必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 206.168.66.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;206.168.66.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 09:52:36 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
22.66.168.206.in-addr.arpa domain name pointer 22.66.168.206.platinumconnect.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.66.168.206.in-addr.arpa	name = 22.66.168.206.platinumconnect.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.118.52.78 attack
Sep 26 03:09:20 hiderm sshd\[18207\]: Invalid user sara from 81.118.52.78
Sep 26 03:09:20 hiderm sshd\[18207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host78-52-static.118-81-b.business.telecomitalia.it
Sep 26 03:09:22 hiderm sshd\[18207\]: Failed password for invalid user sara from 81.118.52.78 port 46921 ssh2
Sep 26 03:13:31 hiderm sshd\[18563\]: Invalid user janine from 81.118.52.78
Sep 26 03:13:31 hiderm sshd\[18563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host78-52-static.118-81-b.business.telecomitalia.it
2019-09-26 21:16:32
92.118.38.52 attack
Brute force login attempts

09/26/2019 05:26:38 AM  nSMTP: manuela@healthspace.com [92.118.38.52] authentication failure using internet password
09/26/2019 05:26:38 AM  SMTP Server [0618:0012-083C] Authentication failed for user manuela@healthspace.com
09/26/2019 05:29:50 AM  nSMTP: gale@healthspace.com [92.118.38.52] authentication failure using internet password
09/26/2019 05:29:50 AM  SMTP Server [0618:0012-10F4] Authentication failed for user gale@healthspace.com
09/26/2019 05:33:01 AM  nSMTP: selma@healthspace.com [92.118.38.52] authentication failure using internet password
09/26/2019 05:33:01 AM  SMTP Server [0618:0012-113C] Authentication failed for user selma@healthspace.com
09/26/2019 05:36:06 AM  nSMTP: dolly@healthspace.com [92.118.38.52] authentication failure using internet password
09/26/2019 05:36:06 AM  SMTP Server [0618:0012-10F4] Authentication failed for user dolly@healthspace.com
2019-09-26 20:52:45
222.186.190.92 attackspambots
Sep 26 14:41:31 s64-1 sshd[12546]: Failed password for root from 222.186.190.92 port 63288 ssh2
Sep 26 14:41:48 s64-1 sshd[12546]: error: maximum authentication attempts exceeded for root from 222.186.190.92 port 63288 ssh2 [preauth]
Sep 26 14:41:59 s64-1 sshd[12548]: Failed password for root from 222.186.190.92 port 33786 ssh2
...
2019-09-26 20:49:02
218.92.0.191 attackbots
Sep 26 14:41:38 dcd-gentoo sshd[19832]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Sep 26 14:41:41 dcd-gentoo sshd[19832]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Sep 26 14:41:38 dcd-gentoo sshd[19832]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Sep 26 14:41:41 dcd-gentoo sshd[19832]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Sep 26 14:41:38 dcd-gentoo sshd[19832]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Sep 26 14:41:41 dcd-gentoo sshd[19832]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Sep 26 14:41:41 dcd-gentoo sshd[19832]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 22891 ssh2
...
2019-09-26 21:01:26
142.93.241.93 attackbots
Sep 26 14:32:22 mail sshd\[6035\]: Failed password for invalid user 00 from 142.93.241.93 port 35970 ssh2
Sep 26 14:36:11 mail sshd\[6733\]: Invalid user share from 142.93.241.93 port 36996
Sep 26 14:36:11 mail sshd\[6733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.241.93
Sep 26 14:36:13 mail sshd\[6733\]: Failed password for invalid user share from 142.93.241.93 port 36996 ssh2
Sep 26 14:40:14 mail sshd\[7505\]: Invalid user jd from 142.93.241.93 port 37328
2019-09-26 20:44:41
106.13.48.157 attackspambots
Sep 26 08:41:26 ny01 sshd[15720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.157
Sep 26 08:41:28 ny01 sshd[15720]: Failed password for invalid user Ruut from 106.13.48.157 port 35948 ssh2
Sep 26 08:47:26 ny01 sshd[17038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.157
2019-09-26 20:53:46
123.189.109.202 attackspam
Unauthorised access (Sep 26) SRC=123.189.109.202 LEN=40 TTL=49 ID=20865 TCP DPT=8080 WINDOW=27305 SYN 
Unauthorised access (Sep 26) SRC=123.189.109.202 LEN=40 TTL=49 ID=52220 TCP DPT=8080 WINDOW=27305 SYN 
Unauthorised access (Sep 25) SRC=123.189.109.202 LEN=40 TTL=49 ID=37088 TCP DPT=8080 WINDOW=27305 SYN
2019-09-26 20:35:01
139.199.174.58 attack
Sep 26 02:38:59 hpm sshd\[25039\]: Invalid user user from 139.199.174.58
Sep 26 02:38:59 hpm sshd\[25039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.174.58
Sep 26 02:39:01 hpm sshd\[25039\]: Failed password for invalid user user from 139.199.174.58 port 42358 ssh2
Sep 26 02:41:59 hpm sshd\[25457\]: Invalid user informix from 139.199.174.58
Sep 26 02:41:59 hpm sshd\[25457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.174.58
2019-09-26 20:49:49
193.112.174.67 attack
Sep 26 02:52:12 php1 sshd\[1113\]: Invalid user db2inst1 from 193.112.174.67
Sep 26 02:52:12 php1 sshd\[1113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.174.67
Sep 26 02:52:15 php1 sshd\[1113\]: Failed password for invalid user db2inst1 from 193.112.174.67 port 52898 ssh2
Sep 26 02:57:19 php1 sshd\[1653\]: Invalid user admissions from 193.112.174.67
Sep 26 02:57:19 php1 sshd\[1653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.174.67
2019-09-26 21:05:15
189.212.18.215 attack
Honeypot attack, port: 23, PTR: 189-212-18-215.static.axtel.net.
2019-09-26 20:38:02
58.187.22.36 attack
Honeypot attack, port: 23, PTR: adsl-dynamic-pool-xxx.fpt.vn.
2019-09-26 20:36:10
92.118.38.52 attack
Brute force login attempts

09/26/2019 05:26:38 AM  nSMTP: manuela@healthspace.com [92.118.38.52] authentication failure using internet password
09/26/2019 05:26:38 AM  SMTP Server [0618:0012-083C] Authentication failed for user manuela@healthspace.com
09/26/2019 05:29:50 AM  nSMTP: gale@healthspace.com [92.118.38.52] authentication failure using internet password
09/26/2019 05:29:50 AM  SMTP Server [0618:0012-10F4] Authentication failed for user gale@healthspace.com
09/26/2019 05:33:01 AM  nSMTP: selma@healthspace.com [92.118.38.52] authentication failure using internet password
09/26/2019 05:33:01 AM  SMTP Server [0618:0012-113C] Authentication failed for user selma@healthspace.com
09/26/2019 05:36:06 AM  nSMTP: dolly@healthspace.com [92.118.38.52] authentication failure using internet password
09/26/2019 05:36:06 AM  SMTP Server [0618:0012-10F4] Authentication failed for user dolly@healthspace.com
2019-09-26 20:52:55
49.247.207.56 attackbotsspam
2019-09-26T19:41:57.634409enmeeting.mahidol.ac.th sshd\[16501\]: Invalid user alfons from 49.247.207.56 port 35538
2019-09-26T19:41:57.652826enmeeting.mahidol.ac.th sshd\[16501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.207.56
2019-09-26T19:41:59.568899enmeeting.mahidol.ac.th sshd\[16501\]: Failed password for invalid user alfons from 49.247.207.56 port 35538 ssh2
...
2019-09-26 20:48:36
112.238.32.108 attack
Unauthorised access (Sep 26) SRC=112.238.32.108 LEN=40 TTL=49 ID=40669 TCP DPT=8080 WINDOW=60615 SYN
2019-09-26 21:18:58
23.236.148.54 attack
(From jeff.porter0039@gmail.com) Hello!

Does your website appear on the first page of Google search results when people are searching for keywords related to your products and services? Would you like to know what the possibilities are if you're getting more visibility online? 

On my previous work with other companies (that I'll be showing you if you're interested), results have shown that search engine optimization for their website had positive effects to their sales. Imagine if you were on page one, or if you were the top search result, it can lead to a substantial boost to your profits. I'd like to share some expert advice and suggestions about this matter. 

I'm offering you a free consultation about how your site can get more traffic so that you will be on the first page of search results. Please reply to let me know what you think. Talk to you soon! 

Best regards,
Jeff Porter
2019-09-26 20:39:58

最近上报的IP列表

227.81.16.23 26.66.111.106 12.29.40.169 233.74.205.49
46.195.129.40 193.185.37.243 205.146.156.12 245.207.29.244
190.209.189.118 146.229.58.134 242.4.200.122 94.41.2.18
242.31.14.12 62.86.44.127 173.251.136.103 201.230.84.73
42.2.230.252 103.144.49.120 252.5.198.69 85.159.1.160