必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): GoDaddy.com, LLC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.66.139.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5107
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.66.139.65.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 12 02:52:38 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 65.139.66.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 65.139.66.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.209.12.213 attack
Port scan(s) denied
2020-05-09 16:47:47
136.255.144.2 attackspam
May  9 01:37:11 dev0-dcde-rnet sshd[582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.255.144.2
May  9 01:37:14 dev0-dcde-rnet sshd[582]: Failed password for invalid user rohana from 136.255.144.2 port 55864 ssh2
May  9 01:42:40 dev0-dcde-rnet sshd[671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.255.144.2
2020-05-09 16:54:51
36.111.181.204 attack
May  9 03:19:07 hosting sshd[3477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.181.204  user=root
May  9 03:19:09 hosting sshd[3477]: Failed password for root from 36.111.181.204 port 55596 ssh2
...
2020-05-09 16:45:29
185.232.30.130 attackspambots
May  9 04:57:05 debian-2gb-nbg1-2 kernel: \[11251903.194861\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.232.30.130 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=40937 PROTO=TCP SPT=45410 DPT=9090 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-09 16:58:26
27.157.82.15 attackspambots
port 23
2020-05-09 16:20:03
162.204.50.21 attackbotsspam
May  9 03:15:15 inter-technics sshd[26228]: Invalid user ck from 162.204.50.21 port 25329
May  9 03:15:15 inter-technics sshd[26228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.204.50.21
May  9 03:15:15 inter-technics sshd[26228]: Invalid user ck from 162.204.50.21 port 25329
May  9 03:15:17 inter-technics sshd[26228]: Failed password for invalid user ck from 162.204.50.21 port 25329 ssh2
May  9 03:22:12 inter-technics sshd[27000]: Invalid user rajjat from 162.204.50.21 port 3229
...
2020-05-09 16:30:23
198.108.67.98 attackspam
05/08/2020-13:05:10.144055 198.108.67.98 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-09 16:18:14
156.96.56.58 attackspambots
port 25
2020-05-09 16:32:51
106.13.223.100 attackbots
May  9 04:27:19 server sshd[30001]: Failed password for invalid user nfs from 106.13.223.100 port 33180 ssh2
May  9 04:41:12 server sshd[40423]: Failed password for invalid user cui from 106.13.223.100 port 59478 ssh2
May  9 04:45:42 server sshd[44007]: Failed password for invalid user lyq from 106.13.223.100 port 53262 ssh2
2020-05-09 16:53:35
5.196.8.72 attack
2020-05-09T04:50:39.310518mail.broermann.family sshd[4513]: Failed password for root from 5.196.8.72 port 41392 ssh2
2020-05-09T04:54:13.952024mail.broermann.family sshd[4632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.ip-5-196-8.eu  user=root
2020-05-09T04:54:15.703698mail.broermann.family sshd[4632]: Failed password for root from 5.196.8.72 port 52198 ssh2
2020-05-09T04:57:41.426018mail.broermann.family sshd[4740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.ip-5-196-8.eu  user=root
2020-05-09T04:57:43.733621mail.broermann.family sshd[4740]: Failed password for root from 5.196.8.72 port 34764 ssh2
...
2020-05-09 16:29:02
110.191.203.25 attackspam
SSH invalid-user multiple login try
2020-05-09 16:52:58
5.196.198.147 attackspam
2020-05-09T11:51:31.862836vivaldi2.tree2.info sshd[12569]: Invalid user france from 5.196.198.147
2020-05-09T11:51:31.883232vivaldi2.tree2.info sshd[12569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.198.147
2020-05-09T11:51:31.862836vivaldi2.tree2.info sshd[12569]: Invalid user france from 5.196.198.147
2020-05-09T11:51:34.068412vivaldi2.tree2.info sshd[12569]: Failed password for invalid user france from 5.196.198.147 port 59314 ssh2
2020-05-09T11:55:07.797509vivaldi2.tree2.info sshd[12788]: Invalid user customer from 5.196.198.147
...
2020-05-09 16:23:12
122.166.237.117 attackbotsspam
May  9 04:48:58 sso sshd[25199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.166.237.117
May  9 04:49:01 sso sshd[25199]: Failed password for invalid user ok from 122.166.237.117 port 33237 ssh2
...
2020-05-09 16:27:32
209.126.8.93 attack
Port scan: Attack repeated for 24 hours
2020-05-09 16:52:24
201.229.156.107 attackspam
445/tcp 1433/tcp...
[2020-03-14/05-08]8pkt,2pt.(tcp)
2020-05-09 16:53:11

最近上报的IP列表

4.91.125.147 200.124.42.33 24.98.32.62 198.208.155.50
27.46.236.161 117.94.182.243 93.233.210.236 141.98.9.67
116.155.140.28 152.24.98.54 210.204.74.76 144.121.238.171
214.247.17.53 110.32.51.10 141.98.9.130 42.78.199.192
125.243.158.166 74.89.176.148 175.233.226.21 145.234.23.81