必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
112.66.99.6 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.6 to port 8000 [J]
2020-01-27 15:15:57
112.66.99.159 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.159 to port 802 [T]
2020-01-10 09:23:22
112.66.99.167 attackspam
Unauthorized connection attempt detected from IP address 112.66.99.167 to port 8899
2020-01-04 08:33:51
112.66.99.25 attackspambots
Unauthorized connection attempt detected from IP address 112.66.99.25 to port 8090
2020-01-01 21:33:22
112.66.99.1 attackspambots
Unauthorized connection attempt detected from IP address 112.66.99.1 to port 2095
2019-12-31 08:33:07
112.66.99.6 attackbotsspam
Unauthorized connection attempt detected from IP address 112.66.99.6 to port 3128
2019-12-31 07:42:24
112.66.99.211 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5430c47bb86fe825 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 06:48:59
112.66.99.155 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 540f7b87ae62e4fe | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:35:16
112.66.99.74 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5414bd353ee5eb45 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.066704189 Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:09:41
112.66.99.63 attack
The%20IP%20has%20triggered%20Cloudflare%20WAF.%20Report%20generated%20by%20Cloudflare-WAF-to-AbuseIPDB%20(https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB)
2019-11-19 04:18:55
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.99.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.66.99.188.			IN	A

;; AUTHORITY SECTION:
.			147	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:39:42 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 188.99.66.112.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 188.99.66.112.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.97.87.232 attack
Unauthorized connection attempt detected from IP address 177.97.87.232 to port 23
2020-05-29 23:56:41
213.142.156.27 spam
Huge amount of SPAM E-Mail received from this IP Address
2020-05-29 23:23:17
82.49.174.135 attack
Unauthorized connection attempt detected from IP address 82.49.174.135 to port 23
2020-05-30 00:08:46
64.227.25.174 attackspambots
Port Scan
2020-05-29 23:34:59
187.138.56.7 attack
May 29 17:07:37 iago sshd[15372]: Address 187.138.56.7 maps to dsl-187-138-56-7-dyn.prod-infinhostnameum.com.mx, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
May 29 17:07:37 iago sshd[15372]: Invalid user pi from 187.138.56.7
May 29 17:07:37 iago sshd[15373]: Address 187.138.56.7 maps to dsl-187-138-56-7-dyn.prod-infinhostnameum.com.mx, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
May 29 17:07:37 iago sshd[15373]: Invalid user pi from 187.138.56.7
May 29 17:07:37 iago sshd[15372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.138.56.7 
May 29 17:07:37 iago sshd[15373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.138.56.7 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.138.56.7
2020-05-29 23:51:19
61.152.90.81 attackspambots
Unauthorized connection attempt detected from IP address 61.152.90.81 to port 6550
2020-05-29 23:35:48
191.19.230.47 attackbots
Unauthorized connection attempt detected from IP address 191.19.230.47 to port 23
2020-05-29 23:48:48
189.142.140.169 attack
Unauthorized connection attempt detected from IP address 189.142.140.169 to port 81
2020-05-29 23:49:34
125.224.103.33 attackspambots
Port Scan
2020-05-29 23:58:59
103.97.209.55 attackbots
3306/tcp
[2020-05-29]1pkt
2020-05-29 23:25:01
51.91.68.39 attack
Unauthorized connection attempt detected from IP address 51.91.68.39 to port 6227
2020-05-30 00:12:20
59.94.130.51 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-05-29 23:36:37
82.222.61.135 spam
SPAM E-Mail received from this IP Address
2020-05-29 23:24:06
125.123.241.55 attackbots
Unauthorized connection attempt detected from IP address 125.123.241.55 to port 23
2020-05-29 23:59:23
94.254.47.218 attackbots
Unauthorized connection attempt detected from IP address 94.254.47.218 to port 23
2020-05-29 23:27:05

最近上报的IP列表

112.66.97.94 112.66.98.235 112.66.99.219 112.72.233.38
112.78.186.234 112.80.114.217 112.78.162.105 112.80.116.189
112.80.136.126 112.72.94.197 112.8.35.162 112.80.136.132
112.80.136.162 112.80.136.166 112.80.136.178 112.80.136.192
112.80.136.241 112.80.136.29 112.80.136.37 112.80.136.52