必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
112.66.99.6 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.6 to port 8000 [J]
2020-01-27 15:15:57
112.66.99.159 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.159 to port 802 [T]
2020-01-10 09:23:22
112.66.99.167 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.167 to port 8899
2020-01-04 08:33:51
112.66.99.25 attackspambots
Unauthorized connection attempt detected from IP address 112.66.99.25 to port 8090
2020-01-01 21:33:22
112.66.99.1 attackspambots
Unauthorized connection attempt detected from IP address 112.66.99.1 to port 2095
2019-12-31 08:33:07
112.66.99.6 attackbotsspam
Unauthorized connection attempt detected from IP address 112.66.99.6 to port 3128
2019-12-31 07:42:24
112.66.99.211 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5430c47bb86fe825 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 06:48:59
112.66.99.155 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 540f7b87ae62e4fe | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:35:16
112.66.99.74 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5414bd353ee5eb45 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.066704189 Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:09:41
112.66.99.63 attack
The%20IP%20has%20triggered%20Cloudflare%20WAF.%20Report%20generated%20by%20Cloudflare-WAF-to-AbuseIPDB%20(https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB)
2019-11-19 04:18:55
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.99.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.66.99.14.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022101 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 02:30:25 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 14.99.66.112.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.99.66.112.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.220.230.21 attackbotsspam
Sep  6 17:52:21 OPSO sshd\[9989\]: Invalid user ansible from 60.220.230.21 port 51833
Sep  6 17:52:21 OPSO sshd\[9989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.230.21
Sep  6 17:52:23 OPSO sshd\[9989\]: Failed password for invalid user ansible from 60.220.230.21 port 51833 ssh2
Sep  6 17:58:16 OPSO sshd\[10503\]: Invalid user ts from 60.220.230.21 port 44515
Sep  6 17:58:16 OPSO sshd\[10503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.230.21
2019-09-07 08:13:14
141.98.10.55 attackbotsspam
2019-09-07T02:52:18.628679ns1.unifynetsol.net postfix/smtpd\[29480\]: warning: unknown\[141.98.10.55\]: SASL LOGIN authentication failed: authentication failure
2019-09-07T03:31:30.300203ns1.unifynetsol.net postfix/smtpd\[29462\]: warning: unknown\[141.98.10.55\]: SASL LOGIN authentication failed: authentication failure
2019-09-07T04:11:04.588604ns1.unifynetsol.net postfix/smtpd\[3820\]: warning: unknown\[141.98.10.55\]: SASL LOGIN authentication failed: authentication failure
2019-09-07T04:50:52.109478ns1.unifynetsol.net postfix/smtpd\[7592\]: warning: unknown\[141.98.10.55\]: SASL LOGIN authentication failed: authentication failure
2019-09-07T05:30:26.990420ns1.unifynetsol.net postfix/smtpd\[18742\]: warning: unknown\[141.98.10.55\]: SASL LOGIN authentication failed: authentication failure
2019-09-07 08:24:14
118.68.86.163 attackbots
Unauthorised access (Sep  6) SRC=118.68.86.163 LEN=40 TTL=47 ID=30804 TCP DPT=8080 WINDOW=11384 SYN 
Unauthorised access (Sep  6) SRC=118.68.86.163 LEN=40 TTL=47 ID=55157 TCP DPT=8080 WINDOW=11384 SYN
2019-09-07 07:45:46
36.229.17.121 attackspambots
firewall-block, port(s): 23/tcp
2019-09-07 07:56:09
119.197.77.52 attack
Sep  6 21:27:07 meumeu sshd[2824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.197.77.52 
Sep  6 21:27:09 meumeu sshd[2824]: Failed password for invalid user vncuser from 119.197.77.52 port 50140 ssh2
Sep  6 21:31:44 meumeu sshd[3481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.197.77.52 
...
2019-09-07 07:50:29
202.131.152.2 attackspam
Sep  6 20:23:33 core sshd[10147]: Invalid user sammy123 from 202.131.152.2 port 40650
Sep  6 20:23:36 core sshd[10147]: Failed password for invalid user sammy123 from 202.131.152.2 port 40650 ssh2
...
2019-09-07 08:22:55
213.135.154.232 attack
Sep  6 08:51:15 mailman postfix/smtpd[13240]: NOQUEUE: reject: RCPT from unknown[213.135.154.232]: 554 5.7.1 Service unavailable; Client host [213.135.154.232] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/213.135.154.232 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[213.135.154.232]>
Sep  6 08:59:28 mailman postfix/smtpd[13406]: NOQUEUE: reject: RCPT from unknown[213.135.154.232]: 554 5.7.1 Service unavailable; Client host [213.135.154.232] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/213.135.154.232 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[213.135.154.232]>
2019-09-07 08:14:36
181.174.112.18 attackbots
Sep  6 21:42:24 vps691689 sshd[23736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.174.112.18
Sep  6 21:42:26 vps691689 sshd[23736]: Failed password for invalid user password123 from 181.174.112.18 port 54404 ssh2
...
2019-09-07 07:59:30
88.214.26.171 attackspam
2019-09-07T04:32:15.149138enmeeting.mahidol.ac.th sshd\[14468\]: Invalid user admin from 88.214.26.171 port 33331
2019-09-07T04:32:15.163792enmeeting.mahidol.ac.th sshd\[14468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.214.26.171
2019-09-07T04:32:17.503220enmeeting.mahidol.ac.th sshd\[14468\]: Failed password for invalid user admin from 88.214.26.171 port 33331 ssh2
...
2019-09-07 08:17:11
37.28.155.58 attackbots
Attack Wordpress login
2019-09-07 07:57:56
180.168.36.86 attackspambots
Sep  6 07:40:59 auw2 sshd\[19265\]: Invalid user teamspeak from 180.168.36.86
Sep  6 07:40:59 auw2 sshd\[19265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.36.86
Sep  6 07:41:01 auw2 sshd\[19265\]: Failed password for invalid user teamspeak from 180.168.36.86 port 3422 ssh2
Sep  6 07:46:17 auw2 sshd\[19729\]: Invalid user ftpuser from 180.168.36.86
Sep  6 07:46:17 auw2 sshd\[19729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.36.86
2019-09-07 08:20:38
146.196.63.178 attackbotsspam
namecheap spam
2019-09-07 07:54:13
209.17.96.26 attackspam
Brute force attack stopped by firewall
2019-09-07 08:32:14
165.22.6.195 attackspambots
Sep  6 04:29:52 php1 sshd\[5670\]: Invalid user amsftp from 165.22.6.195
Sep  6 04:29:52 php1 sshd\[5670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.6.195
Sep  6 04:29:54 php1 sshd\[5670\]: Failed password for invalid user amsftp from 165.22.6.195 port 56394 ssh2
Sep  6 04:34:15 php1 sshd\[6030\]: Invalid user mc from 165.22.6.195
Sep  6 04:34:15 php1 sshd\[6030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.6.195
2019-09-07 07:53:28
94.134.94.129 attackspambots
Web App Attack
2019-09-07 07:58:55

最近上报的IP列表

112.66.98.254 112.67.171.184 112.67.253.130 112.72.179.142
112.72.223.231 112.74.84.160 112.74.94.199 112.74.98.55
112.78.112.59 112.78.117.244 112.78.125.122 112.78.125.143
112.78.125.175 112.78.125.232 112.78.125.55 202.116.78.10
112.90.131.55 113.10.158.126 113.107.238.209 113.113.124.21