必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.66.52.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17090
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.66.52.148.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:11:15 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
Host 148.52.66.11.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.52.66.11.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.89.138.117 attackspambots
Oct  8 04:04:39 nopemail auth.info sshd[20866]: Disconnected from authenticating user root 118.89.138.117 port 10742 [preauth]
...
2020-10-08 15:50:07
113.186.42.25 attackbotsspam
Oct  8 09:16:25 vm1 sshd[9001]: Failed password for root from 113.186.42.25 port 40296 ssh2
...
2020-10-08 15:53:17
218.92.0.248 attack
2020-10-08T10:10:30.502974vps773228.ovh.net sshd[17324]: Failed password for root from 218.92.0.248 port 21278 ssh2
2020-10-08T10:10:33.889934vps773228.ovh.net sshd[17324]: Failed password for root from 218.92.0.248 port 21278 ssh2
2020-10-08T10:10:38.007213vps773228.ovh.net sshd[17324]: Failed password for root from 218.92.0.248 port 21278 ssh2
2020-10-08T10:10:41.158651vps773228.ovh.net sshd[17324]: Failed password for root from 218.92.0.248 port 21278 ssh2
2020-10-08T10:10:44.721508vps773228.ovh.net sshd[17324]: Failed password for root from 218.92.0.248 port 21278 ssh2
...
2020-10-08 16:13:02
113.56.119.73 attack
Oct  8 07:08:27 ns382633 sshd\[8626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.56.119.73  user=root
Oct  8 07:08:29 ns382633 sshd\[8626\]: Failed password for root from 113.56.119.73 port 54283 ssh2
Oct  8 07:14:22 ns382633 sshd\[9670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.56.119.73  user=root
Oct  8 07:14:24 ns382633 sshd\[9670\]: Failed password for root from 113.56.119.73 port 46427 ssh2
Oct  8 07:16:14 ns382633 sshd\[9828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.56.119.73  user=root
2020-10-08 15:45:11
101.51.191.21 attack
1602103454 - 10/07/2020 22:44:14 Host: 101.51.191.21/101.51.191.21 Port: 445 TCP Blocked
2020-10-08 16:11:57
36.248.211.71 attackbotsspam
/var/log/apache/pucorp.org.log:[Tue Oct 06 12:50:41 2020] [error] [client 36.248.211.71] File does not exist: /home/ovh/www/Admin62341fb0
/var/log/apache/pucorp.org.log:[Tue Oct 06 12:50:44 2020] [error] [client 36.248.211.71] File does not exist: /home/ovh/www/l.php
/var/log/apache/pucorp.org.log:[Tue Oct 06 12:50:44 2020] [error] [client 36.248.211.71] File does not exist: /home/ovh/www/phpinfo.php
/var/log/apache/pucorp.org.log:[Tue Oct 06 12:50:45 2020] [error] [client 36.248.211.71] File does not exist: /home/ovh/www/test.php
/var/log/apache/pucorp.org.log:[Tue Oct 06 12:50:45 2020] [error] [client 36.248.211.71] File does not exist: /home/ovh/www/index.php
/var/log/apache/pucorp.org.log:[Tue Oct 06 12:50:46 2020] [error] [client 36.248.211.71] File does not exist: /home/ovh/www/bbs.php
/var/log/apache/pucorp.org.log:[Tue Oct 06 12:50:48 2020] [error] [client 36.248.211.71] File does not exist: /home/ovh/www/forum.php
/var/log/apache/pucorp.org.log:[Tue Oct 06 12:50........
------------------------------
2020-10-08 16:21:29
154.83.16.242 attackspambots
Lines containing failures of 154.83.16.242
Oct  6 05:42:38 g2 sshd[13398]: User r.r from 154.83.16.242 not allowed because not listed in AllowUsers
Oct  6 05:42:38 g2 sshd[13398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.16.242  user=r.r
Oct  6 05:42:39 g2 sshd[13398]: Failed password for invalid user r.r from 154.83.16.242 port 40622 ssh2
Oct  6 05:42:41 g2 sshd[13398]: Received disconnect from 154.83.16.242 port 40622:11: Bye Bye [preauth]
Oct  6 05:42:41 g2 sshd[13398]: Disconnected from invalid user r.r 154.83.16.242 port 40622 [preauth]
Oct  6 05:47:59 g2 sshd[13495]: User r.r from 154.83.16.242 not allowed because not listed in AllowUsers
Oct  6 05:47:59 g2 sshd[13495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.16.242  user=r.r
Oct  6 05:48:01 g2 sshd[13495]: Failed password for invalid user r.r from 154.83.16.242 port 60870 ssh2
Oct  6 05:48:02 g2 sshd[13495]........
------------------------------
2020-10-08 15:48:40
2.7.45.17 attackbots
2020-10-08T14:44:30.164601hostname sshd[27210]: Failed password for root from 2.7.45.17 port 45340 ssh2
2020-10-08T14:48:05.127576hostname sshd[28606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-lyo-1-453-17.w2-7.abo.wanadoo.fr  user=root
2020-10-08T14:48:06.829277hostname sshd[28606]: Failed password for root from 2.7.45.17 port 51834 ssh2
...
2020-10-08 16:11:15
74.125.150.75 attackspambots
Fail2Ban Ban Triggered
2020-10-08 15:53:33
211.14.169.146 attack
Lines containing failures of 211.14.169.146
Oct  6 05:17:38 rancher sshd[16898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.14.169.146  user=r.r
Oct  6 05:17:40 rancher sshd[16898]: Failed password for r.r from 211.14.169.146 port 52650 ssh2
Oct  6 05:17:41 rancher sshd[16898]: Received disconnect from 211.14.169.146 port 52650:11: Bye Bye [preauth]
Oct  6 05:17:41 rancher sshd[16898]: Disconnected from authenticating user r.r 211.14.169.146 port 52650 [preauth]
Oct  6 05:26:14 rancher sshd[17004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.14.169.146  user=r.r
Oct  6 05:26:15 rancher sshd[17004]: Failed password for r.r from 211.14.169.146 port 39332 ssh2
Oct  6 05:26:18 rancher sshd[17004]: Received disconnect from 211.14.169.146 port 39332:11: Bye Bye [preauth]
Oct  6 05:26:18 rancher sshd[17004]: Disconnected from authenticating user r.r 211.14.169.146 port 39332 [preaut........
------------------------------
2020-10-08 15:46:40
195.231.11.11 attackbotsspam
Lines containing failures of 195.231.11.11
Oct  6 09:53:53 MAKserver06 sshd[1701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.11.11  user=r.r
Oct  6 09:53:55 MAKserver06 sshd[1701]: Failed password for r.r from 195.231.11.11 port 42442 ssh2
Oct  6 09:53:55 MAKserver06 sshd[1701]: Received disconnect from 195.231.11.11 port 42442:11: Bye Bye [preauth]
Oct  6 09:53:55 MAKserver06 sshd[1701]: Disconnected from authenticating user r.r 195.231.11.11 port 42442 [preauth]
Oct  6 10:09:07 MAKserver06 sshd[4344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.11.11  user=r.r
Oct  6 10:09:09 MAKserver06 sshd[4344]: Failed password for r.r from 195.231.11.11 port 55890 ssh2
Oct  6 10:09:09 MAKserver06 sshd[4344]: Received disconnect from 195.231.11.11 port 55890:11: Bye Bye [preauth]
Oct  6 10:09:09 MAKserver06 sshd[4344]: Disconnected from authenticating user r.r 195.231.11.11 por........
------------------------------
2020-10-08 16:14:02
170.106.37.30 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-07T20:40:44Z and 2020-10-07T20:44:22Z
2020-10-08 16:04:42
222.186.30.112 attack
Oct  8 09:44:12 santamaria sshd\[23138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
Oct  8 09:44:14 santamaria sshd\[23138\]: Failed password for root from 222.186.30.112 port 60921 ssh2
Oct  8 09:44:22 santamaria sshd\[23140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
...
2020-10-08 15:46:12
49.88.112.75 attack
2020-10-08T07:30:12.346566shield sshd\[13438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75  user=root
2020-10-08T07:30:14.071008shield sshd\[13438\]: Failed password for root from 49.88.112.75 port 43813 ssh2
2020-10-08T07:30:16.305595shield sshd\[13438\]: Failed password for root from 49.88.112.75 port 43813 ssh2
2020-10-08T07:30:18.479536shield sshd\[13438\]: Failed password for root from 49.88.112.75 port 43813 ssh2
2020-10-08T07:39:32.696764shield sshd\[14449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75  user=root
2020-10-08 15:53:59
186.154.38.249 attack
Telnetd brute force attack detected by fail2ban
2020-10-08 15:51:51

最近上报的IP列表

11.65.10.246 11.63.16.83 11.63.34.226 11.62.102.20
11.62.114.63 11.64.200.150 11.63.243.242 11.62.84.132
11.63.219.188 11.63.152.175 11.62.59.119 11.63.151.6
11.66.173.244 11.63.171.217 11.63.116.237 11.63.1.75
11.64.191.109 11.63.163.176 11.61.94.61 11.63.158.197