必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Corporate Colocation Inc.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-25 11:34:32
attack
" "
2020-08-18 17:54:11
attack
Unauthorized connection attempt detected from IP address 66.117.12.196 to port 3728
2020-07-14 01:40:24
attack
Jul  6 23:03:15 debian-2gb-nbg1-2 kernel: \[16328002.085917\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=66.117.12.196 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=33053 PROTO=TCP SPT=50070 DPT=22195 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-07 05:15:23
attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 7132 7132
2020-07-06 23:31:05
attackspambots
Unauthorized connection attempt detected from IP address 66.117.12.196 to port 889
2020-06-24 23:47:55
attackspambots
Jun 19 22:39:05 debian-2gb-nbg1-2 kernel: \[14857832.725492\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=66.117.12.196 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=14988 PROTO=TCP SPT=56887 DPT=20285 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-20 05:44:08
attackbotsspam
*Port Scan* detected from 66.117.12.196 (US/United States/California/Los Angeles (Silver Lake)/-). 4 hits in the last 255 seconds
2020-06-14 13:10:36
attack
firewall-block, port(s): 8088/tcp
2020-05-31 22:59:20
attackspam
Multiport scan 47 ports : 395 2107 2186 2483 4012 4943 5047 6595 7261 7679 7998 8657 9035 10445 10519 11339 13291 13533 13667 13808 15248 15284 15647 15788 15995 16006 17328 17908 18494 20311 21519 22680 22706 23272 23875 23972 24982 25211 25394 26200 26482 27171 28141 28514 29865 29938 32354
2020-05-12 08:46:17
attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 16006 16006
2020-05-01 21:06:25
attack
04/26/2020-23:59:54.234228 66.117.12.196 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-27 12:15:20
attack
scans 2 times in preceeding hours on the ports (in chronological order) 29865 29865
2020-04-19 00:28:13
attackbots
15248/tcp 32354/tcp 2107/tcp...
[2020-04-04/12]28pkt,10pt.(tcp)
2020-04-13 05:19:41
attack
Mar 20 09:52:12 vpn sshd[29783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.117.12.196
Mar 20 09:52:15 vpn sshd[29783]: Failed password for invalid user www from 66.117.12.196 port 37980 ssh2
Mar 20 10:00:15 vpn sshd[29834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.117.12.196
2020-01-05 18:22:01
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.117.12.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36785
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.117.12.196.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061002 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 11 07:14:56 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 196.12.117.66.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 196.12.117.66.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
117.27.88.61 attackbotsspam
Invalid user gua from 117.27.88.61 port 2083
2020-05-23 00:24:40
94.230.208.147 attack
WordPress user registration, really-simple-captcha js check bypass
2020-05-23 00:24:53
118.25.1.48 attackbotsspam
2020-05-22T05:51:15.184825linuxbox-skyline sshd[66153]: Invalid user kqk from 118.25.1.48 port 47366
...
2020-05-23 00:50:05
157.230.239.99 attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-23 01:01:41
35.196.211.250 attackbots
35.196.211.250 - - [22/May/2020:17:31:19 +0200] "GET /wp-login.php HTTP/1.1" 200 6287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.196.211.250 - - [22/May/2020:17:31:22 +0200] "POST /wp-login.php HTTP/1.1" 200 6517 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.196.211.250 - - [22/May/2020:17:31:24 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-23 00:54:42
185.220.101.247 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-05-23 00:24:06
120.92.133.32 attackbotsspam
prod11
...
2020-05-23 01:07:15
195.80.151.30 attack
2020-05-22T16:25:54.527341homeassistant sshd[24923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.80.151.30  user=root
2020-05-22T16:25:56.210058homeassistant sshd[24923]: Failed password for root from 195.80.151.30 port 43203 ssh2
...
2020-05-23 01:06:05
62.102.148.69 attackspam
SSH invalid-user multiple login try
2020-05-23 00:26:23
110.35.173.103 attack
May 22 15:50:18 jane sshd[17797]: Failed password for root from 110.35.173.103 port 60040 ssh2
...
2020-05-23 01:02:16
197.214.64.230 attackbotsspam
May 22 12:03:41 onepixel sshd[870717]: Invalid user nly from 197.214.64.230 port 46098
May 22 12:03:41 onepixel sshd[870717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.214.64.230 
May 22 12:03:41 onepixel sshd[870717]: Invalid user nly from 197.214.64.230 port 46098
May 22 12:03:44 onepixel sshd[870717]: Failed password for invalid user nly from 197.214.64.230 port 46098 ssh2
May 22 12:07:51 onepixel sshd[871189]: Invalid user gwo from 197.214.64.230 port 46342
2020-05-23 00:53:38
37.49.226.202 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-23 00:50:40
51.77.201.36 attack
May 22 14:23:49 h2779839 sshd[6037]: Invalid user ddi from 51.77.201.36 port 32830
May 22 14:23:49 h2779839 sshd[6037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.201.36
May 22 14:23:49 h2779839 sshd[6037]: Invalid user ddi from 51.77.201.36 port 32830
May 22 14:23:51 h2779839 sshd[6037]: Failed password for invalid user ddi from 51.77.201.36 port 32830 ssh2
May 22 14:27:57 h2779839 sshd[6103]: Invalid user rbt from 51.77.201.36 port 38264
May 22 14:27:57 h2779839 sshd[6103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.201.36
May 22 14:27:57 h2779839 sshd[6103]: Invalid user rbt from 51.77.201.36 port 38264
May 22 14:27:59 h2779839 sshd[6103]: Failed password for invalid user rbt from 51.77.201.36 port 38264 ssh2
May 22 14:31:49 h2779839 sshd[6149]: Invalid user dpo from 51.77.201.36 port 43698
...
2020-05-23 00:59:37
159.65.136.141 attack
May 22 18:31:03 pornomens sshd\[20129\]: Invalid user ide from 159.65.136.141 port 59796
May 22 18:31:03 pornomens sshd\[20129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.136.141
May 22 18:31:06 pornomens sshd\[20129\]: Failed password for invalid user ide from 159.65.136.141 port 59796 ssh2
...
2020-05-23 00:35:07
106.124.137.108 attack
2020-05-22T13:55:58.766046centos sshd[22976]: Invalid user okj from 106.124.137.108 port 34702
2020-05-22T13:56:00.697240centos sshd[22976]: Failed password for invalid user okj from 106.124.137.108 port 34702 ssh2
2020-05-22T14:01:26.264661centos sshd[23350]: Invalid user xet from 106.124.137.108 port 36105
...
2020-05-23 00:20:23

最近上报的IP列表

36.7.140.77 183.89.40.196 58.227.101.102 27.13.42.139
81.22.45.49 89.207.66.150 21.134.15.161 54.39.98.253
50.95.194.76 204.247.45.126 117.193.7.210 62.98.44.121
81.12.241.26 103.137.138.2 240.217.80.171 78.57.143.102
161.174.110.78 216.83.53.207 110.202.198.70 93.190.24.117