必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.97.50.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.97.50.132.			IN	A

;; AUTHORITY SECTION:
.			486	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 22:13:04 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 132.50.97.166.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 166.97.50.132.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.15.158 attackspam
2020-08-17T21:52:02.614020abusebot-6.cloudsearch.cf sshd[32583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
2020-08-17T21:52:05.364288abusebot-6.cloudsearch.cf sshd[32583]: Failed password for root from 222.186.15.158 port 33058 ssh2
2020-08-17T21:52:07.405959abusebot-6.cloudsearch.cf sshd[32583]: Failed password for root from 222.186.15.158 port 33058 ssh2
2020-08-17T21:52:02.614020abusebot-6.cloudsearch.cf sshd[32583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
2020-08-17T21:52:05.364288abusebot-6.cloudsearch.cf sshd[32583]: Failed password for root from 222.186.15.158 port 33058 ssh2
2020-08-17T21:52:07.405959abusebot-6.cloudsearch.cf sshd[32583]: Failed password for root from 222.186.15.158 port 33058 ssh2
2020-08-17T21:52:02.614020abusebot-6.cloudsearch.cf sshd[32583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss
...
2020-08-18 05:58:34
2606:a000:140a:8627:ccb7:2c2e:44af:5460 attack
Wordpress attack
2020-08-18 05:57:33
112.85.42.195 attackspambots
Aug 17 21:37:04 game-panel sshd[17737]: Failed password for root from 112.85.42.195 port 21454 ssh2
Aug 17 21:37:07 game-panel sshd[17737]: Failed password for root from 112.85.42.195 port 21454 ssh2
Aug 17 21:37:09 game-panel sshd[17737]: Failed password for root from 112.85.42.195 port 21454 ssh2
2020-08-18 05:53:07
66.198.240.22 attack
17.08.2020 22:27:33 - Wordpress fail 
Detected by ELinOX-ALM
2020-08-18 05:34:32
178.202.3.93 attackbots
Automatic report - Banned IP Access
2020-08-18 05:35:37
103.233.5.24 attackbotsspam
Aug 17 20:22:49 onepixel sshd[3458970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.233.5.24  user=root
Aug 17 20:22:51 onepixel sshd[3458970]: Failed password for root from 103.233.5.24 port 47744 ssh2
Aug 17 20:24:54 onepixel sshd[3460092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.233.5.24  user=root
Aug 17 20:24:56 onepixel sshd[3460092]: Failed password for root from 103.233.5.24 port 16814 ssh2
Aug 17 20:27:07 onepixel sshd[3461323]: Invalid user db2inst3 from 103.233.5.24 port 34547
2020-08-18 05:47:19
118.25.53.96 attack
Aug 17 23:46:31 vps sshd[146649]: Invalid user boat from 118.25.53.96 port 1518
Aug 17 23:46:31 vps sshd[146649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.53.96
Aug 17 23:46:33 vps sshd[146649]: Failed password for invalid user boat from 118.25.53.96 port 1518 ssh2
Aug 17 23:50:26 vps sshd[170558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.53.96  user=root
Aug 17 23:50:28 vps sshd[170558]: Failed password for root from 118.25.53.96 port 62592 ssh2
...
2020-08-18 05:52:36
194.204.194.11 attackspam
2020-08-17T20:49:58.355903vps1033 sshd[19497]: Invalid user humberto from 194.204.194.11 port 40328
2020-08-17T20:49:58.361404vps1033 sshd[19497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ll194-2-11-194-204-194.ll194-2.iam.net.ma
2020-08-17T20:49:58.355903vps1033 sshd[19497]: Invalid user humberto from 194.204.194.11 port 40328
2020-08-17T20:49:59.869128vps1033 sshd[19497]: Failed password for invalid user humberto from 194.204.194.11 port 40328 ssh2
2020-08-17T20:53:44.287973vps1033 sshd[27528]: Invalid user fabior from 194.204.194.11 port 48966
...
2020-08-18 05:59:52
200.175.104.103 attack
Multiple unauthorized connection attempts towards o365. User-agent: CBAInPROD. Last attempt at 2020-08-08T01:19:52.000Z UTC
2020-08-18 05:55:20
222.186.42.155 attackbots
Aug 17 18:38:54 vps46666688 sshd[11759]: Failed password for root from 222.186.42.155 port 46917 ssh2
...
2020-08-18 05:39:47
198.199.125.87 attack
Aug 17 16:25:09 ny01 sshd[19271]: Failed password for root from 198.199.125.87 port 37312 ssh2
Aug 17 16:27:08 ny01 sshd[19503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.125.87
Aug 17 16:27:10 ny01 sshd[19503]: Failed password for invalid user piotr from 198.199.125.87 port 35012 ssh2
2020-08-18 05:44:46
45.120.5.202 attack
Wordpress login attempts
2020-08-18 06:06:55
200.27.38.106 attackspam
Total attacks: 2
2020-08-18 05:40:40
192.144.218.254 attackbotsspam
Aug 17 08:22:32 mailrelay sshd[9963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.254  user=r.r
Aug 17 08:22:34 mailrelay sshd[9963]: Failed password for r.r from 192.144.218.254 port 51188 ssh2
Aug 17 08:22:35 mailrelay sshd[9963]: Received disconnect from 192.144.218.254 port 51188:11: Bye Bye [preauth]
Aug 17 08:22:35 mailrelay sshd[9963]: Disconnected from 192.144.218.254 port 51188 [preauth]
Aug 17 08:33:57 mailrelay sshd[10000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.254  user=r.r
Aug 17 08:33:59 mailrelay sshd[10000]: Failed password for r.r from 192.144.218.254 port 41792 ssh2
Aug 17 08:33:59 mailrelay sshd[10000]: Received disconnect from 192.144.218.254 port 41792:11: Bye Bye [preauth]
Aug 17 08:33:59 mailrelay sshd[10000]: Disconnected from 192.144.218.254 port 41792 [preauth]
Aug 17 08:39:55 mailrelay sshd[10035]: Invalid user oracle from 192.........
-------------------------------
2020-08-18 05:31:17
34.68.127.147 attack
Aug 17 23:01:37 home sshd[661988]: Invalid user tt from 34.68.127.147 port 47571
Aug 17 23:01:37 home sshd[661988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.68.127.147 
Aug 17 23:01:37 home sshd[661988]: Invalid user tt from 34.68.127.147 port 47571
Aug 17 23:01:39 home sshd[661988]: Failed password for invalid user tt from 34.68.127.147 port 47571 ssh2
Aug 17 23:04:38 home sshd[663051]: Invalid user odoo from 34.68.127.147 port 45079
...
2020-08-18 05:34:06

最近上报的IP列表

180.19.170.102 135.65.246.139 210.11.128.113 0.213.45.91
141.76.97.165 226.79.225.6 249.123.36.194 35.165.147.209
170.141.164.229 11.188.149.11 18.19.191.7 105.136.209.36
158.232.55.233 244.90.163.163 100.35.11.4 118.180.89.15
252.131.198.2 124.98.117.176 168.19.192.143 190.144.60.161