必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.42.93.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.42.93.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:54:33 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 91.93.42.166.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.93.42.166.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.128.195 attackbots
01.08.2019 23:25:50 Connection to port 916 blocked by firewall
2019-08-02 08:44:44
110.137.235.63 attackspambots
Automatic report - Port Scan Attack
2019-08-02 08:49:32
189.213.109.200 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-02 08:53:45
112.85.42.227 attackspambots
Aug  1 19:24:06 aat-srv002 sshd[26158]: Failed password for root from 112.85.42.227 port 40364 ssh2
Aug  1 19:26:29 aat-srv002 sshd[26238]: Failed password for root from 112.85.42.227 port 32738 ssh2
Aug  1 19:28:02 aat-srv002 sshd[26270]: Failed password for root from 112.85.42.227 port 53982 ssh2
...
2019-08-02 08:50:57
66.249.66.93 attackbots
Automatic report - Banned IP Access
2019-08-02 08:41:31
201.206.34.33 attackspam
Automatic report - Port Scan Attack
2019-08-02 08:55:09
49.234.179.127 attackbotsspam
2019-08-02T00:32:21.064644abusebot-8.cloudsearch.cf sshd\[20266\]: Invalid user heng from 49.234.179.127 port 37904
2019-08-02 08:40:05
106.13.99.245 attack
Aug  2 02:07:40 microserver sshd[52378]: Invalid user bash from 106.13.99.245 port 49656
Aug  2 02:07:40 microserver sshd[52378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.99.245
Aug  2 02:07:42 microserver sshd[52378]: Failed password for invalid user bash from 106.13.99.245 port 49656 ssh2
Aug  2 02:10:45 microserver sshd[53031]: Invalid user raphaello from 106.13.99.245 port 49706
Aug  2 02:10:45 microserver sshd[53031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.99.245
Aug  2 02:22:44 microserver sshd[56013]: Invalid user user4 from 106.13.99.245 port 49894
Aug  2 02:22:44 microserver sshd[56013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.99.245
Aug  2 02:22:47 microserver sshd[56013]: Failed password for invalid user user4 from 106.13.99.245 port 49894 ssh2
Aug  2 02:25:50 microserver sshd[57008]: Invalid user insserver from 106.13.99.245 port 49940
2019-08-02 08:33:34
189.241.100.160 attackbots
Aug  2 02:38:16 meumeu sshd[30540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.241.100.160 
Aug  2 02:38:18 meumeu sshd[30540]: Failed password for invalid user global from 189.241.100.160 port 39108 ssh2
Aug  2 02:43:09 meumeu sshd[31074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.241.100.160 
...
2019-08-02 08:51:28
81.22.45.21 attackspambots
08/01/2019-19:42:41.097724 81.22.45.21 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 81
2019-08-02 09:09:17
46.105.112.107 attack
Aug  2 01:37:48 SilenceServices sshd[22725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.112.107
Aug  2 01:37:50 SilenceServices sshd[22725]: Failed password for invalid user php5 from 46.105.112.107 port 53148 ssh2
Aug  2 01:41:59 SilenceServices sshd[25893]: Failed password for root from 46.105.112.107 port 48700 ssh2
2019-08-02 08:23:21
61.32.112.246 attackbotsspam
Aug  2 01:24:28 localhost sshd\[35435\]: Invalid user ftptest from 61.32.112.246 port 47994
Aug  2 01:24:28 localhost sshd\[35435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.32.112.246
...
2019-08-02 08:39:22
43.226.38.26 attack
Aug  2 01:13:45 ms-srv sshd[48788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.38.26
Aug  2 01:13:47 ms-srv sshd[48788]: Failed password for invalid user fabio from 43.226.38.26 port 47024 ssh2
2019-08-02 08:47:15
121.100.28.199 attackspambots
Aug  2 01:23:34 vtv3 sshd\[9997\]: Invalid user mkt from 121.100.28.199 port 58356
Aug  2 01:23:34 vtv3 sshd\[9997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.100.28.199
Aug  2 01:23:36 vtv3 sshd\[9997\]: Failed password for invalid user mkt from 121.100.28.199 port 58356 ssh2
Aug  2 01:28:57 vtv3 sshd\[12714\]: Invalid user www from 121.100.28.199 port 53484
Aug  2 01:28:57 vtv3 sshd\[12714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.100.28.199
Aug  2 01:39:31 vtv3 sshd\[18373\]: Invalid user replicator from 121.100.28.199 port 43564
Aug  2 01:39:31 vtv3 sshd\[18373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.100.28.199
Aug  2 01:39:34 vtv3 sshd\[18373\]: Failed password for invalid user replicator from 121.100.28.199 port 43564 ssh2
Aug  2 01:44:56 vtv3 sshd\[21192\]: Invalid user angus from 121.100.28.199 port 38294
Aug  2 01:44:56 vtv3 sshd\[2119
2019-08-02 08:24:02
178.128.114.248 attack
" "
2019-08-02 09:08:08

最近上报的IP列表

89.137.198.31 42.236.236.46 56.222.238.190 166.101.116.235
38.235.41.68 115.159.156.60 33.112.227.14 152.95.190.147
206.79.36.150 26.83.116.234 49.67.230.188 190.171.142.98
218.86.22.246 123.44.178.170 139.59.144.91 62.21.159.113
252.188.248.2 118.153.106.231 109.104.128.20 138.120.151.133