必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.39.148.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48034
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.39.148.7.			IN	A

;; AUTHORITY SECTION:
.			254	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 26 17:14:11 CST 2024
;; MSG SIZE  rcvd: 105
HOST信息:
Host 7.148.39.166.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.148.39.166.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.36.202.237 attack
Brute force attempt
2020-09-06 08:00:33
184.22.201.129 attackbotsspam
2020-09-05 11:39:40.808034-0500  localhost smtpd[42141]: NOQUEUE: reject: RCPT from unknown[184.22.201.129]: 554 5.7.1 Service unavailable; Client host [184.22.201.129] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/184.22.201.129 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<184-22-201-0.24.myaisfibre.com>
2020-09-06 07:37:28
122.226.238.138 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 08:12:10
2.38.130.63 attackspam
Automatic report - Banned IP Access
2020-09-06 07:57:25
51.75.87.58 attack
2020-09-05 12:39:32.540258-0500  localhost smtpd[46585]: NOQUEUE: reject: RCPT from unknown[51.75.87.58]: 450 4.7.25 Client host rejected: cannot find your hostname, [51.75.87.58]; from= to= proto=ESMTP helo=
2020-09-06 07:37:53
152.32.139.75 attack
(sshd) Failed SSH login from 152.32.139.75 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  5 14:09:21 server sshd[26502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.139.75  user=root
Sep  5 14:09:23 server sshd[26502]: Failed password for root from 152.32.139.75 port 37660 ssh2
Sep  5 14:16:49 server sshd[29545]: Invalid user demo from 152.32.139.75 port 43020
Sep  5 14:16:51 server sshd[29545]: Failed password for invalid user demo from 152.32.139.75 port 43020 ssh2
Sep  5 14:27:26 server sshd[2990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.139.75  user=root
2020-09-06 07:59:10
106.8.167.27 attackbotsspam
2020-08-31 07:22:10 login_virtual_exim authenticator failed for (In9EMuTfU) [106.8.167.27]: 535 Incorrect authentication data (set_id=strueber.stellpflug)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.8.167.27
2020-09-06 07:49:46
41.92.105.45 attackbotsspam
2020-09-05 11:37:26.482363-0500  localhost smtpd[41784]: NOQUEUE: reject: RCPT from unknown[41.92.105.45]: 554 5.7.1 Service unavailable; Client host [41.92.105.45] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/41.92.105.45; from= to= proto=ESMTP helo=<[41.92.60.225]>
2020-09-06 07:40:00
218.156.38.65 attackspambots
(Sep  5)  LEN=40 TTL=52 ID=54871 TCP DPT=8080 WINDOW=19298 SYN 
 (Sep  5)  LEN=40 TTL=52 ID=54780 TCP DPT=8080 WINDOW=62658 SYN 
 (Sep  5)  LEN=40 TTL=52 ID=34904 TCP DPT=8080 WINDOW=23154 SYN 
 (Sep  5)  LEN=40 TTL=52 ID=21240 TCP DPT=8080 WINDOW=62658 SYN 
 (Sep  4)  LEN=40 TTL=52 ID=32959 TCP DPT=8080 WINDOW=19298 SYN 
 (Sep  4)  LEN=40 TTL=52 ID=35175 TCP DPT=8080 WINDOW=33194 SYN 
 (Sep  3)  LEN=40 TTL=52 ID=63072 TCP DPT=8080 WINDOW=62658 SYN 
 (Sep  2)  LEN=40 TTL=52 ID=35375 TCP DPT=8080 WINDOW=23154 SYN 
 (Sep  1)  LEN=40 TTL=52 ID=54708 TCP DPT=8080 WINDOW=19298 SYN 
 (Sep  1)  LEN=40 TTL=52 ID=1473 TCP DPT=8080 WINDOW=23154 SYN 
 (Sep  1)  LEN=40 TTL=52 ID=34190 TCP DPT=8080 WINDOW=33194 SYN 
 (Sep  1)  LEN=40 TTL=52 ID=25691 TCP DPT=8080 WINDOW=62658 SYN 
 (Aug 31)  LEN=40 TTL=52 ID=56739 TCP DPT=8080 WINDOW=33194 SYN 
 (Aug 30)  LEN=40 TTL=52 ID=46570 TCP DPT=8080 WINDOW=23154 SYN 
 (Aug 30)  LEN=40 TTL=52 ID=62008 TCP DPT=8080 WINDOW=23154 SYN 
 (Aug 30)  LEN=40 TTL=52 I...
2020-09-06 08:03:07
78.154.217.251 attack
Aug 31 07:15:38 uapps sshd[25225]: Invalid user admin from 78.154.217.251 port 48203
Aug 31 07:15:40 uapps sshd[25225]: Failed password for invalid user admin from 78.154.217.251 port 48203 ssh2
Aug 31 07:15:41 uapps sshd[25225]: Received disconnect from 78.154.217.251 port 48203:11: Bye Bye [preauth]
Aug 31 07:15:41 uapps sshd[25225]: Disconnected from invalid user admin 78.154.217.251 port 48203 [preauth]
Aug 31 07:15:42 uapps sshd[25227]: Invalid user admin from 78.154.217.251 port 48273
Aug 31 07:15:44 uapps sshd[25227]: Failed password for invalid user admin from 78.154.217.251 port 48273 ssh2
Aug 31 07:15:46 uapps sshd[25227]: Received disconnect from 78.154.217.251 port 48273:11: Bye Bye [preauth]
Aug 31 07:15:46 uapps sshd[25227]: Disconnected from invalid user admin 78.154.217.251 port 48273 [preauth]
Aug 31 07:15:47 uapps sshd[25229]: Invalid user admin from 78.154.217.251 port 48435
Aug 31 07:15:49 uapps sshd[25229]: Failed password for invalid user admin fro........
-------------------------------
2020-09-06 07:35:41
85.209.0.103 attack
2020-09-05T09:59:02.696237correo.[domain] sshd[38715]: Failed password for root from 85.209.0.103 port 44134 ssh2 2020-09-05T09:59:01.004033correo.[domain] sshd[38712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.103 user=root 2020-09-05T09:59:02.851474correo.[domain] sshd[38712]: Failed password for root from 85.209.0.103 port 44118 ssh2 ...
2020-09-06 07:50:40
49.72.26.165 attack
Sep  6 01:46:48 h2779839 sshd[1795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.26.165  user=root
Sep  6 01:46:50 h2779839 sshd[1795]: Failed password for root from 49.72.26.165 port 38826 ssh2
Sep  6 01:49:16 h2779839 sshd[1838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.26.165  user=root
Sep  6 01:49:18 h2779839 sshd[1838]: Failed password for root from 49.72.26.165 port 49902 ssh2
Sep  6 01:51:41 h2779839 sshd[1876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.26.165  user=root
Sep  6 01:51:44 h2779839 sshd[1876]: Failed password for root from 49.72.26.165 port 32790 ssh2
Sep  6 01:54:07 h2779839 sshd[1953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.26.165  user=root
Sep  6 01:54:09 h2779839 sshd[1953]: Failed password for root from 49.72.26.165 port 43852 ssh2
Sep  6 01:56:33 h277
...
2020-09-06 08:02:17
150.109.147.145 attack
Sep  5 21:51:48 server sshd[4869]: Failed password for root from 150.109.147.145 port 40248 ssh2
Sep  5 21:57:43 server sshd[7592]: Failed password for root from 150.109.147.145 port 57006 ssh2
Sep  5 22:03:47 server sshd[10423]: Failed password for root from 150.109.147.145 port 45522 ssh2
2020-09-06 07:46:33
77.56.227.4 attackspambots
Lines containing failures of 77.56.227.4 (max 1000)
Aug 31 07:23:07 server sshd[14041]: Connection from 77.56.227.4 port 55301 on 62.116.165.82 port 22
Aug 31 07:23:09 server sshd[14041]: Invalid user admin from 77.56.227.4 port 55301
Aug 31 07:23:09 server sshd[14041]: Received disconnect from 77.56.227.4 port 55301:11: Bye Bye [preauth]
Aug 31 07:23:09 server sshd[14041]: Disconnected from 77.56.227.4 port 55301 [preauth]
Aug 31 07:23:09 server sshd[14044]: Connection from 77.56.227.4 port 55349 on 62.116.165.82 port 22
Aug 31 07:23:09 server sshd[14044]: Invalid user admin from 77.56.227.4 port 55349
Aug 31 07:23:09 server sshd[14044]: Received disconnect from 77.56.227.4 port 55349:11: Bye Bye [preauth]
Aug 31 07:23:09 server sshd[14044]: Disconnected from 77.56.227.4 port 55349 [preauth]
Aug 31 07:23:09 server sshd[14047]: Connection from 77.56.227.4 port 55364 on 62.116.165.82 port 22
Aug 31 07:23:10 server sshd[14047]: Invalid user admin from 77.56.227.4 port 5536........
------------------------------
2020-09-06 07:51:52
138.36.201.246 attackbots
Sep 5 18:48:02 *host* postfix/smtps/smtpd\[6367\]: warning: unknown\[138.36.201.246\]: SASL PLAIN authentication failed:
2020-09-06 07:42:44

最近上报的IP列表

236.166.228.207 135.73.65.36 57.50.79.113 75.242.30.174
181.137.28.237 24.170.46.22 216.245.183.243 145.48.208.117
249.109.64.23 61.246.144.99 190.28.176.182 166.201.162.228
27.154.14.93 167.190.100.169 36.159.124.4 251.123.164.149
139.39.248.92 210.82.58.17 153.88.112.108 21.139.117.66