必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.213.149.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.213.149.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 15:25:21 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
66.149.213.13.in-addr.arpa domain name pointer ec2-13-213-149-66.ap-southeast-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.149.213.13.in-addr.arpa	name = ec2-13-213-149-66.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.91.211.186 attackspam
Port Scan: TCP/51392
2019-09-14 12:13:42
27.195.205.164 attackspambots
Port Scan: TCP/8080
2019-09-14 12:23:31
180.176.245.99 attackspambots
Port Scan: TCP/445
2019-09-14 12:33:06
222.117.218.135 attack
Port Scan: TCP/23
2019-09-14 12:25:08
186.214.168.85 attackspam
Port Scan: TCP/445
2019-09-14 12:32:30
177.10.197.18 attackbotsspam
Port Scan: TCP/8291
2019-09-14 12:35:34
69.92.229.218 attackbots
Port Scan: UDP/137
2019-09-14 11:50:34
62.28.187.44 attackbots
Port Scan: TCP/445
2019-09-14 12:19:19
35.203.87.232 attack
Port Scan: TCP/443
2019-09-14 11:54:31
107.137.66.252 attack
Port Scan: UDP/500
2019-09-14 12:40:29
24.59.26.83 attackspambots
Port Scan: UDP/137
2019-09-14 11:55:32
74.208.216.106 attackbotsspam
Port Scan: TCP/445
2019-09-14 11:47:09
49.88.112.112 attackspam
Failed password for root from 49.88.112.112 port 49197 ssh2
Failed password for root from 49.88.112.112 port 49197 ssh2
Failed password for root from 49.88.112.112 port 49197 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112  user=root
Failed password for root from 49.88.112.112 port 57135 ssh2
2019-09-14 12:21:49
94.243.228.93 attackspam
Port Scan: TCP/445
2019-09-14 12:14:53
12.156.211.226 attackspambots
Port Scan: UDP/137
2019-09-14 12:24:11

最近上报的IP列表

46.189.234.166 131.62.15.38 173.98.181.122 162.60.192.49
81.122.206.29 27.59.26.67 58.188.125.160 54.137.107.82
252.116.29.243 175.245.45.196 149.243.38.118 172.228.137.155
56.135.99.67 218.211.84.149 170.24.34.25 77.74.10.170
101.229.12.186 179.203.141.48 179.73.36.82 39.111.218.92