必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Germering

省份(region): Bavaria

国家(country): Germany

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.82.240.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.82.240.80.			IN	A

;; AUTHORITY SECTION:
.			255	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 17 09:06:45 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
80.240.82.82.in-addr.arpa domain name pointer dslc-082-082-240-080.pools.arcor-ip.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.240.82.82.in-addr.arpa	name = dslc-082-082-240-080.pools.arcor-ip.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.149.50.2 attackbotsspam
port scan and connect, tcp 80 (http)
2019-08-03 09:53:41
113.239.180.207 attack
23/tcp
[2019-08-02]1pkt
2019-08-03 09:08:41
171.221.137.72 attackbotsspam
445/tcp
[2019-08-02]1pkt
2019-08-03 09:54:32
115.78.232.152 attackbotsspam
Aug  2 21:21:58 v22018076622670303 sshd\[7810\]: Invalid user regis from 115.78.232.152 port 63010
Aug  2 21:21:58 v22018076622670303 sshd\[7810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.232.152
Aug  2 21:22:00 v22018076622670303 sshd\[7810\]: Failed password for invalid user regis from 115.78.232.152 port 63010 ssh2
...
2019-08-03 09:40:52
101.53.100.115 attackbotsspam
19/8/2@15:22:33: FAIL: Alarm-Intrusion address from=101.53.100.115
...
2019-08-03 09:18:29
118.97.188.105 attackbotsspam
Invalid user oozie from 118.97.188.105 port 43184
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.188.105
Failed password for invalid user oozie from 118.97.188.105 port 43184 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.188.105  user=root
Failed password for root from 118.97.188.105 port 37752 ssh2
2019-08-03 09:46:54
111.230.23.81 attackbots
Aug  3 03:33:52 www sshd\[5203\]: Invalid user devuser from 111.230.23.81
Aug  3 03:33:52 www sshd\[5203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.23.81
Aug  3 03:33:54 www sshd\[5203\]: Failed password for invalid user devuser from 111.230.23.81 port 57380 ssh2
...
2019-08-03 09:41:29
140.143.200.61 attackspambots
10 attempts against mh-pma-try-ban on sky.magehost.pro
2019-08-03 09:43:48
95.105.233.209 attackbotsspam
Automatic report - Banned IP Access
2019-08-03 09:13:47
200.55.25.192 attack
445/tcp
[2019-08-02]1pkt
2019-08-03 09:22:31
218.92.1.130 attackspam
SSH Brute Force, server-1 sshd[11772]: Failed password for root from 218.92.1.130 port 32597 ssh2
2019-08-03 09:36:51
139.199.163.136 attackbotsspam
Automatic report - Banned IP Access
2019-08-03 09:44:50
190.180.161.143 attackspambots
Aug  3 01:53:55 s64-1 sshd[3656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.180.161.143
Aug  3 01:53:58 s64-1 sshd[3656]: Failed password for invalid user 3 from 190.180.161.143 port 41249 ssh2
Aug  3 01:59:24 s64-1 sshd[3813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.180.161.143
...
2019-08-03 09:34:17
42.118.8.67 attackbots
445/tcp
[2019-08-02]1pkt
2019-08-03 09:10:57
42.243.218.133 attackspam
Aug  2 19:21:46   DDOS Attack: SRC=42.243.218.133 DST=[Masked] LEN=40 TOS=0x00 PREC=0x00 TTL=51  DF PROTO=TCP SPT=38154 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-08-03 09:48:13

最近上报的IP列表

127.32.55.68 143.169.165.4 3.17.45.49 119.207.64.145
3.93.87.85 64.75.44.167 48.1.172.104 182.32.163.73
61.17.227.165 62.201.254.110 5.5.92.140 225.173.237.103
205.91.218.238 7.10.97.56 39.244.134.81 4.239.83.193
165.212.1.76 156.172.121.32 6.72.12.78 250.28.14.221