必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.136.49.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55594
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.136.49.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 03:13:18 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 14.49.136.66.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.49.136.66.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.70.17 attackspam
SSH invalid-user multiple login try
2020-05-25 18:07:56
183.129.141.44 attack
May 25 07:31:27 ip-172-31-61-156 sshd[31793]: Invalid user tammy from 183.129.141.44
May 25 07:31:30 ip-172-31-61-156 sshd[31793]: Failed password for invalid user tammy from 183.129.141.44 port 41388 ssh2
May 25 07:31:27 ip-172-31-61-156 sshd[31793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.129.141.44
May 25 07:31:27 ip-172-31-61-156 sshd[31793]: Invalid user tammy from 183.129.141.44
May 25 07:31:30 ip-172-31-61-156 sshd[31793]: Failed password for invalid user tammy from 183.129.141.44 port 41388 ssh2
...
2020-05-25 18:04:13
106.37.72.234 attack
Failed password for invalid user torrent from 106.37.72.234 port 42342 ssh2
2020-05-25 18:41:04
1.1.195.137 attackbots
Brute forcing RDP port 3389
2020-05-25 18:20:29
37.49.226.217 attack
2020-05-25T12:14:11.517375struts4.enskede.local sshd\[23950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.217  user=root
2020-05-25T12:14:11.525533struts4.enskede.local sshd\[23951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.217  user=root
2020-05-25T12:14:11.529620struts4.enskede.local sshd\[23949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.217  user=root
2020-05-25T12:14:15.290467struts4.enskede.local sshd\[23950\]: Failed password for root from 37.49.226.217 port 40528 ssh2
2020-05-25T12:14:15.298216struts4.enskede.local sshd\[23951\]: Failed password for root from 37.49.226.217 port 40526 ssh2
...
2020-05-25 18:28:14
192.141.200.20 attackbots
May 25 11:21:01 ns382633 sshd\[20000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.141.200.20  user=root
May 25 11:21:02 ns382633 sshd\[20000\]: Failed password for root from 192.141.200.20 port 57520 ssh2
May 25 11:34:30 ns382633 sshd\[22372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.141.200.20  user=root
May 25 11:34:32 ns382633 sshd\[22372\]: Failed password for root from 192.141.200.20 port 50098 ssh2
May 25 11:38:45 ns382633 sshd\[23257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.141.200.20  user=root
2020-05-25 18:03:49
106.52.234.191 attack
May 25 05:48:40 cdc sshd[27499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.234.191  user=root
May 25 05:48:42 cdc sshd[27499]: Failed password for invalid user root from 106.52.234.191 port 60293 ssh2
2020-05-25 18:31:09
138.97.23.190 attackspambots
2020-05-25T04:32:51.2667751495-001 sshd[20947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dynamic-138-97-23-190.camontelecom.net.br  user=root
2020-05-25T04:32:53.1019671495-001 sshd[20947]: Failed password for root from 138.97.23.190 port 58700 ssh2
2020-05-25T04:35:49.5880561495-001 sshd[21095]: Invalid user sole from 138.97.23.190 port 41348
2020-05-25T04:35:49.5958391495-001 sshd[21095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dynamic-138-97-23-190.camontelecom.net.br
2020-05-25T04:35:49.5880561495-001 sshd[21095]: Invalid user sole from 138.97.23.190 port 41348
2020-05-25T04:35:51.8678151495-001 sshd[21095]: Failed password for invalid user sole from 138.97.23.190 port 41348 ssh2
...
2020-05-25 18:12:06
195.54.166.184 attackbotsspam
Port scan on 9 port(s): 14128 14411 14557 14596 14781 14784 14944 14957 14961
2020-05-25 18:25:42
103.243.252.244 attackspambots
Invalid user prueba from 103.243.252.244 port 54010
2020-05-25 18:21:35
114.46.58.185 attackbotsspam
Port probing on unauthorized port 23
2020-05-25 18:05:59
2.50.128.90 attackbotsspam
Unauthorised access (May 25) SRC=2.50.128.90 LEN=52 PREC=0x20 TTL=119 ID=22860 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-25 18:42:56
62.234.193.119 attackbots
2020-05-24 UTC: (40x) - admin,backup,dnjenga,joe,kid,oracle,pma,root(25x),server,sysadmin,test,trinity,user,weblogic,webserver,weihu
2020-05-25 18:39:28
193.190.205.210 attackspambots
May 25 11:12:44 vserver sshd\[19397\]: Invalid user mzj from 193.190.205.210May 25 11:12:46 vserver sshd\[19397\]: Failed password for invalid user mzj from 193.190.205.210 port 41830 ssh2May 25 11:16:05 vserver sshd\[19451\]: Failed password for root from 193.190.205.210 port 47624 ssh2May 25 11:19:27 vserver sshd\[19494\]: Failed password for root from 193.190.205.210 port 53406 ssh2
...
2020-05-25 18:37:28
168.196.165.26 attackbotsspam
2020-05-25T09:58:25.997309dmca.cloudsearch.cf sshd[6808]: Invalid user daniel from 168.196.165.26 port 36135
2020-05-25T09:58:26.003278dmca.cloudsearch.cf sshd[6808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.165.26
2020-05-25T09:58:25.997309dmca.cloudsearch.cf sshd[6808]: Invalid user daniel from 168.196.165.26 port 36135
2020-05-25T09:58:27.450387dmca.cloudsearch.cf sshd[6808]: Failed password for invalid user daniel from 168.196.165.26 port 36135 ssh2
2020-05-25T10:02:38.492646dmca.cloudsearch.cf sshd[7166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.165.26  user=root
2020-05-25T10:02:40.536708dmca.cloudsearch.cf sshd[7166]: Failed password for root from 168.196.165.26 port 38796 ssh2
2020-05-25T10:06:57.444000dmca.cloudsearch.cf sshd[7535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.196.165.26  user=root
2020-05-25T10:06:59.3776
...
2020-05-25 18:23:42

最近上报的IP列表

93.212.174.215 96.180.175.95 100.5.139.137 161.147.208.215
57.85.185.95 197.147.148.105 24.173.21.20 66.129.201.74
198.42.142.22 77.210.28.97 245.51.206.144 140.170.37.216
40.120.254.147 188.65.26.233 153.252.173.25 83.136.107.223
57.78.173.80 25.214.72.216 225.239.99.81 213.186.246.2