必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.66.149.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.66.149.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 157 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 16:38:02 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.149.66.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.149.66.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
153.153.170.28 attackbotsspam
May 21 16:07:59 * sshd[23233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.153.170.28
May 21 16:08:00 * sshd[23233]: Failed password for invalid user uql from 153.153.170.28 port 35894 ssh2
2020-05-21 23:27:21
14.18.103.163 attack
May 21 14:01:04  sshd\[11455\]: Invalid user diaosx from 14.18.103.163May 21 14:01:05  sshd\[11455\]: Failed password for invalid user diaosx from 14.18.103.163 port 58190 ssh2
...
2020-05-21 23:53:35
164.68.112.178 attackspam
scans 3 times in preceeding hours on the ports (in chronological order) 16992 20000 27017
2020-05-21 23:48:22
195.54.160.107 attack
scans 72 times in preceeding hours on the ports (in chronological order) 9494 9297 9253 9263 6866 7985 9242 6935 9227 7999 9467 6804 9260 9233 6807 7946 9420 9204 9275 6905 9346 6828 9295 7949 9245 9476 9260 9371 9337 9287 6895 9324 9331 6880 9300 6844 6890 9402 9232 9285 9220 9226 9219 7956 6962 6905 6912 9334 6927 9488 9294 9497 9485 6847 7893 6979 9240 6888 9279 9341 9472 9273 7950 9494 9346 9210 7932 6846 9297 7896 9240 9241
2020-05-21 23:40:45
139.59.67.160 attack
probing GET /wp-login.php
2020-05-21 23:20:23
142.93.130.58 attackbots
Unauthorized connection attempt detected from IP address 142.93.130.58 to port 8761
2020-05-21 23:50:34
138.197.12.187 attackspambots
May 21 17:44:13 debian-2gb-nbg1-2 kernel: \[12334674.717122\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=138.197.12.187 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=TCP SPT=60993 DPT=3689 WINDOW=65535 RES=0x00 SYN URGP=0
2020-05-21 23:55:45
190.210.231.34 attackspambots
SSH Bruteforce Attempt (failed auth)
2020-05-21 23:23:38
195.54.160.212 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 39893 proto: TCP cat: Misc Attack
2020-05-21 23:39:33
139.199.25.110 attackbots
SSH Brute Force
2020-05-21 23:24:07
118.172.48.49 attackspam
probes 3 times on the port 8291 8728
2020-05-22 00:03:44
92.242.40.247 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 2000 2000
2020-05-22 00:05:28
159.65.196.65 attackspam
May 21 15:22:00 prod4 sshd\[16269\]: Invalid user ykm from 159.65.196.65
May 21 15:22:02 prod4 sshd\[16269\]: Failed password for invalid user ykm from 159.65.196.65 port 48002 ssh2
May 21 15:26:37 prod4 sshd\[18031\]: Invalid user vig from 159.65.196.65
...
2020-05-21 23:49:10
117.2.167.233 attackspam
Unauthorized connection attempt from IP address 117.2.167.233 on Port 445(SMB)
2020-05-21 23:29:02
185.209.179.76 attack
scans 5 times in preceeding hours on the ports (in chronological order) 18229 18229 18229 43791 61741
2020-05-21 23:42:57

最近上报的IP列表

190.56.191.50 23.120.248.224 5.238.38.69 33.37.201.101
74.172.239.117 126.52.10.21 77.160.125.3 226.50.201.203
132.120.81.11 149.81.244.242 95.114.218.103 61.252.102.32
212.161.38.159 148.68.122.185 218.42.19.191 19.121.178.118
124.193.157.184 76.239.112.122 104.21.102.241 47.205.155.24