必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.107.174.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.107.174.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 21:18:23 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
42.174.107.66.in-addr.arpa domain name pointer ip66-107-174-42.z174-107-66.customer.algx.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.174.107.66.in-addr.arpa	name = ip66-107-174-42.z174-107-66.customer.algx.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.108.67.95 attackspam
4100/tcp 9093/tcp 8180/tcp...
[2019-08-25/10-25]113pkt,109pt.(tcp)
2019-10-26 07:15:55
185.156.73.11 attackspam
41884/tcp 41886/tcp 41885/tcp...
[2019-10-17/25]763pkt,213pt.(tcp)
2019-10-26 07:46:40
79.143.28.113 attackbotsspam
51868/tcp 31789/tcp 29683/tcp...
[2019-09-30/10-25]8pkt,8pt.(tcp)
2019-10-26 07:34:13
112.175.120.210 attackspambots
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-26 07:25:13
198.108.67.35 attack
ET DROP Dshield Block Listed Source group 1 - port: 8042 proto: TCP cat: Misc Attack
2019-10-26 07:16:21
185.156.73.42 attackspam
Automatic report - Port Scan
2019-10-26 07:44:04
3.112.196.196 attackspambots
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-26 07:14:47
185.176.27.98 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 2482 proto: TCP cat: Misc Attack
2019-10-26 07:18:47
198.108.67.60 attack
Port scan: Attack repeated for 24 hours
2019-10-26 07:16:08
185.156.73.21 attackbots
9239/tcp 19360/tcp 19361/tcp...
[2019-10-17/25]755pkt,211pt.(tcp)
2019-10-26 07:46:26
92.63.194.148 attackbotsspam
10/26/2019-01:14:24.913617 92.63.194.148 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-26 07:29:10
185.175.93.18 attackspam
firewall-block, port(s): 5673/tcp, 7803/tcp, 22012/tcp, 50935/tcp, 53504/tcp, 54199/tcp, 56127/tcp, 59368/tcp, 61820/tcp
2019-10-26 07:43:08
71.6.232.5 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 64 - port: 20005 proto: TCP cat: Misc Attack
2019-10-26 07:35:05
175.6.1.218 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-26 07:48:26
112.175.120.177 attackspambots
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-26 07:25:41

最近上报的IP列表

153.148.202.164 93.65.202.148 174.11.187.189 28.24.200.78
20.87.152.24 98.15.222.197 23.138.207.158 149.195.209.109
245.114.116.89 197.110.72.219 222.23.160.70 186.244.251.71
139.219.246.222 176.51.48.46 61.180.198.127 122.26.144.213
174.144.49.83 185.12.190.155 232.242.170.206 169.37.99.11