必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.66.242.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.66.242.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121502 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 12:20:56 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
118.242.66.23.in-addr.arpa domain name pointer a23-66-242-118.deploy.static.akamaitechnologies.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.242.66.23.in-addr.arpa	name = a23-66-242-118.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.217.228.53 attackspam
Sun, 21 Jul 2019 07:35:42 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 00:13:37
182.18.171.148 attackbots
Jul 21 16:20:02 localhost sshd\[22879\]: Invalid user ftp from 182.18.171.148 port 33918
Jul 21 16:20:02 localhost sshd\[22879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.18.171.148
Jul 21 16:20:05 localhost sshd\[22879\]: Failed password for invalid user ftp from 182.18.171.148 port 33918 ssh2
2019-07-22 00:16:11
180.190.78.116 attackspambots
Sun, 21 Jul 2019 07:35:49 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 23:45:31
220.142.29.250 attackbotsspam
Caught in portsentry honeypot
2019-07-22 00:41:34
171.7.72.204 attack
Sun, 21 Jul 2019 07:35:36 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 00:36:08
61.7.235.62 attack
Sun, 21 Jul 2019 07:35:40 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 00:23:37
64.31.33.70 attackspam
\[2019-07-21 09:19:35\] NOTICE\[20804\] chan_sip.c: Registration from '"9090" \' failed for '64.31.33.70:5898' - Wrong password
\[2019-07-21 09:19:35\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-21T09:19:35.706-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="9090",SessionID="0x7f06f823f758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/64.31.33.70/5898",Challenge="630f9b5c",ReceivedChallenge="630f9b5c",ReceivedHash="ebc666ba3c9931e8a9722af5d67592ac"
\[2019-07-21 09:19:35\] NOTICE\[20804\] chan_sip.c: Registration from '"9090" \' failed for '64.31.33.70:5898' - Wrong password
\[2019-07-21 09:19:35\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-21T09:19:35.778-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="9090",SessionID="0x7f06f8009f28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
2019-07-22 00:44:47
87.116.190.205 attackspam
Sun, 21 Jul 2019 07:35:39 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 00:28:00
145.249.137.150 attackspambots
Sun, 21 Jul 2019 07:35:32 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 00:50:47
61.90.26.105 attackbotsspam
Sun, 21 Jul 2019 07:35:35 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 00:40:46
116.74.63.200 attackbots
Sun, 21 Jul 2019 07:35:49 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 23:46:48
178.204.196.130 attack
Sun, 21 Jul 2019 07:35:36 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 00:35:38
210.245.2.226 attackspam
2019-07-21T16:07:52.847811centos sshd\[11931\]: Invalid user dst from 210.245.2.226 port 35094
2019-07-21T16:07:52.852920centos sshd\[11931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.2.226
2019-07-21T16:07:55.377126centos sshd\[11931\]: Failed password for invalid user dst from 210.245.2.226 port 35094 ssh2
2019-07-21 23:50:40
209.182.198.223 attack
POST /wp-login.php HTTP/1.1 200 2147 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-07-22 00:47:08
150.129.66.142 attackbots
Sun, 21 Jul 2019 07:35:48 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 23:46:13

最近上报的IP列表

134.24.86.164 237.171.231.113 144.7.23.9 19.106.103.214
102.39.165.191 188.207.108.121 138.100.168.241 217.54.251.192
46.229.175.90 237.149.30.231 35.173.81.115 7.252.166.234
97.50.216.221 198.93.5.7 187.70.195.114 192.70.117.57
233.154.162.2 48.35.236.229 145.246.162.103 154.16.156.51