必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.102.66.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13001
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.102.66.220.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:57:23 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
220.66.102.166.in-addr.arpa domain name pointer h220.66.102.166.static.ip.windstream.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.66.102.166.in-addr.arpa	name = h220.66.102.166.static.ip.windstream.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.248.28.146 attackspam
445/tcp 445/tcp 445/tcp
[2019-06-03/07-29]3pkt
2019-07-30 11:34:06
185.220.101.28 attack
Jul 30 05:28:14 site2 sshd\[51967\]: Invalid user amx from 185.220.101.28Jul 30 05:28:16 site2 sshd\[51967\]: Failed password for invalid user amx from 185.220.101.28 port 37479 ssh2Jul 30 05:28:18 site2 sshd\[51967\]: Failed password for invalid user amx from 185.220.101.28 port 37479 ssh2Jul 30 05:28:21 site2 sshd\[51972\]: Invalid user admin from 185.220.101.28Jul 30 05:28:23 site2 sshd\[51972\]: Failed password for invalid user admin from 185.220.101.28 port 45597 ssh2
...
2019-07-30 11:07:49
219.142.135.106 attackspambots
21/tcp 21/tcp 21/tcp...
[2019-07-11/29]4pkt,1pt.(tcp)
2019-07-30 11:35:22
121.22.20.162 attack
2019-07-30T04:23:35.623737lon01.zurich-datacenter.net sshd\[15964\]: Invalid user ts from 121.22.20.162 port 39553
2019-07-30T04:23:35.628142lon01.zurich-datacenter.net sshd\[15964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.22.20.162
2019-07-30T04:23:37.936859lon01.zurich-datacenter.net sshd\[15964\]: Failed password for invalid user ts from 121.22.20.162 port 39553 ssh2
2019-07-30T04:28:11.441447lon01.zurich-datacenter.net sshd\[16069\]: Invalid user cgi from 121.22.20.162 port 34502
2019-07-30T04:28:11.446301lon01.zurich-datacenter.net sshd\[16069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.22.20.162
...
2019-07-30 11:13:32
87.241.106.127 attackbots
23/tcp 37215/tcp 2323/tcp...
[2019-06-26/07-29]14pkt,3pt.(tcp)
2019-07-30 11:03:08
179.185.99.132 attackspam
445/tcp 445/tcp 445/tcp...
[2019-05-31/07-29]14pkt,1pt.(tcp)
2019-07-30 11:17:56
129.175.129.169 attackbotsspam
Jul 29 22:45:34 plusreed sshd[28897]: Invalid user moodle from 129.175.129.169
...
2019-07-30 10:55:36
88.87.74.87 attackspam
SPF Fail sender not permitted to send mail for @ertelecom.ru / Mail sent to address hacked/leaked from Last.fm
2019-07-30 10:47:21
107.145.216.179 attackbots
Automatic report - Port Scan Attack
2019-07-30 11:37:58
85.105.170.120 attackbots
60001/tcp 23/tcp
[2019-07-28]2pkt
2019-07-30 10:57:13
212.98.232.212 attackbots
445/tcp 445/tcp 445/tcp...
[2019-07-08/28]5pkt,1pt.(tcp)
2019-07-30 11:10:17
14.143.5.184 attackbotsspam
Jul 29 23:17:59 vps200512 sshd\[19224\]: Invalid user brenda from 14.143.5.184
Jul 29 23:17:59 vps200512 sshd\[19224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.5.184
Jul 29 23:18:00 vps200512 sshd\[19224\]: Failed password for invalid user brenda from 14.143.5.184 port 38210 ssh2
Jul 29 23:22:55 vps200512 sshd\[19355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.5.184  user=root
Jul 29 23:22:57 vps200512 sshd\[19355\]: Failed password for root from 14.143.5.184 port 60518 ssh2
2019-07-30 11:28:39
128.106.164.254 attackbots
445/tcp 445/tcp 445/tcp...
[2019-07-23/28]5pkt,1pt.(tcp)
2019-07-30 11:06:37
107.180.121.19 attackbots
fail2ban honeypot
2019-07-30 11:03:25
80.211.251.79 attackspambots
Jul 30 02:42:49 w sshd[25901]: reveeclipse mapping checking getaddrinfo for host79-251-211-80.static.arubacloud.pl [80.211.251.79] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 30 02:42:49 w sshd[25901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.251.79  user=r.r
Jul 30 02:42:50 w sshd[25901]: Failed password for r.r from 80.211.251.79 port 58838 ssh2
Jul 30 02:42:51 w sshd[25901]: Received disconnect from 80.211.251.79: 11: Bye Bye [preauth]
Jul 30 02:42:52 w sshd[25903]: reveeclipse mapping checking getaddrinfo for host79-251-211-80.static.arubacloud.pl [80.211.251.79] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 30 02:42:52 w sshd[25903]: Invalid user admin from 80.211.251.79
Jul 30 02:42:52 w sshd[25903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.251.79 
Jul 30 02:42:54 w sshd[25903]: Failed password for invalid user admin from 80.211.251.79 port 34896 ssh2
Jul 30 02:42:54 ........
-------------------------------
2019-07-30 11:10:37

最近上报的IP列表

33.156.28.87 153.224.30.180 226.254.2.82 194.103.132.197
181.210.36.17 131.201.29.87 99.114.175.129 231.159.200.213
13.227.177.36 223.236.30.185 119.110.219.87 33.222.208.61
153.12.190.47 26.238.138.22 115.153.134.22 184.250.162.42
139.235.141.29 170.20.191.81 107.196.62.57 177.23.44.160