必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Republic of China (ROC)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
49.213.164.114 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 20:06:36
49.213.164.70 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 20:03:49
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.213.164.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.213.164.66.			IN	A

;; AUTHORITY SECTION:
.			223	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:28:49 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
66.164.213.49.in-addr.arpa domain name pointer 66-164-213-49.tinp.net.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.164.213.49.in-addr.arpa	name = 66-164-213-49.tinp.net.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.76.27.71 attackbots
Icarus honeypot on github
2020-09-29 20:18:48
218.89.222.16 attack
Sep 28 19:03:45 mockhub sshd[138371]: Invalid user gpadmin from 218.89.222.16 port 5512
Sep 28 19:03:47 mockhub sshd[138371]: Failed password for invalid user gpadmin from 218.89.222.16 port 5512 ssh2
Sep 28 19:07:35 mockhub sshd[138475]: Invalid user ubuntu from 218.89.222.16 port 5528
...
2020-09-29 20:09:43
157.245.70.68 attack
2020-09-29T15:50:21.864738paragon sshd[506222]: Invalid user vnc from 157.245.70.68 port 34232
2020-09-29T15:50:21.868827paragon sshd[506222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.70.68
2020-09-29T15:50:21.864738paragon sshd[506222]: Invalid user vnc from 157.245.70.68 port 34232
2020-09-29T15:50:24.169390paragon sshd[506222]: Failed password for invalid user vnc from 157.245.70.68 port 34232 ssh2
2020-09-29T15:54:20.890891paragon sshd[506310]: Invalid user apache2 from 157.245.70.68 port 56946
...
2020-09-29 19:57:48
165.232.39.229 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-29 20:15:32
95.239.59.6 attackbots
Automatic report - Port Scan Attack
2020-09-29 20:00:19
106.54.65.144 attack
Invalid user dell from 106.54.65.144 port 33848
2020-09-29 19:53:36
207.180.231.146 attackbotsspam
Invalid user cpd from 207.180.231.146 port 34060
2020-09-29 20:07:44
219.136.249.151 attack
(sshd) Failed SSH login from 219.136.249.151 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 29 07:53:24 server sshd[19327]: Invalid user cc from 219.136.249.151 port 47651
Sep 29 07:53:26 server sshd[19327]: Failed password for invalid user cc from 219.136.249.151 port 47651 ssh2
Sep 29 08:04:12 server sshd[22776]: Invalid user ftpuser from 219.136.249.151 port 62821
Sep 29 08:04:14 server sshd[22776]: Failed password for invalid user ftpuser from 219.136.249.151 port 62821 ssh2
Sep 29 08:08:16 server sshd[24110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.136.249.151  user=nagios
2020-09-29 20:13:41
68.183.28.215 attackspam
Port scan denied
2020-09-29 19:53:53
124.238.113.126 attackspam
Invalid user csgoserver from 124.238.113.126 port 57026
2020-09-29 20:15:53
87.214.42.116 attackbotsspam
Wordpress_login_attempt
2020-09-29 19:47:30
189.52.77.150 attackspambots
Unauthorized connection attempt from IP address 189.52.77.150 on Port 445(SMB)
2020-09-29 19:48:22
222.190.145.130 attackspambots
Sep 29 13:45:16 mout sshd[26395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.145.130  user=root
Sep 29 13:45:18 mout sshd[26395]: Failed password for root from 222.190.145.130 port 56831 ssh2
2020-09-29 20:13:24
156.195.69.67 attackbots
20/9/28@16:41:08: FAIL: IoT-Telnet address from=156.195.69.67
...
2020-09-29 20:11:05
165.232.47.241 attack
20 attempts against mh-ssh on bolt
2020-09-29 20:14:30

最近上报的IP列表

49.217.135.170 49.228.104.215 49.228.114.173 49.228.108.111
49.216.81.11 49.228.225.224 49.228.164.20 49.228.137.24
49.228.228.251 49.228.226.23 49.228.240.10 49.228.233.52
49.228.231.0 49.228.240.175 49.228.241.243 49.228.240.44
49.228.107.205 49.228.246.151 49.228.51.211 49.228.49.174