必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
45.114.166.39 attackspam
Sep 14 09:24:29 our-server-hostname postfix/smtpd[31154]: connect from unknown[45.114.166.39]
Sep 14 09:24:30 our-server-hostname postfix/smtpd[31154]: NOQUEUE: reject: RCPT from unknown[45.114.166.39]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Sep 14 09:24:30 our-server-hostname postfix/smtpd[31154]: disconnect from unknown[45.114.166.39]
Sep 14 09:24:30 our-server-hostname postfix/smtpd[21858]: connect from unknown[45.114.166.39]
Sep 14 09:24:31 our-server-hostname postfix/smtpd[21858]: NOQUEUE: reject: RCPT from unknown[45.114.166.39]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Sep 14 09:24:31 our-server-hostname postfix/smtpd[21858]: disconnect from unknown[45.114.166.39]
Sep 14 09:28:34 our-server-hostname postfix/smtpd[26338]: connect from unknown[45.114.166.39]
Sep 14 09:28:34 our-server-hostname postfix/smtpd[26338]: NOQUEUE: reject: RCPT from unk........
-------------------------------
2019-09-14 16:19:33
45.114.166.87 attack
Aug 10 00:40:56 our-server-hostname postfix/smtpd[5188]: connect from unknown[45.114.166.87]
Aug x@x
Aug 10 00:40:57 our-server-hostname postfix/smtpd[5188]: lost connection after RCPT from unknown[45.114.166.87]
Aug 10 00:40:57 our-server-hostname postfix/smtpd[5188]: disconnect from unknown[45.114.166.87]
Aug 10 00:40:57 our-server-hostname postfix/smtpd[11511]: connect from unknown[45.114.166.87]
Aug x@x
.... truncated .... 
1811271045>
Aug 10 01:18:44 our-server-hostname postfix/smtpd[24533]: disconnect from unknown[45.114.166.87]
Aug 10 01:18:45 our-server-hostname postfix/smtpd[15698]: connect from unknown[45.114.166.87]
Aug 10 01:18:46 our-server-hostname postfix/smtpd[15698]: NOQUEUE: reject: RCPT from unknown[45.114.166.87]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Aug 10 01:18:46 our-server-hostname postfix/smtpd[15698]: disconnect from unknown[45.114.166.87]
Aug 10 01:19:36 our-server-hostname postfix........
-------------------------------
2019-08-10 02:30:52
45.114.166.116 attackbotsspam
Jul 17 09:06:16 our-server-hostname postfix/smtpd[17574]: connect from unknown[45.114.166.116]
Jul x@x
Jul 17 09:06:17 our-server-hostname postfix/smtpd[17574]: lost connection after RCPT from unknown[45.114.166.116]
Jul 17 09:06:17 our-server-hostname postfix/smtpd[17574]: disconnect from unknown[45.114.166.116]
Jul 17 09:09:53 our-server-hostname postfix/smtpd[23048]: connect from unknown[45.114.166.116]
Jul 17 09:09:54 our-server-hostname postfix/smtpd[23048]: NOQUEUE: reject: RCPT from unknown[45.114.166.116]: 450 4.1.8 : Sender address rejected: Domain not found; from=: x@x
Jul 17 17:15:35 our-server-hostname postfix/smtpd[541]: lost connection after RCPT from unknown[45.114.166.116]
Jul 17 17:15:35 our-server-hostname postfix/smtpd[541]: disconnect from unknown[45.114.166.116]
Jul 17 17:15:37 our-server-hostname postfix/smtpd[568]: connect from unknown[45.114.166.116]
Jul x@x
Jul 17 17:15:38 our-server-hostname postfix/smtpd[568]: l........
-------------------------------
2019-07-18 08:06:57
45.114.166.109 attack
Jun 30 12:07:58 our-server-hostname postfix/smtpd[17180]: connect from unknown[45.114.166.109]
Jun x@x
Jun 30 12:07:59 our-server-hostname postfix/smtpd[17180]: lost connection after RCPT from unknown[45.114.166.109]
Jun 30 12:07:59 our-server-hostname postfix/smtpd[17180]: disconnect from unknown[45.114.166.109]
Jun 30 12:08:07 our-server-hostname postfix/smtpd[19576]: connect from unknown[45.114.166.109]
Jun x@x
Jun 30 12:08:08 our-server-hostname postfix/smtpd[19576]: lost connection after RCPT from unknown[45.114.166.109]
Jun 30 12:08:08 our-server-hostname postfix/smtpd[19576]: disconnect from unknown[45.114.166.109]
Jun 30 12:10:05 our-server-hostname postfix/smtpd[19682]: connect from unknown[45.114.166.109]
Jun x@x
Jun 30 12:10:07 our-server-hostname postfix/smtpd[19682]: lost connection after RCPT from unknown[45.114.166.109]
Jun 30 12:10:07 our-server-hostname postfix/smtpd[19682]: disconnect from unknown[45.114.166.109]
Jun 30 12:10:44 our-server-hostname pos........
-------------------------------
2019-06-30 15:10:39
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.114.166.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.114.166.66.			IN	A

;; AUTHORITY SECTION:
.			107	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010600 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 21:16:48 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 66.166.114.45.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.166.114.45.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.63.253.200 attack
Bokep japan
2021-04-07 17:34:58
51.79.67.91 attack
Nous venons de détecter une attaque sur l'adresse IP 51.79.67.91.
2021-04-03 09:21:23
69.65.62.80 spamattack
69.65.62.80   123Greetings - specials@123g.biz - This Firefighter's Secret Relaxes Blood Pressure, Thu, 29 Apr 2021
Refer also to:
OrgName:        GigeNET
NetRange:       69.65.0.0 - 69.65.63.255
69.65.59.71   123 Greetings, 123g
69.65.62.93   123 Greetings, 123g
69.65.62.75   123Greetings - specials@123g.biz - This Firefighter's Secret Relaxes Blood Pressure, Wed, 21 Apr 2021
69.65.62.80   123Greetings - specials@123g.biz - Miracle Ingredients Reverse Type II Diabetes, Wed, 14 Apr 2021
69.65.62.87   123Greetings - specials@123g.biz - Deadly Brain Disease That Can Happen To Anyone, Tue, 20 Apr 2021 
69.65.62.112  123Greetings - specials@123g.biz - This Firefighter's Secret Relaxes Blood Pressure, Sat, 17 Apr 2021
NOTE Take care with cards from 123Greetings.com, it uses 69.65.62.0/25 as above
2021-04-29 10:27:54
202.79.36.155 attack
12 failed login attempts (3 lockout(s)) from IP 202.79.36.155 This notification was sent automatically via Limit Login Attempts Reloaded Plugin.
2021-03-31 16:10:28
183.63.253.200 proxy
183.63.253.200
2021-04-07 17:32:49
122.51.18.119 attack
,,,
2021-04-17 02:28:30
51.15.6.79 spamattack
220.158.199.233 Complimentary Gift - ComplimentaryGift@anklesnake.us -, ? a surprise gift for you!, Mon, 26 Apr 2021
netname:        STUB-220-158-196SLASH22
inetnum:        220.158.196.0 - 220.158.199.255
Refer Also to
220.158.199.225 Penis Elongation Ritual@speechgrow.us - PenisElongationRitual@speechgrow.us - White Wife Caught In African Elongation Ritual, Sat, 24 Apr 2021
2021-04-27 07:56:00
176.126.253.190 spam
176.126.253.190176.126.253.190176.126.253.190
2021-04-15 09:38:46
217.163.30.151 spambotsattackproxynormal
ME PUEDES AYUDAR ME
2021-04-05 18:50:30
51.137.50.20 spamattack
51.137.50.20 China Coin - contact@250-deutschinc.club - Make 5 times back in your investment in 3 months, Thu, 29 Apr 2021
Refer also to: 
Organization:   Microsoft Corporation (MSFT) 
NetRange:  	13.64.0.0 - 13.107.255.255
NetRange: 	20.33.0.0 - 20.128.255.255
NetRange: 	23.96.0.0 - 23.103.255.255
NetRange: 	40.64.0.0 - 40.71.255.255
NetRange: 	40.74.0.0 - 40.125.127.255
NetRange: 	51.136.0.0 - 51.138.255.255
NetRange:  	52.145.0.0 - 52.191.255.255
NetRange:  	104.40.0.0 - 104.47.255.255
NetRange:	137.135.0.0 - 137.135.255.255
NetRange:  	168.61.0.0 - 168.63.255.255
13.90.210.200 ABC Bitcoin - contact.83635@463-deutschfam.club-  Australians are making millions from Bitcoin Mon, 12 Apr 2021
13.90.253.238 ABC Bitcoin - contact.34744@902-deutschinc.club-  Australians are making millions from Bitcoin Sat, 10 Apr 2021
23.96.34.209 ABC Bitcoin - contact.92079@443-deutschco.club - Australians are making millions from Bitcoin Thu, 15 Apr 2021
51.137.49.210 ABC Bitcoin - contact@634-deutschlife.club - Australians are making millions from Bitcoin Thu, 15 Apr 2021
51.144.93.87  ABC Bitcoin - contact.30351@982-drdeutsch.club-  Australians are making millions from Bitcoin Tue, 13 Apr 2021 
52.169.239.253 ABC Bitcoin -contact.31665@517-drdeutsch.club- Australians are making millions from Bitcoin, Thu, 15 Apr 2021
168.61.86.18 ABC Bitcoin - contact.86289@551-deutschhomes.club - Australians are making millions from Bitcoin, Sun, 25 Apr 2021
52.170.62.233 Bitcoin Trader - contact.69238@853-deutschonline.club-  Trade on Bitcoins and make thousands in as little as 48 hours Sat, 10 Apr 2021
2021-04-29 10:18:43
174.254.193.147 spambotsattackproxy
Who is this
2021-04-25 05:34:21
114.122.106.53 proxy
This ia hacker account Facebook me
2021-04-17 22:41:59
185.63.153.200 spambotsattackproxynormal
2048
2021-04-03 03:49:19
102.52.153.39 spambotsattackproxynormal
102.52.153.39
2021-04-11 01:12:46
212.83.132.206 attack
Threat Management Alert 2: Attempted Information Leak. Signature ET SCAN MS Terminal Server Traffic on Non-standard Port. From: 212.83.132.206:60297, to: xxx.xxx.xxx.xxx:xxx, protocol: TCP
2021-04-19 18:29:24

最近上报的IP列表

53.65.208.146 108.179.253.239 4.167.171.171 249.197.242.53
165.141.202.89 51.22.215.170 143.154.98.49 129.232.159.67
17.23.234.179 162.252.222.128 22.173.16.161 36.125.238.202
10.216.164.163 217.58.229.111 254.110.58.234 170.104.187.141
55.50.57.204 191.141.123.105 181.149.137.35 85.222.11.82