必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.16.107.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25549
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.16.107.145.			IN	A

;; AUTHORITY SECTION:
.			288	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 02:23:36 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
145.107.16.82.in-addr.arpa domain name pointer cpc110785-lewi20-2-0-cust912.2-4.cable.virginm.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.107.16.82.in-addr.arpa	name = cpc110785-lewi20-2-0-cust912.2-4.cable.virginm.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
199.195.252.213 attack
Oct 19 22:21:02 lcl-usvr-02 sshd[18789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213  user=root
Oct 19 22:21:04 lcl-usvr-02 sshd[18789]: Failed password for root from 199.195.252.213 port 38042 ssh2
Oct 19 22:24:43 lcl-usvr-02 sshd[19619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213  user=root
Oct 19 22:24:45 lcl-usvr-02 sshd[19619]: Failed password for root from 199.195.252.213 port 48772 ssh2
...
2019-10-19 23:55:47
95.112.58.182 attack
Automatic report - Port Scan Attack
2019-10-20 00:13:09
78.188.240.112 attack
Automatic report - Port Scan Attack
2019-10-19 23:45:38
202.5.36.56 attack
Automatic report - Banned IP Access
2019-10-20 00:03:29
181.129.100.98 attackspambots
Oct 19 12:01:04 system,error,critical: login failure for user admin from 181.129.100.98 via telnet
Oct 19 12:01:06 system,error,critical: login failure for user root from 181.129.100.98 via telnet
Oct 19 12:01:08 system,error,critical: login failure for user root from 181.129.100.98 via telnet
Oct 19 12:01:12 system,error,critical: login failure for user root from 181.129.100.98 via telnet
Oct 19 12:01:13 system,error,critical: login failure for user supervisor from 181.129.100.98 via telnet
Oct 19 12:01:15 system,error,critical: login failure for user root from 181.129.100.98 via telnet
Oct 19 12:01:19 system,error,critical: login failure for user admin from 181.129.100.98 via telnet
Oct 19 12:01:21 system,error,critical: login failure for user admin from 181.129.100.98 via telnet
Oct 19 12:01:22 system,error,critical: login failure for user tech from 181.129.100.98 via telnet
Oct 19 12:01:27 system,error,critical: login failure for user 888888 from 181.129.100.98 via telnet
2019-10-19 23:35:54
193.227.47.9 attackbotsspam
Unauthorized connection attempt from IP address 193.227.47.9 on Port 445(SMB)
2019-10-20 00:09:25
42.51.13.107 attackbotsspam
Automatic report - Banned IP Access
2019-10-20 00:11:42
111.230.29.234 attack
Oct 19 13:55:02 OPSO sshd\[28108\]: Invalid user xxx555 from 111.230.29.234 port 39888
Oct 19 13:55:02 OPSO sshd\[28108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.29.234
Oct 19 13:55:04 OPSO sshd\[28108\]: Failed password for invalid user xxx555 from 111.230.29.234 port 39888 ssh2
Oct 19 14:00:31 OPSO sshd\[29431\]: Invalid user yby from 111.230.29.234 port 49848
Oct 19 14:00:31 OPSO sshd\[29431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.29.234
2019-10-20 00:22:43
181.65.234.52 attackspam
Unauthorized connection attempt from IP address 181.65.234.52 on Port 445(SMB)
2019-10-19 23:56:51
80.20.125.243 attackspambots
Oct 19 16:19:56 dedicated sshd[32427]: Invalid user test from 80.20.125.243 port 36577
2019-10-20 00:06:56
78.188.31.13 attack
Automatic report - Port Scan Attack
2019-10-20 00:04:09
142.4.204.122 attackbots
Oct 19 17:29:20 MK-Soft-Root2 sshd[6394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122 
Oct 19 17:29:22 MK-Soft-Root2 sshd[6394]: Failed password for invalid user mark from 142.4.204.122 port 44329 ssh2
...
2019-10-19 23:47:10
164.132.145.70 attackspam
Oct 19 15:03:52 MK-Soft-VM6 sshd[4865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.145.70 
Oct 19 15:03:54 MK-Soft-VM6 sshd[4865]: Failed password for invalid user user from 164.132.145.70 port 39482 ssh2
...
2019-10-20 00:28:21
59.127.209.246 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/59.127.209.246/ 
 
 TW - 1H : (113)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 59.127.209.246 
 
 CIDR : 59.127.128.0/17 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 3 
  3H - 9 
  6H - 22 
 12H - 43 
 24H - 96 
 
 DateTime : 2019-10-19 14:01:10 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-19 23:50:35
124.11.229.219 attackspam
Unauthorized connection attempt from IP address 124.11.229.219 on Port 445(SMB)
2019-10-19 23:37:33

最近上报的IP列表

196.232.112.194 19.215.145.179 229.0.100.119 158.123.109.14
158.19.150.157 172.23.11.21 26.118.95.229 33.94.76.101
25.251.146.237 141.211.98.37 211.121.137.146 2.115.240.254
47.43.106.204 118.171.36.0 61.125.120.53 228.220.247.92
47.219.131.85 221.122.51.134 76.9.18.76 167.159.194.23