必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.91.17.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45828
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.91.17.80.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 19:59:13 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 80.17.91.166.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.17.91.166.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.214.20.60 attackspambots
Dec 15 15:52:05 tuxlinux sshd[11779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.214.20.60  user=root
Dec 15 15:52:07 tuxlinux sshd[11779]: Failed password for root from 41.214.20.60 port 33126 ssh2
Dec 15 15:52:05 tuxlinux sshd[11779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.214.20.60  user=root
Dec 15 15:52:07 tuxlinux sshd[11779]: Failed password for root from 41.214.20.60 port 33126 ssh2
...
2019-12-16 01:12:25
187.75.145.66 attack
Dec 15 17:54:23 jane sshd[13582]: Failed password for root from 187.75.145.66 port 13565 ssh2
Dec 15 18:01:34 jane sshd[18941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.75.145.66 
...
2019-12-16 01:16:14
109.229.124.131 attackspambots
[portscan] Port scan
2019-12-16 01:23:28
154.8.209.64 attackbots
Dec 15 17:44:29 microserver sshd[12786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.209.64  user=mysql
Dec 15 17:44:32 microserver sshd[12786]: Failed password for mysql from 154.8.209.64 port 40106 ssh2
Dec 15 17:51:26 microserver sshd[14035]: Invalid user jbojaca from 154.8.209.64 port 59594
Dec 15 17:51:26 microserver sshd[14035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.209.64
Dec 15 17:51:27 microserver sshd[14035]: Failed password for invalid user jbojaca from 154.8.209.64 port 59594 ssh2
Dec 15 18:04:43 microserver sshd[15848]: Invalid user wefers from 154.8.209.64 port 42042
Dec 15 18:04:43 microserver sshd[15848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.209.64
Dec 15 18:04:46 microserver sshd[15848]: Failed password for invalid user wefers from 154.8.209.64 port 42042 ssh2
Dec 15 18:11:28 microserver sshd[17106]: Invalid user merlina from 154.8.
2019-12-16 01:30:16
145.239.76.253 attack
Dec 15 17:51:48 loxhost sshd\[31656\]: Invalid user full from 145.239.76.253 port 36936
Dec 15 17:51:48 loxhost sshd\[31656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.76.253
Dec 15 17:51:50 loxhost sshd\[31656\]: Failed password for invalid user full from 145.239.76.253 port 36936 ssh2
Dec 15 17:57:15 loxhost sshd\[31779\]: Invalid user sophie from 145.239.76.253 port 47070
Dec 15 17:57:15 loxhost sshd\[31779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.76.253
...
2019-12-16 01:17:22
118.163.149.163 attackbotsspam
2019-12-15T15:05:42.650126shield sshd\[3175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118-163-149-163.hinet-ip.hinet.net  user=root
2019-12-15T15:05:44.853222shield sshd\[3175\]: Failed password for root from 118.163.149.163 port 33084 ssh2
2019-12-15T15:13:19.542723shield sshd\[4886\]: Invalid user web from 118.163.149.163 port 40504
2019-12-15T15:13:19.546145shield sshd\[4886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118-163-149-163.hinet-ip.hinet.net
2019-12-15T15:13:21.481442shield sshd\[4886\]: Failed password for invalid user web from 118.163.149.163 port 40504 ssh2
2019-12-16 01:28:56
182.254.172.63 attackspambots
Dec 15 16:20:17 ns3042688 sshd\[23474\]: Invalid user allergen from 182.254.172.63
Dec 15 16:20:17 ns3042688 sshd\[23474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.63 
Dec 15 16:20:20 ns3042688 sshd\[23474\]: Failed password for invalid user allergen from 182.254.172.63 port 51896 ssh2
Dec 15 16:26:23 ns3042688 sshd\[25690\]: Invalid user guest from 182.254.172.63
Dec 15 16:26:23 ns3042688 sshd\[25690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.63 
...
2019-12-16 01:23:53
79.7.86.76 attackspambots
SSH bruteforce (Triggered fail2ban)
2019-12-16 01:26:38
51.158.24.196 attackbots
5060/udp 5060/udp 5060/udp...
[2019-12-04/15]4pkt,1pt.(udp)
2019-12-16 01:11:36
49.234.184.123 attack
port scan and connect, tcp 6379 (redis)
2019-12-16 01:21:35
51.75.19.45 attackbotsspam
Dec 15 19:35:30 server sshd\[22926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-51-75-19.eu  user=root
Dec 15 19:35:32 server sshd\[22926\]: Failed password for root from 51.75.19.45 port 56438 ssh2
Dec 15 19:45:42 server sshd\[25931\]: Invalid user 123 from 51.75.19.45
Dec 15 19:45:42 server sshd\[25931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-51-75-19.eu 
Dec 15 19:45:43 server sshd\[25931\]: Failed password for invalid user 123 from 51.75.19.45 port 35010 ssh2
...
2019-12-16 01:16:49
91.134.140.32 attack
Dec 15 18:00:10 microserver sshd[15350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32  user=lp
Dec 15 18:00:11 microserver sshd[15350]: Failed password for lp from 91.134.140.32 port 36346 ssh2
Dec 15 18:05:27 microserver sshd[16293]: Invalid user jbehrman from 91.134.140.32 port 43974
Dec 15 18:05:27 microserver sshd[16293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
Dec 15 18:05:28 microserver sshd[16293]: Failed password for invalid user jbehrman from 91.134.140.32 port 43974 ssh2
Dec 15 18:15:38 microserver sshd[17794]: Invalid user haibel from 91.134.140.32 port 59432
Dec 15 18:15:38 microserver sshd[17794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.140.32
Dec 15 18:15:40 microserver sshd[17794]: Failed password for invalid user haibel from 91.134.140.32 port 59432 ssh2
Dec 15 18:20:48 microserver sshd[18529]: pam_unix(sshd:auth): authent
2019-12-16 01:08:49
104.131.189.116 attackbotsspam
Dec 15 16:09:24 microserver sshd[63649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=root
Dec 15 16:09:26 microserver sshd[63649]: Failed password for root from 104.131.189.116 port 56236 ssh2
Dec 15 16:17:22 microserver sshd[64995]: Invalid user choopa from 104.131.189.116 port 39648
Dec 15 16:17:22 microserver sshd[64995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116
Dec 15 16:17:24 microserver sshd[64995]: Failed password for invalid user choopa from 104.131.189.116 port 39648 ssh2
Dec 15 16:27:48 microserver sshd[1390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=root
Dec 15 16:27:50 microserver sshd[1390]: Failed password for root from 104.131.189.116 port 56120 ssh2
Dec 15 16:33:10 microserver sshd[2169]: Invalid user unpaged from 104.131.189.116 port 36122
Dec 15 16:33:10 microserver sshd[2169]: pam_unix(sshd:auth)
2019-12-16 01:03:58
192.81.79.63 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-16 01:02:58
181.48.28.13 attackspambots
Dec 15 06:50:09 kapalua sshd\[21245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13  user=root
Dec 15 06:50:11 kapalua sshd\[21245\]: Failed password for root from 181.48.28.13 port 56556 ssh2
Dec 15 06:56:20 kapalua sshd\[21849\]: Invalid user haderle from 181.48.28.13
Dec 15 06:56:20 kapalua sshd\[21849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13
Dec 15 06:56:22 kapalua sshd\[21849\]: Failed password for invalid user haderle from 181.48.28.13 port 33266 ssh2
2019-12-16 01:01:03

最近上报的IP列表

238.188.189.18 245.230.90.247 7.179.207.173 95.215.39.93
212.155.152.205 218.82.207.208 93.113.181.221 245.103.79.129
176.216.12.7 145.22.203.245 195.129.129.20 122.139.45.219
82.192.124.51 225.193.186.72 142.15.168.194 178.135.19.130
205.101.64.175 232.82.183.177 168.41.6.0 182.108.14.7