必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Verizon

主机名(hostname): unknown

机构(organization): MCI Communications Services, Inc. d/b/a Verizon Business

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.104.22.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47147
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.104.22.8.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 01 23:48:53 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
8.22.104.66.in-addr.arpa domain name pointer ip66-104-22-8.z22-104-66.customer.algx.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
8.22.104.66.in-addr.arpa	name = ip66-104-22-8.z22-104-66.customer.algx.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.221.104.222 attackspambots
20/8/14@23:49:09: FAIL: Alarm-Intrusion address from=77.221.104.222
20/8/14@23:49:09: FAIL: Alarm-Intrusion address from=77.221.104.222
...
2020-08-15 19:19:15
183.166.162.139 attackspambots
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2020-08-15 19:24:03
171.246.96.155 attackspam
Automatic report - Port Scan Attack
2020-08-15 19:49:36
116.85.66.200 attackbots
Aug 15 06:33:35 serwer sshd\[17477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.66.200  user=root
Aug 15 06:33:37 serwer sshd\[17477\]: Failed password for root from 116.85.66.200 port 32918 ssh2
Aug 15 06:39:09 serwer sshd\[21464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.66.200  user=root
...
2020-08-15 19:49:55
45.145.67.28 attackbotsspam
ZTE Router Exploit Scanner
2020-08-15 19:44:58
128.199.84.201 attack
Aug 15 01:05:44 php1 sshd\[21140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.84.201  user=root
Aug 15 01:05:47 php1 sshd\[21140\]: Failed password for root from 128.199.84.201 port 55596 ssh2
Aug 15 01:07:51 php1 sshd\[21290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.84.201  user=root
Aug 15 01:07:53 php1 sshd\[21290\]: Failed password for root from 128.199.84.201 port 56356 ssh2
Aug 15 01:10:00 php1 sshd\[21630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.84.201  user=root
2020-08-15 19:27:36
103.146.202.160 attackbotsspam
frenzy
2020-08-15 19:46:05
62.234.68.31 attack
Lines containing failures of 62.234.68.31
Aug 12 05:14:06 shared02 sshd[2635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.31  user=r.r
Aug 12 05:14:09 shared02 sshd[2635]: Failed password for r.r from 62.234.68.31 port 52492 ssh2
Aug 12 05:14:09 shared02 sshd[2635]: Received disconnect from 62.234.68.31 port 52492:11: Bye Bye [preauth]
Aug 12 05:14:09 shared02 sshd[2635]: Disconnected from authenticating user r.r 62.234.68.31 port 52492 [preauth]
Aug 12 05:25:01 shared02 sshd[6122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.31  user=r.r
Aug 12 05:25:03 shared02 sshd[6122]: Failed password for r.r from 62.234.68.31 port 39424 ssh2
Aug 12 05:25:04 shared02 sshd[6122]: Received disconnect from 62.234.68.31 port 39424:11: Bye Bye [preauth]
Aug 12 05:25:04 shared02 sshd[6122]: Disconnected from authenticating user r.r 62.234.68.31 port 39424 [preauth]
Aug 12 05:29:16........
------------------------------
2020-08-15 19:36:28
190.115.154.32 attack
SMB Server BruteForce Attack
2020-08-15 19:30:01
167.99.77.111 attack
TCP port : 5252
2020-08-15 19:54:33
51.38.118.26 attackspambots
Aug 15 11:19:20 game-panel sshd[32133]: Failed password for root from 51.38.118.26 port 34230 ssh2
Aug 15 11:22:54 game-panel sshd[32300]: Failed password for root from 51.38.118.26 port 38333 ssh2
2020-08-15 19:27:02
164.132.250.128 attackbots
Jul 20 23:01:00 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]
Jul 20 23:01:04 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]
Jul 20 23:01:07 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]
Jul 20 23:01:11 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]
Jul 21 08:26:43 localhost postfix/smtpd[1840999]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=164.132.250.128
2020-08-15 19:45:18
222.186.180.8 attack
2020-08-15T11:12:45.460313abusebot-8.cloudsearch.cf sshd[19080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
2020-08-15T11:12:47.366696abusebot-8.cloudsearch.cf sshd[19080]: Failed password for root from 222.186.180.8 port 54212 ssh2
2020-08-15T11:12:50.953995abusebot-8.cloudsearch.cf sshd[19080]: Failed password for root from 222.186.180.8 port 54212 ssh2
2020-08-15T11:12:45.460313abusebot-8.cloudsearch.cf sshd[19080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
2020-08-15T11:12:47.366696abusebot-8.cloudsearch.cf sshd[19080]: Failed password for root from 222.186.180.8 port 54212 ssh2
2020-08-15T11:12:50.953995abusebot-8.cloudsearch.cf sshd[19080]: Failed password for root from 222.186.180.8 port 54212 ssh2
2020-08-15T11:12:45.460313abusebot-8.cloudsearch.cf sshd[19080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
...
2020-08-15 19:22:14
170.210.214.50 attackspam
Aug 15 15:12:31 lunarastro sshd[20638]: Failed password for root from 170.210.214.50 port 38706 ssh2
Aug 15 15:16:11 lunarastro sshd[20696]: Failed password for root from 170.210.214.50 port 55734 ssh2
2020-08-15 19:34:11
83.13.19.85 attack
<6 unauthorized SSH connections
2020-08-15 19:34:39

最近上报的IP列表

103.81.63.18 117.60.137.51 199.88.141.197 168.228.150.68
72.254.213.64 206.33.168.230 191.90.7.41 69.44.177.34
142.39.138.158 123.232.124.106 37.96.59.156 185.228.229.217
165.244.197.47 220.174.20.120 41.8.48.91 34.71.50.4
168.232.131.80 178.132.220.199 62.236.246.40 197.231.203.33