必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.203.139.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.203.139.66.			IN	A

;; AUTHORITY SECTION:
.			128	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091000 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 11 00:43:23 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 66.139.203.244.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.139.203.244.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.33.24.233 attack
Unauthorized connection attempt detected from IP address 114.33.24.233 to port 4567 [J]
2020-01-22 15:18:40
177.1.214.84 attackspambots
Jan 22 09:19:13 www1 sshd\[51564\]: Invalid user orca from 177.1.214.84Jan 22 09:19:15 www1 sshd\[51564\]: Failed password for invalid user orca from 177.1.214.84 port 54903 ssh2Jan 22 09:22:14 www1 sshd\[51979\]: Invalid user ltsp from 177.1.214.84Jan 22 09:22:16 www1 sshd\[51979\]: Failed password for invalid user ltsp from 177.1.214.84 port 7439 ssh2Jan 22 09:25:24 www1 sshd\[52382\]: Invalid user steam from 177.1.214.84Jan 22 09:25:26 www1 sshd\[52382\]: Failed password for invalid user steam from 177.1.214.84 port 14982 ssh2
...
2020-01-22 15:27:16
174.48.167.66 attack
Unauthorized connection attempt detected from IP address 174.48.167.66 to port 4567 [J]
2020-01-22 15:27:44
190.192.79.30 attackspam
unauthorized connection attempt
2020-01-22 15:22:23
35.231.211.161 attack
Jan 20 22:13:36 finn sshd[26110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161  user=r.r
Jan 20 22:13:39 finn sshd[26110]: Failed password for r.r from 35.231.211.161 port 58828 ssh2
Jan 20 22:13:39 finn sshd[26110]: Received disconnect from 35.231.211.161 port 58828:11: Bye Bye [preauth]
Jan 20 22:13:39 finn sshd[26110]: Disconnected from 35.231.211.161 port 58828 [preauth]
Jan 20 22:17:55 finn sshd[27143]: Invalid user ftpuser from 35.231.211.161 port 34670
Jan 20 22:17:55 finn sshd[27143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161
Jan 20 22:17:57 finn sshd[27143]: Failed password for invalid user ftpuser from 35.231.211.161 port 34670 ssh2
Jan 20 22:17:57 finn sshd[27143]: Received disconnect from 35.231.211.161 port 34670:11: Bye Bye [preauth]
Jan 20 22:17:57 finn sshd[27143]: Disconnected from 35.231.211.161 port 34670 [preauth]


........
-----------------------------------------------
2020-01-22 15:16:20
222.186.175.182 attackspam
Jan 21 21:28:53 web9 sshd\[22367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Jan 21 21:28:55 web9 sshd\[22367\]: Failed password for root from 222.186.175.182 port 39126 ssh2
Jan 21 21:29:12 web9 sshd\[22423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Jan 21 21:29:14 web9 sshd\[22423\]: Failed password for root from 222.186.175.182 port 61344 ssh2
Jan 21 21:29:34 web9 sshd\[22452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2020-01-22 15:31:59
200.149.232.242 attack
spam
2020-01-22 15:46:24
186.228.98.109 attack
unauthorized connection attempt
2020-01-22 15:26:55
197.50.37.253 attack
unauthorized connection attempt
2020-01-22 15:26:04
203.176.176.2 attackspam
SMB Server BruteForce Attack
2020-01-22 15:25:14
202.40.188.225 attackbotsspam
unauthorized connection attempt
2020-01-22 15:36:13
27.123.3.138 attack
20/1/22@00:51:57: FAIL: Alarm-Network address from=27.123.3.138
20/1/22@00:51:57: FAIL: Alarm-Network address from=27.123.3.138
...
2020-01-22 15:23:58
194.226.61.18 attackspam
spam
2020-01-22 15:46:45
170.81.35.26 attackspam
spam
2020-01-22 15:52:04
210.245.51.31 attackbots
spam
2020-01-22 15:45:26

最近上报的IP列表

103.109.56.162 244.203.139.141 157.170.176.58 140.213.233.156
140.213.233.56 47.242.93.201 104.244.77.192 100.64.195.127
2804:18:833:ef3:c65:67a3:5131:c9d7 162.66.221.120 2804:18:833:ef3:59ce:2c5:63c:81fd 187.109.169.251
0.75.115.148 11.25.176.195 123.25.1.66 62.231.39.33
179.25.126.160 50.10.20.212 177.79.75.53 57.53.0.138