必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.83.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.66.83.12.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030102 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 11:23:28 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 12.83.66.112.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.83.66.112.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.39.55.13 attack
2020-07-24T17:57:06.553384afi-git.jinr.ru sshd[25144]: Failed password for test from 213.39.55.13 port 46740 ssh2
2020-07-24T17:59:02.007094afi-git.jinr.ru sshd[25586]: Invalid user dallas from 213.39.55.13 port 53314
2020-07-24T17:59:02.010370afi-git.jinr.ru sshd[25586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.39.55.13
2020-07-24T17:59:02.007094afi-git.jinr.ru sshd[25586]: Invalid user dallas from 213.39.55.13 port 53314
2020-07-24T17:59:04.064505afi-git.jinr.ru sshd[25586]: Failed password for invalid user dallas from 213.39.55.13 port 53314 ssh2
...
2020-07-24 23:39:12
182.126.241.227 attack
Port scan detected on ports: 7574[TCP], 7574[TCP], 7574[TCP]
2020-07-24 23:08:25
76.126.96.44 attackbots
Lines containing failures of 76.126.96.44
Jul 20 07:56:31 kvm05 sshd[27480]: Bad protocol version identification '' from 76.126.96.44 port 33217
Jul 20 07:56:32 kvm05 sshd[27481]: Invalid user ubnt from 76.126.96.44 port 33282
Jul 20 07:56:33 kvm05 sshd[27481]: Connection closed by invalid user ubnt 76.126.96.44 port 33282 [preauth]
Jul 20 07:56:34 kvm05 sshd[27487]: Invalid user openhabian from 76.126.96.44 port 33507
Jul 20 07:56:35 kvm05 sshd[27487]: Connection closed by invalid user openhabian 76.126.96.44 port 33507 [preauth]
Jul 20 07:56:36 kvm05 sshd[27491]: Invalid user NetLinx from 76.126.96.44 port 33776
Jul 20 07:56:37 kvm05 sshd[27491]: Connection closed by invalid user NetLinx 76.126.96.44 port 33776 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=76.126.96.44
2020-07-24 23:20:15
183.88.22.174 attackbots
Jul 24 14:20:58 game-panel sshd[1936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.88.22.174
Jul 24 14:21:01 game-panel sshd[1936]: Failed password for invalid user hanlin from 183.88.22.174 port 33202 ssh2
Jul 24 14:26:38 game-panel sshd[2171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.88.22.174
2020-07-24 23:13:11
106.13.171.12 attack
2020-07-24T10:31:17.8781401495-001 sshd[43670]: Invalid user anjan from 106.13.171.12 port 41884
2020-07-24T10:31:20.3621671495-001 sshd[43670]: Failed password for invalid user anjan from 106.13.171.12 port 41884 ssh2
2020-07-24T10:41:19.6042581495-001 sshd[44175]: Invalid user virl from 106.13.171.12 port 59270
2020-07-24T10:41:19.6073961495-001 sshd[44175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.171.12
2020-07-24T10:41:19.6042581495-001 sshd[44175]: Invalid user virl from 106.13.171.12 port 59270
2020-07-24T10:41:21.7316731495-001 sshd[44175]: Failed password for invalid user virl from 106.13.171.12 port 59270 ssh2
...
2020-07-24 23:36:50
189.139.98.117 attackbots
xmlrpc attack
2020-07-24 23:23:14
222.186.175.169 attackspambots
Jul 24 17:03:38 melroy-server sshd[22665]: Failed password for root from 222.186.175.169 port 29452 ssh2
Jul 24 17:03:42 melroy-server sshd[22665]: Failed password for root from 222.186.175.169 port 29452 ssh2
...
2020-07-24 23:04:16
206.189.124.254 attack
2020-07-24T08:43:12.901679server.mjenks.net sshd[3398197]: Invalid user ts3 from 206.189.124.254 port 58348
2020-07-24T08:43:12.907202server.mjenks.net sshd[3398197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.124.254
2020-07-24T08:43:12.901679server.mjenks.net sshd[3398197]: Invalid user ts3 from 206.189.124.254 port 58348
2020-07-24T08:43:14.660399server.mjenks.net sshd[3398197]: Failed password for invalid user ts3 from 206.189.124.254 port 58348 ssh2
2020-07-24T08:47:54.465109server.mjenks.net sshd[3398678]: Invalid user david from 206.189.124.254 port 45526
...
2020-07-24 22:56:58
198.211.120.99 attackbots
Jul 24 16:38:00 srv-ubuntu-dev3 sshd[6140]: Invalid user postgres from 198.211.120.99
Jul 24 16:38:00 srv-ubuntu-dev3 sshd[6140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.120.99
Jul 24 16:38:00 srv-ubuntu-dev3 sshd[6140]: Invalid user postgres from 198.211.120.99
Jul 24 16:38:02 srv-ubuntu-dev3 sshd[6140]: Failed password for invalid user postgres from 198.211.120.99 port 45152 ssh2
Jul 24 16:41:58 srv-ubuntu-dev3 sshd[6565]: Invalid user nut from 198.211.120.99
Jul 24 16:41:58 srv-ubuntu-dev3 sshd[6565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.120.99
Jul 24 16:41:58 srv-ubuntu-dev3 sshd[6565]: Invalid user nut from 198.211.120.99
Jul 24 16:41:59 srv-ubuntu-dev3 sshd[6565]: Failed password for invalid user nut from 198.211.120.99 port 58408 ssh2
Jul 24 16:45:57 srv-ubuntu-dev3 sshd[7042]: Invalid user autumn from 198.211.120.99
...
2020-07-24 22:59:09
167.71.78.207 attack
Jul 24 17:00:10 electroncash sshd[33373]: Invalid user lm from 167.71.78.207 port 34168
Jul 24 17:00:10 electroncash sshd[33373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.78.207 
Jul 24 17:00:10 electroncash sshd[33373]: Invalid user lm from 167.71.78.207 port 34168
Jul 24 17:00:12 electroncash sshd[33373]: Failed password for invalid user lm from 167.71.78.207 port 34168 ssh2
Jul 24 17:04:31 electroncash sshd[35519]: Invalid user ciuser from 167.71.78.207 port 50558
...
2020-07-24 23:10:01
107.152.192.145 attackspambots
(From whitlow.retha@gmail.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com
2020-07-24 23:07:28
14.161.39.38 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-07-24 23:32:24
82.193.101.158 attackbotsspam
[portscan] Port scan
2020-07-24 23:18:33
222.186.30.218 attackbotsspam
Jul 24 17:01:59 v22018053744266470 sshd[15288]: Failed password for root from 222.186.30.218 port 31918 ssh2
Jul 24 17:02:09 v22018053744266470 sshd[15300]: Failed password for root from 222.186.30.218 port 55117 ssh2
...
2020-07-24 23:05:57
222.64.168.20 attack
Jul 20 07:53:47 server6 sshd[17579]: reveeclipse mapping checking getaddrinfo for 20.168.64.222.broad.xw.sh.dynamic.163data.com.cn [222.64.168.20] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 20 07:53:49 server6 sshd[17579]: Failed password for invalid user ubuntu from 222.64.168.20 port 12986 ssh2
Jul 20 07:53:50 server6 sshd[17579]: Received disconnect from 222.64.168.20: 11: Bye Bye [preauth]
Jul 20 08:06:29 server6 sshd[8323]: reveeclipse mapping checking getaddrinfo for 20.168.64.222.broad.xw.sh.dynamic.163data.com.cn [222.64.168.20] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 20 08:06:31 server6 sshd[8323]: Failed password for invalid user admin1 from 222.64.168.20 port 29713 ssh2
Jul 20 08:06:31 server6 sshd[8323]: Received disconnect from 222.64.168.20: 11: Bye Bye [preauth]
Jul 20 08:10:52 server6 sshd[924]: reveeclipse mapping checking getaddrinfo for 20.168.64.222.broad.xw.sh.dynamic.163data.com.cn [222.64.168.20] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 20 08:10:54 se........
-------------------------------
2020-07-24 23:27:09

最近上报的IP列表

112.66.83.119 112.66.83.126 112.66.83.141 112.66.83.145
112.66.83.150 112.66.83.157 112.66.83.158 112.66.83.171
112.66.83.185 112.66.83.198 221.49.109.132 112.66.83.200
112.66.83.206 112.66.83.223 112.66.83.232 112.66.83.24
112.66.83.245 112.66.83.246 112.66.83.248 112.66.83.27