必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Saudi Arabia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.109.66.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49458
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.109.66.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 00:57:08 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 22.66.109.5.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.66.109.5.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.254.0.182 attackspam
Oct 12 08:25:34 OPSO sshd\[25167\]: Invalid user 123Doll from 188.254.0.182 port 49530
Oct 12 08:25:34 OPSO sshd\[25167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182
Oct 12 08:25:36 OPSO sshd\[25167\]: Failed password for invalid user 123Doll from 188.254.0.182 port 49530 ssh2
Oct 12 08:29:59 OPSO sshd\[25805\]: Invalid user 123Windows from 188.254.0.182 port 59656
Oct 12 08:29:59 OPSO sshd\[25805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182
2019-10-12 19:52:06
140.143.69.34 attackspam
Oct 12 10:19:16 [host] sshd[10267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.69.34  user=root
Oct 12 10:19:17 [host] sshd[10267]: Failed password for root from 140.143.69.34 port 51459 ssh2
Oct 12 10:23:55 [host] sshd[10303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.69.34  user=root
2019-10-12 20:01:51
115.238.236.74 attackbotsspam
Oct 12 14:04:38 nextcloud sshd\[29885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74  user=root
Oct 12 14:04:40 nextcloud sshd\[29885\]: Failed password for root from 115.238.236.74 port 61075 ssh2
Oct 12 14:09:32 nextcloud sshd\[5217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74  user=root
...
2019-10-12 20:11:31
211.159.152.252 attackspam
Invalid user administrator from 211.159.152.252 port 27196
2019-10-12 20:01:24
61.150.113.27 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-12 19:53:56
41.87.80.26 attackbotsspam
Oct 12 07:02:04 *** sshd[27453]: User root from 41.87.80.26 not allowed because not listed in AllowUsers
2019-10-12 19:37:37
193.70.37.140 attack
Oct 12 01:38:02 eddieflores sshd\[30783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.ip-193-70-37.eu  user=root
Oct 12 01:38:04 eddieflores sshd\[30783\]: Failed password for root from 193.70.37.140 port 43732 ssh2
Oct 12 01:41:55 eddieflores sshd\[31172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.ip-193-70-37.eu  user=root
Oct 12 01:41:57 eddieflores sshd\[31172\]: Failed password for root from 193.70.37.140 port 54784 ssh2
Oct 12 01:45:46 eddieflores sshd\[31475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.ip-193-70-37.eu  user=root
2019-10-12 19:54:26
45.82.153.35 attackbotsspam
10/12/2019-13:26:02.453707 45.82.153.35 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 44
2019-10-12 19:35:54
165.227.47.36 attack
Oct 12 03:16:07 TORMINT sshd\[20889\]: Invalid user Qwerty_123 from 165.227.47.36
Oct 12 03:16:07 TORMINT sshd\[20889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.47.36
Oct 12 03:16:09 TORMINT sshd\[20889\]: Failed password for invalid user Qwerty_123 from 165.227.47.36 port 40786 ssh2
...
2019-10-12 20:05:23
194.36.101.234 attackspam
Unauthorised access (Oct 12) SRC=194.36.101.234 LEN=40 TOS=0x08 PREC=0x20 TTL=235 ID=34181 TCP DPT=1433 WINDOW=1024 SYN
2019-10-12 19:43:02
122.154.46.4 attackbotsspam
Oct 12 11:49:52 localhost sshd\[100356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.46.4  user=root
Oct 12 11:49:54 localhost sshd\[100356\]: Failed password for root from 122.154.46.4 port 35174 ssh2
Oct 12 11:54:04 localhost sshd\[100531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.46.4  user=root
Oct 12 11:54:05 localhost sshd\[100531\]: Failed password for root from 122.154.46.4 port 44862 ssh2
Oct 12 11:58:20 localhost sshd\[100722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.46.4  user=root
...
2019-10-12 20:07:33
221.143.48.143 attack
Oct 12 07:51:21 OPSO sshd\[18628\]: Invalid user Pedro_123 from 221.143.48.143 port 22214
Oct 12 07:51:21 OPSO sshd\[18628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143
Oct 12 07:51:23 OPSO sshd\[18628\]: Failed password for invalid user Pedro_123 from 221.143.48.143 port 22214 ssh2
Oct 12 07:55:35 OPSO sshd\[19466\]: Invalid user P@ss@2019 from 221.143.48.143 port 61212
Oct 12 07:55:35 OPSO sshd\[19466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143
2019-10-12 19:37:25
106.75.156.175 attack
*Port Scan* detected from 106.75.156.175 (CN/China/-). 4 hits in the last 10 seconds
2019-10-12 19:59:22
58.87.114.103 attack
Oct  7 09:21:42 mailserver sshd[9487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.103  user=r.r
Oct  7 09:21:44 mailserver sshd[9487]: Failed password for r.r from 58.87.114.103 port 53130 ssh2
Oct  7 09:21:45 mailserver sshd[9487]: Received disconnect from 58.87.114.103 port 53130:11: Bye Bye [preauth]
Oct  7 09:21:45 mailserver sshd[9487]: Disconnected from 58.87.114.103 port 53130 [preauth]
Oct  7 09:41:05 mailserver sshd[11697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.103  user=r.r
Oct  7 09:41:07 mailserver sshd[11697]: Failed password for r.r from 58.87.114.103 port 37194 ssh2
Oct  7 09:41:07 mailserver sshd[11697]: Received disconnect from 58.87.114.103 port 37194:11: Bye Bye [preauth]
Oct  7 09:41:07 mailserver sshd[11697]: Disconnected from 58.87.114.103 port 37194 [preauth]
Oct  7 09:45:43 mailserver sshd[12198]: pam_unix(sshd:auth): authentication ........
-------------------------------
2019-10-12 19:54:52
188.11.67.165 attackspam
Oct 12 11:05:10 OPSO sshd\[22514\]: Invalid user Resultat@123 from 188.11.67.165 port 44598
Oct 12 11:05:10 OPSO sshd\[22514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.11.67.165
Oct 12 11:05:12 OPSO sshd\[22514\]: Failed password for invalid user Resultat@123 from 188.11.67.165 port 44598 ssh2
Oct 12 11:11:58 OPSO sshd\[23422\]: Invalid user Testing@2020 from 188.11.67.165 port 60494
Oct 12 11:11:58 OPSO sshd\[23422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.11.67.165
2019-10-12 20:07:10

最近上报的IP列表

76.79.159.208 243.201.131.9 248.1.251.76 101.200.41.103
88.103.56.139 74.109.229.163 3.0.44.241 162.76.28.47
43.200.123.160 15.84.163.41 138.170.77.91 150.115.174.6
130.245.173.56 143.184.203.32 246.140.221.180 180.115.142.109
69.213.147.157 67.205.214.151 230.14.77.182 27.7.229.58