Sep  2 23:57:34 vtv3 sshd\[21865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.89.157
Sep  3 00:11:04 vtv3 sshd\[28854\]: Invalid user abdel from 206.189.89.157 port 48388
Sep  3 00:11:04 vtv3 sshd\[28854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.89.157
Sep  3 00:11:05 vtv3 sshd\[28854\]: Failed password for invalid user abdel from 206.189.89.157 port 48388 ssh2
Sep  3 00:15:47 vtv3 sshd\[31260\]: Invalid user test from 206.189.89.157 port 37076
Sep  3 00:15:47 vtv3 sshd\
2019-09-03 10:18:29
138.121.161.198 attack
Sep  3 04:19:20 bouncer sshd\[18354\]: Invalid user admin from 138.121.161.198 port 45456
Sep  3 04:19:20 bouncer sshd\[18354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.161.198 
Sep  3 04:19:22 bouncer sshd\[18354\]: Failed password for invalid user admin from 138.121.161.198 port 45456 ssh2
...
2019-09-03 10:38:30
219.128.21.229 attack
Automatic report - Banned IP Access
2019-09-03 10:20:51
181.57.152.166 attack
Automatic report - Port Scan Attack
2019-09-03 10:05:22

最近上报的IP列表

79.231.162.43 37.143.48.172 124.170.246.9 151.235.188.216
42.188.118.39 103.4.71.218 78.60.231.195 1.80.210.78
39.187.208.178 132.236.146.52 32.200.87.138 106.61.60.116
126.62.178.73 151.75.142.180 132.166.113.7 174.128.235.81
58.254.40.120 116.138.21.164 138.101.13.15 91.201.172.206