必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Norway

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.34.66.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.34.66.199.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:58:31 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
199.66.34.163.in-addr.arpa domain name pointer 199.66-34-163.hydro.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.66.34.163.in-addr.arpa	name = 199.66-34-163.hydro.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.211.78.121 attackbotsspam
SSH brute-force attempt
2020-06-26 05:42:49
114.33.170.182 attack
Honeypot attack, port: 81, PTR: 114-33-170-182.HINET-IP.hinet.net.
2020-06-26 05:48:16
47.91.233.114 attack
WordPress brute force
2020-06-26 05:52:10
186.216.71.217 attack
Jun 25 22:32:51 mail.srvfarm.net postfix/smtps/smtpd[2075110]: warning: unknown[186.216.71.217]: SASL PLAIN authentication failed: 
Jun 25 22:32:52 mail.srvfarm.net postfix/smtps/smtpd[2075110]: lost connection after AUTH from unknown[186.216.71.217]
Jun 25 22:37:53 mail.srvfarm.net postfix/smtpd[2075974]: warning: unknown[186.216.71.217]: SASL PLAIN authentication failed: 
Jun 25 22:37:53 mail.srvfarm.net postfix/smtpd[2075974]: lost connection after AUTH from unknown[186.216.71.217]
Jun 25 22:40:20 mail.srvfarm.net postfix/smtpd[2071449]: warning: unknown[186.216.71.217]: SASL PLAIN authentication failed:
2020-06-26 05:14:55
217.11.184.172 attack
Unauthorized connection attempt from IP address 217.11.184.172 on Port 445(SMB)
2020-06-26 05:50:21
103.198.80.44 attackspambots
Jun 25 22:18:10 mail.srvfarm.net postfix/smtpd[2071450]: warning: unknown[103.198.80.44]: SASL PLAIN authentication failed: 
Jun 25 22:18:10 mail.srvfarm.net postfix/smtpd[2071450]: lost connection after AUTH from unknown[103.198.80.44]
Jun 25 22:20:00 mail.srvfarm.net postfix/smtpd[2073207]: warning: unknown[103.198.80.44]: SASL PLAIN authentication failed: 
Jun 25 22:20:00 mail.srvfarm.net postfix/smtpd[2073207]: lost connection after AUTH from unknown[103.198.80.44]
Jun 25 22:22:18 mail.srvfarm.net postfix/smtps/smtpd[2072912]: warning: unknown[103.198.80.44]: SASL PLAIN authentication failed:
2020-06-26 05:31:09
98.109.162.179 attackspam
06/25/2020-16:45:52.971036 98.109.162.179 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-26 05:45:28
187.87.2.3 attackbotsspam
Jun 25 22:12:40 mail.srvfarm.net postfix/smtpd[2071443]: warning: unknown[187.87.2.3]: SASL PLAIN authentication failed: 
Jun 25 22:12:40 mail.srvfarm.net postfix/smtpd[2071443]: lost connection after AUTH from unknown[187.87.2.3]
Jun 25 22:16:06 mail.srvfarm.net postfix/smtps/smtpd[2072920]: warning: 187-87-2-3.provedorm4net.com.br[187.87.2.3]: SASL PLAIN authentication failed: 
Jun 25 22:16:06 mail.srvfarm.net postfix/smtps/smtpd[2072920]: lost connection after AUTH from 187-87-2-3.provedorm4net.com.br[187.87.2.3]
Jun 25 22:18:38 mail.srvfarm.net postfix/smtpd[2073225]: warning: 187-87-2-3.provedorm4net.com.br[187.87.2.3]: SASL PLAIN authentication failed:
2020-06-26 05:26:06
189.84.72.228 attackspam
445/tcp
[2020-06-25]1pkt
2020-06-26 05:50:48
185.143.72.25 attackspam
2020-06-26T06:10:42.397456mx1.h3z.jp postfix/smtpd[24568]: warning: unknown[185.143.72.25]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-26T06:11:36.473999mx1.h3z.jp postfix/smtpd[24568]: warning: unknown[185.143.72.25]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-06-26T06:12:31.225156mx1.h3z.jp postfix/smtpd[24568]: warning: unknown[185.143.72.25]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-26 05:15:50
78.128.113.109 attack
Unauthorized connection attempt
IP: 78.128.113.109
Ports affected
    Simple Mail Transfer (25) 
    Message Submission (587) 
Abuse Confidence rating 100%
ASN Details
   AS209160 Miti 2000 EOOD
   Bulgaria (BG)
   CIDR 78.128.113.0/24
Log Date: 25/06/2020 8:45:40 PM UTC
2020-06-26 05:33:23
122.35.120.59 attack
Jun 25 22:45:56 vmd26974 sshd[18416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.35.120.59
Jun 25 22:45:58 vmd26974 sshd[18416]: Failed password for invalid user kmt from 122.35.120.59 port 50794 ssh2
...
2020-06-26 05:17:50
116.232.52.152 attack
Unauthorized connection attempt from IP address 116.232.52.152 on Port 445(SMB)
2020-06-26 05:51:14
94.230.20.45 attackspambots
Jun 25 22:11:47 mail.srvfarm.net postfix/smtps/smtpd[2058825]: warning: unknown[94.230.20.45]: SASL PLAIN authentication failed: 
Jun 25 22:11:47 mail.srvfarm.net postfix/smtps/smtpd[2058825]: lost connection after AUTH from unknown[94.230.20.45]
Jun 25 22:14:07 mail.srvfarm.net postfix/smtpd[2071445]: warning: unknown[94.230.20.45]: SASL PLAIN authentication failed: 
Jun 25 22:14:07 mail.srvfarm.net postfix/smtpd[2071445]: lost connection after AUTH from unknown[94.230.20.45]
Jun 25 22:14:26 mail.srvfarm.net postfix/smtpd[2073225]: warning: unknown[94.230.20.45]: SASL PLAIN authentication failed:
2020-06-26 05:42:09
187.72.124.60 attack
Unauthorized connection attempt from IP address 187.72.124.60 on Port 445(SMB)
2020-06-26 05:47:14

最近上报的IP列表

206.166.149.187 211.66.170.107 218.246.144.82 86.247.84.10
185.219.181.185 73.115.103.184 58.56.172.21 34.122.32.73
230.98.21.133 240.81.108.249 54.208.247.126 208.182.94.242
182.244.191.11 14.239.145.192 44.182.150.207 43.225.142.243
215.186.248.217 53.57.91.174 62.220.208.193 240.216.211.190