必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.217.66.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.217.66.107.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 18:09:31 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
107.66.217.213.in-addr.arpa domain name pointer port-213-217-66-107.static.as20676.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.66.217.213.in-addr.arpa	name = port-213-217-66-107.static.as20676.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.67.254.244 attackbots
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.254.244 
Failed password for invalid user mani from 114.67.254.244 port 38272 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.254.244
2020-10-03 12:09:33
5.200.241.104 attack
1601671289 - 10/02/2020 22:41:29 Host: 5.200.241.104/5.200.241.104 Port: 445 TCP Blocked
2020-10-03 12:23:02
61.155.2.142 attackspambots
Oct  2 20:39:16 ns3033917 sshd[17341]: Invalid user oracle from 61.155.2.142 port 32642
Oct  2 20:39:18 ns3033917 sshd[17341]: Failed password for invalid user oracle from 61.155.2.142 port 32642 ssh2
Oct  2 20:41:26 ns3033917 sshd[17361]: Invalid user rstudio from 61.155.2.142 port 7425
...
2020-10-03 12:23:58
222.186.180.130 attackbots
Oct  3 06:24:10 abendstille sshd\[20065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Oct  3 06:24:12 abendstille sshd\[20065\]: Failed password for root from 222.186.180.130 port 29450 ssh2
Oct  3 06:24:21 abendstille sshd\[20291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Oct  3 06:24:22 abendstille sshd\[20291\]: Failed password for root from 222.186.180.130 port 49013 ssh2
Oct  3 06:24:25 abendstille sshd\[20291\]: Failed password for root from 222.186.180.130 port 49013 ssh2
...
2020-10-03 12:25:49
83.233.41.228 attack
Lines containing failures of 83.233.41.228
Oct  1 11:28:39 jarvis sshd[31903]: Invalid user hacker from 83.233.41.228 port 54784
Oct  1 11:28:39 jarvis sshd[31903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.233.41.228 
Oct  1 11:28:41 jarvis sshd[31903]: Failed password for invalid user hacker from 83.233.41.228 port 54784 ssh2
Oct  1 11:28:42 jarvis sshd[31903]: Received disconnect from 83.233.41.228 port 54784:11: Bye Bye [preauth]
Oct  1 11:28:42 jarvis sshd[31903]: Disconnected from invalid user hacker 83.233.41.228 port 54784 [preauth]
Oct  1 11:39:37 jarvis sshd[765]: Invalid user spotlight from 83.233.41.228 port 35076
Oct  1 11:39:37 jarvis sshd[765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.233.41.228 
Oct  1 11:39:39 jarvis sshd[765]: Failed password for invalid user spotlight from 83.233.41.228 port 35076 ssh2
Oct  1 11:39:39 jarvis sshd[765]: Received disconnect........
------------------------------
2020-10-03 12:04:02
159.65.1.41 attackbotsspam
Oct  3 03:19:54 abendstille sshd\[756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.1.41  user=root
Oct  3 03:19:56 abendstille sshd\[756\]: Failed password for root from 159.65.1.41 port 36392 ssh2
Oct  3 03:24:44 abendstille sshd\[5242\]: Invalid user postgres from 159.65.1.41
Oct  3 03:24:44 abendstille sshd\[5242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.1.41
Oct  3 03:24:46 abendstille sshd\[5242\]: Failed password for invalid user postgres from 159.65.1.41 port 44072 ssh2
...
2020-10-03 12:25:27
49.233.51.204 attack
这个IP地址把我的号盗了
2020-10-03 10:40:29
5.39.81.217 attack
Oct  3 04:25:28 rush sshd[30060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.81.217
Oct  3 04:25:30 rush sshd[30060]: Failed password for invalid user thor from 5.39.81.217 port 35984 ssh2
Oct  3 04:31:19 rush sshd[30141]: Failed password for root from 5.39.81.217 port 35090 ssh2
...
2020-10-03 12:40:50
114.129.168.188 attackspambots
[MK-VM5] Blocked by UFW
2020-10-03 12:35:04
128.199.160.35 attack
2020-10-03T04:02:03.105152server.espacesoutien.com sshd[11702]: Invalid user cognos from 128.199.160.35 port 8460
2020-10-03T04:02:03.118724server.espacesoutien.com sshd[11702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.160.35
2020-10-03T04:02:03.105152server.espacesoutien.com sshd[11702]: Invalid user cognos from 128.199.160.35 port 8460
2020-10-03T04:02:04.912373server.espacesoutien.com sshd[11702]: Failed password for invalid user cognos from 128.199.160.35 port 8460 ssh2
...
2020-10-03 12:21:48
122.51.252.45 attackbotsspam
SSH Invalid Login
2020-10-03 12:38:11
122.51.248.76 attackspambots
Oct  3 00:46:04 DAAP sshd[4579]: Invalid user yhlee from 122.51.248.76 port 58192
Oct  3 00:46:04 DAAP sshd[4579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.248.76
Oct  3 00:46:04 DAAP sshd[4579]: Invalid user yhlee from 122.51.248.76 port 58192
Oct  3 00:46:06 DAAP sshd[4579]: Failed password for invalid user yhlee from 122.51.248.76 port 58192 ssh2
Oct  3 00:49:28 DAAP sshd[4592]: Invalid user cs from 122.51.248.76 port 53470
...
2020-10-03 12:13:21
119.45.46.159 attackbots
Oct  3 00:00:36 vpn01 sshd[11557]: Failed password for root from 119.45.46.159 port 48192 ssh2
...
2020-10-03 12:20:32
222.186.42.213 attack
$f2bV_matches
2020-10-03 12:11:20
200.140.234.142 attackspambots
Ssh brute force
2020-10-03 12:36:25

最近上报的IP列表

99.219.165.179 69.190.209.130 154.170.170.251 206.207.175.76
150.136.213.201 84.248.233.92 245.20.149.100 249.128.115.255
166.75.79.80 48.74.181.148 88.56.192.174 59.189.251.19
179.135.246.85 234.153.2.208 63.99.142.18 94.126.223.225
119.188.219.1 244.232.223.235 119.84.88.225 208.131.15.113