必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): The Shadow Server Foundation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Commercial

用户上报:
类型 评论内容 时间
botsattackproxy
Redis bot
2024-04-23 21:05:33
attack
Attack RDP
2022-12-05 14:07:58
attack
2020-06-27T00:52:21.147Z CLOSE host=65.49.20.67 port=48234 fd=4 time=20.012 bytes=24
...
2020-09-01 19:59:51
attackspam
Port 22 Scan, PTR: None
2020-08-27 19:10:40
attack
Failed password for invalid user from 65.49.20.67 port 17186 ssh2
2020-08-13 08:22:30
attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-03 16:46:00
attackspam
Unauthorized connection attempt detected from IP address 65.49.20.67 to port 22
2020-07-30 12:39:53
attack
Unauthorized connection attempt detected from IP address 65.49.20.67 to port 22
2020-07-23 15:10:35
attack
Unauthorized connection attempt detected from IP address 65.49.20.67 to port 22
2020-07-16 13:44:38
attackbots
Unauthorized connection attempt detected from IP address 65.49.20.67 to port 22
2020-07-12 14:48:29
attackbots
Unauthorized connection attempt detected from IP address 65.49.20.67 to port 22
2020-07-09 12:32:50
attack
Unauthorized connection attempt detected from IP address 65.49.20.67 to port 22 [T]
2020-07-07 17:50:07
attackspambots
Unauthorized connection attempt detected from IP address 65.49.20.67 to port 22
2020-07-05 12:46:44
attack
SSH login attempts.
2020-06-09 15:23:47
attack
IP 65.49.20.67 attacked honeypot on port: 22 at 6/8/2020 4:47:52 AM
2020-06-08 17:51:41
attackspambots
Unauthorized connection attempt detected from IP address 65.49.20.67 to port 22
2020-05-22 15:01:06
attackbotsspam
Port scan(s) (1) denied
2020-05-14 18:06:20
attack
SSH brute-force attempt
2020-05-12 15:59:56
attack
Unauthorized connection attempt detected from IP address 65.49.20.67 to port 22
2020-05-07 18:26:33
attack
2020-05-02 UTC: (2x) - (2x)
2020-05-03 20:12:09
attack
SSH login attempts.
2020-03-28 03:45:25
attackspambots
2019-12-04T19:25:40.206Z CLOSE host=65.49.20.67 port=56616 fd=4 time=20.020 bytes=32
...
2020-03-13 02:15:10
attackspam
2019-12-04T19:25:40.206Z CLOSE host=65.49.20.67 port=56616 fd=4 time=20.020 bytes=32
...
2019-12-05 06:03:09
相同子网IP讨论:
IP 类型 评论内容 时间
65.49.20.78 botsattack
Compromised IP
2025-01-28 22:48:38
65.49.20.118 attackproxy
VPN fraud
2023-06-12 13:45:52
65.49.20.110 proxy
VPN fraud
2023-06-06 12:43:08
65.49.20.101 proxy
VPN fraud
2023-06-01 16:00:58
65.49.20.107 proxy
VPN fraud
2023-05-29 12:59:34
65.49.20.100 proxy
VPN fraud
2023-05-22 12:53:45
65.49.20.114 proxy
VPN fraud
2023-04-07 13:32:29
65.49.20.124 proxy
VPN fraud
2023-04-03 13:08:01
65.49.20.105 proxy
VPN fraud
2023-03-16 13:52:13
65.49.20.123 proxy
VPN fraud
2023-03-09 14:09:02
65.49.20.90 proxy
VPN scan
2023-02-20 14:00:04
65.49.20.119 proxy
VPN fraud
2023-02-14 20:08:26
65.49.20.106 proxy
Brute force VPN
2023-02-08 14:01:13
65.49.20.77 proxy
VPN
2023-02-06 13:57:51
65.49.20.81 proxy
VPN
2022-12-27 13:51:59
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.49.20.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56415
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;65.49.20.67.			IN	A

;; AUTHORITY SECTION:
.			150	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 06:03:07 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
Host 67.20.49.65.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.20.49.65.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.163.132.222 attackspam
unauthorized connection attempt
2020-01-17 21:01:45
80.147.49.244 attack
Jan 17 14:04:54  sshd\[30263\]: Invalid user user from 80.147.49.244Jan 17 14:04:56  sshd\[30263\]: Failed password for invalid user user from 80.147.49.244 port 59898 ssh2
...
2020-01-17 21:20:54
200.94.197.105 attackspam
unauthorized connection attempt
2020-01-17 20:55:22
178.148.107.233 attack
LGS,WP GET /wp-login.php
2020-01-17 21:15:45
5.182.210.244 attackbotsspam
unauthorized connection attempt
2020-01-17 21:04:44
114.112.104.187 attackspam
Unauthorized connection attempt detected from IP address 114.112.104.187 to port 1433 [J]
2020-01-17 20:49:16
218.92.0.148 attack
Blocked by jail recidive
2020-01-17 21:21:26
122.117.42.216 attack
Unauthorized connection attempt detected from IP address 122.117.42.216 to port 4567 [J]
2020-01-17 20:48:38
93.146.232.194 attackbots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-17 21:09:15
181.174.102.66 attackbotsspam
unauthorized connection attempt
2020-01-17 21:07:16
115.55.41.169 attackspam
unauthorized connection attempt
2020-01-17 20:59:11
180.215.225.2 attackbots
Unauthorized connection attempt detected from IP address 180.215.225.2 to port 1433 [J]
2020-01-17 20:47:20
189.252.198.122 attackspam
unauthorized connection attempt
2020-01-17 21:05:31
144.91.119.49 attackspam
Jan 17 13:36:52 nxxxxxxx sshd[27439]: refused connect from 144.91.119.49 (14=
4.91.119.49)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=144.91.119.49
2020-01-17 21:23:36
54.36.134.249 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-17 21:14:59

最近上报的IP列表

200.47.247.226 125.139.173.117 123.154.154.219 181.94.195.214
79.37.122.6 14.57.136.153 2.139.81.18 99.106.125.137
213.191.110.203 104.223.152.173 187.152.69.140 39.122.13.64
103.156.40.78 122.224.215.102 224.29.85.164 47.34.238.92
66.34.181.139 85.117.161.152 62.131.136.187 83.170.0.129