必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.66.113.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.66.113.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 14 15:11:28 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 104.113.66.10.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.113.66.10.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
175.157.41.103 attackbots
Jan  1 06:06:24 srv1 sshd[5045]: Invalid user alain from 175.157.41.103
Jan  1 06:06:24 srv1 sshd[5045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.157.41.103 
Jan  1 06:06:26 srv1 sshd[5045]: Failed password for invalid user alain from 175.157.41.103 port 26974 ssh2
Jan  1 06:06:27 srv1 sshd[5046]: Connection closed by 175.157.41.103


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=175.157.41.103
2020-01-01 13:32:05
72.210.252.149 attack
(imapd) Failed IMAP login from 72.210.252.149 (US/United States/-): 1 in the last 3600 secs
2020-01-01 13:55:21
199.229.249.182 attackspam
1 attempts against mh-modsecurity-ban on comet.magehost.pro
2020-01-01 13:54:33
138.197.66.171 attackbotsspam
138.197.66.171 - - \[01/Jan/2020:05:57:41 +0100\] "GET / HTTP/1.0" 301 178 "-" "Mozilla/5.0 \(compatible\; NetcraftSurveyAgent/1.0\; +info@netcraft.com\)"
...
2020-01-01 13:38:39
63.240.240.74 attackbots
Jan  1 05:57:35 ks10 sshd[29932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74 
Jan  1 05:57:37 ks10 sshd[29932]: Failed password for invalid user drought from 63.240.240.74 port 47954 ssh2
...
2020-01-01 13:39:38
94.41.0.126 attackspam
Unauthorised access (Jan  1) SRC=94.41.0.126 LEN=44 TTL=51 ID=41551 TCP DPT=23 WINDOW=40379 SYN
2020-01-01 13:45:21
222.186.173.154 attackbots
2020-01-01T05:42:58.483650shield sshd\[28031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2020-01-01T05:43:00.795240shield sshd\[28031\]: Failed password for root from 222.186.173.154 port 25326 ssh2
2020-01-01T05:43:04.222059shield sshd\[28031\]: Failed password for root from 222.186.173.154 port 25326 ssh2
2020-01-01T05:43:07.392935shield sshd\[28031\]: Failed password for root from 222.186.173.154 port 25326 ssh2
2020-01-01T05:43:11.583810shield sshd\[28031\]: Failed password for root from 222.186.173.154 port 25326 ssh2
2020-01-01 13:46:44
113.172.33.194 attack
smtp probe/invalid login attempt
2020-01-01 14:02:24
222.186.175.148 attack
Jan  1 06:30:03 legacy sshd[16273]: Failed password for root from 222.186.175.148 port 2956 ssh2
Jan  1 06:30:07 legacy sshd[16273]: Failed password for root from 222.186.175.148 port 2956 ssh2
Jan  1 06:30:10 legacy sshd[16273]: Failed password for root from 222.186.175.148 port 2956 ssh2
Jan  1 06:30:14 legacy sshd[16273]: Failed password for root from 222.186.175.148 port 2956 ssh2
...
2020-01-01 13:31:25
106.53.90.75 attackspambots
Jan  1 05:57:49 lnxweb61 sshd[7922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.90.75
Jan  1 05:57:49 lnxweb61 sshd[7922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.90.75
2020-01-01 13:34:18
218.241.236.108 attackspam
Jan  1 06:40:09 vps691689 sshd[2615]: Failed password for root from 218.241.236.108 port 52879 ssh2
Jan  1 06:43:30 vps691689 sshd[2696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.236.108
...
2020-01-01 13:58:37
112.169.255.1 attackspambots
Jan  1 05:57:29 srv-ubuntu-dev3 sshd[1487]: Invalid user syres from 112.169.255.1
Jan  1 05:57:29 srv-ubuntu-dev3 sshd[1487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.255.1
Jan  1 05:57:29 srv-ubuntu-dev3 sshd[1487]: Invalid user syres from 112.169.255.1
Jan  1 05:57:31 srv-ubuntu-dev3 sshd[1487]: Failed password for invalid user syres from 112.169.255.1 port 55906 ssh2
Jan  1 06:00:44 srv-ubuntu-dev3 sshd[1751]: Invalid user newuser from 112.169.255.1
Jan  1 06:00:44 srv-ubuntu-dev3 sshd[1751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.255.1
Jan  1 06:00:44 srv-ubuntu-dev3 sshd[1751]: Invalid user newuser from 112.169.255.1
Jan  1 06:00:46 srv-ubuntu-dev3 sshd[1751]: Failed password for invalid user newuser from 112.169.255.1 port 57254 ssh2
Jan  1 06:03:53 srv-ubuntu-dev3 sshd[1970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.16
...
2020-01-01 13:23:17
34.73.39.215 attackspambots
$f2bV_matches
2020-01-01 13:43:26
122.51.108.68 attackbots
Jan  1 05:58:06 v22018076622670303 sshd\[8392\]: Invalid user squid from 122.51.108.68 port 57708
Jan  1 05:58:06 v22018076622670303 sshd\[8392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.108.68
Jan  1 05:58:09 v22018076622670303 sshd\[8392\]: Failed password for invalid user squid from 122.51.108.68 port 57708 ssh2
...
2020-01-01 13:25:18
128.199.166.224 attackspambots
Jan  1 05:54:45 sd-53420 sshd\[25361\]: Invalid user rakiah from 128.199.166.224
Jan  1 05:54:45 sd-53420 sshd\[25361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.166.224
Jan  1 05:54:46 sd-53420 sshd\[25361\]: Failed password for invalid user rakiah from 128.199.166.224 port 45049 ssh2
Jan  1 05:57:40 sd-53420 sshd\[26270\]: Invalid user Akseli from 128.199.166.224
Jan  1 05:57:40 sd-53420 sshd\[26270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.166.224
...
2020-01-01 13:39:13

最近上报的IP列表

96.167.88.146 100.149.236.212 44.158.161.238 78.26.240.110
249.38.128.23 129.100.146.47 210.231.38.161 147.144.47.238
248.12.16.169 209.90.40.121 137.155.139.150 129.94.47.49
107.105.29.74 187.240.124.138 127.64.10.8 101.80.182.178
20.206.49.128 33.33.182.39 37.206.242.106 153.146.81.77