必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Ericsson Network Systems, Inc.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.135.187.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62027
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.135.187.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080601 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 07 03:29:40 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 66.187.135.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 66.187.135.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.220.100.250 attackspambots
Chat Spam
2020-04-26 07:45:39
117.160.141.43 attack
Attempted SSH bruteforce, disconnected prematurely.
2020-04-26 07:33:00
209.141.55.11 attack
Apr 25 18:17:46 XXX sshd[18902]: Invalid user ubuntu from 209.141.55.11 port 56426
2020-04-26 08:01:30
128.199.244.150 attackspam
128.199.244.150 - - [25/Apr/2020:22:24:06 +0200] "GET /wp-login.php HTTP/1.1" 200 5686 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.244.150 - - [25/Apr/2020:22:24:08 +0200] "POST /wp-login.php HTTP/1.1" 200 5937 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.244.150 - - [25/Apr/2020:22:24:11 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-26 07:42:21
209.17.96.234 attackbots
port scan and connect, tcp 5000 (upnp)
2020-04-26 08:07:37
128.199.36.177 attackbots
SSH invalid-user multiple login try
2020-04-26 08:02:41
178.62.21.80 attackbots
Invalid user test from 178.62.21.80 port 40472
2020-04-26 07:49:52
194.26.29.212 attackbots
Apr 26 01:45:40 debian-2gb-nbg1-2 kernel: \[10117278.102281\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.212 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=33335 PROTO=TCP SPT=41850 DPT=21314 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-26 07:52:09
218.92.0.165 attack
sshd jail - ssh hack attempt
2020-04-26 07:54:15
103.23.100.87 attack
2020-04-26T01:45:44.929268vps751288.ovh.net sshd\[24575\]: Invalid user juergen from 103.23.100.87 port 43337
2020-04-26T01:45:44.940495vps751288.ovh.net sshd\[24575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87
2020-04-26T01:45:47.366266vps751288.ovh.net sshd\[24575\]: Failed password for invalid user juergen from 103.23.100.87 port 43337 ssh2
2020-04-26T01:49:35.821422vps751288.ovh.net sshd\[24601\]: Invalid user danish from 103.23.100.87 port 42607
2020-04-26T01:49:35.829745vps751288.ovh.net sshd\[24601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.100.87
2020-04-26 07:58:42
34.220.116.92 attackbotsspam
As always with amazon web services
2020-04-26 07:48:15
163.172.49.56 attackbots
2020-04-20 20:26:33 server sshd[71293]: Failed password for invalid user test10 from 163.172.49.56 port 34050 ssh2
2020-04-26 07:49:39
34.96.217.139 attackspambots
Invalid user michel from 34.96.217.139 port 43548
2020-04-26 07:34:47
94.134.92.141 attack
Apr 25 02:05:05 pl2server postfix/smtpd[8971]: connect from unknown[94.134.92.141]
Apr 25 02:05:05 pl2server postfix/smtpd[8971]: connect from unknown[94.134.92.141]
Apr 25 02:05:06 pl2server postfix/smtpd[8971]: warning: unknown[94.134.92.141]: SASL LOGIN authentication failed: authentication failure
Apr 25 02:05:06 pl2server postfix/smtpd[8971]: warning: unknown[94.134.92.141]: SASL LOGIN authentication failed: authentication failure
Apr 25 02:05:06 pl2server postfix/smtpd[8971]: lost connection after AUTH from unknown[94.134.92.141]
Apr 25 02:05:06 pl2server postfix/smtpd[8971]: lost connection after AUTH from unknown[94.134.92.141]
Apr 25 02:05:06 pl2server postfix/smtpd[8971]: disconnect from unknown[94.134.92.141] ehlo=2 starttls=1 auth=0/1 commands=3/4
Apr 25 02:05:06 pl2server postfix/smtpd[8971]: disconnect from unknown[94.134.92.141] ehlo=2 starttls=1 auth=0/1 commands=3/4
Apr 25 03:00:13 pl2server postfix/smtpd[19794]: connect from unknown[94.134.92.141]
Apr ........
-------------------------------
2020-04-26 07:35:12
106.12.56.126 attackbots
Invalid user bf from 106.12.56.126 port 60046
2020-04-26 07:38:44

最近上报的IP列表

54.246.191.125 126.54.239.213 58.255.94.139 161.176.233.199
60.146.123.118 35.240.122.31 190.161.159.162 97.198.184.56
158.150.200.56 217.163.162.163 112.174.31.75 217.243.154.250
2.95.134.101 152.76.122.238 84.179.9.184 189.241.101.127
183.42.116.160 67.75.183.15 1.166.204.41 132.242.92.218