必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.149.40.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30251
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.149.40.204.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:07:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
204.40.149.66.in-addr.arpa domain name pointer user-119aa6c.biz.mindspring.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.40.149.66.in-addr.arpa	name = user-119aa6c.biz.mindspring.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.71.145.189 attack
Invalid user ts from 120.71.145.189 port 42187
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.189
Failed password for invalid user ts from 120.71.145.189 port 42187 ssh2
Invalid user ezakizaurus from 120.71.145.189 port 39216
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.189
2019-12-11 22:57:53
185.156.73.64 attack
12/11/2019-10:22:08.517321 185.156.73.64 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-11 23:24:18
115.231.107.247 attackbots
12/11/2019-16:11:19.558858 115.231.107.247 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-11 23:20:25
124.16.139.243 attackspam
Invalid user wwwadmin from 124.16.139.243 port 39642
2019-12-11 22:44:29
202.67.15.106 attack
Dec 11 10:04:48 linuxvps sshd\[2683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.67.15.106  user=root
Dec 11 10:04:50 linuxvps sshd\[2683\]: Failed password for root from 202.67.15.106 port 49438 ssh2
Dec 11 10:11:07 linuxvps sshd\[6677\]: Invalid user berger from 202.67.15.106
Dec 11 10:11:07 linuxvps sshd\[6677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.67.15.106
Dec 11 10:11:09 linuxvps sshd\[6677\]: Failed password for invalid user berger from 202.67.15.106 port 55916 ssh2
2019-12-11 23:30:04
117.119.86.144 attackbots
Dec 11 14:57:22 cp sshd[30563]: Failed password for root from 117.119.86.144 port 48134 ssh2
Dec 11 14:57:22 cp sshd[30563]: Failed password for root from 117.119.86.144 port 48134 ssh2
2019-12-11 23:08:27
177.107.201.90 attackbots
1576077073 - 12/11/2019 16:11:13 Host: 177.107.201.90/177.107.201.90 Port: 445 TCP Blocked
2019-12-11 23:26:55
118.163.178.146 attack
Dec 11 16:11:15 vmd17057 sshd\[4206\]: Invalid user zimbra from 118.163.178.146 port 35907
Dec 11 16:11:15 vmd17057 sshd\[4206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.178.146
Dec 11 16:11:17 vmd17057 sshd\[4206\]: Failed password for invalid user zimbra from 118.163.178.146 port 35907 ssh2
...
2019-12-11 23:20:03
49.88.112.115 attackbotsspam
Dec 11 15:50:05 localhost sshd\[7349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Dec 11 15:50:07 localhost sshd\[7349\]: Failed password for root from 49.88.112.115 port 17679 ssh2
Dec 11 15:50:09 localhost sshd\[7349\]: Failed password for root from 49.88.112.115 port 17679 ssh2
2019-12-11 22:50:21
122.173.123.93 attack
Honeypot attack, port: 23, PTR: abts-north-dynamic-093.123.173.122.airtelbroadband.in.
2019-12-11 23:10:46
187.75.145.66 attackbots
Dec 11 15:08:41 web8 sshd\[2089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.75.145.66  user=root
Dec 11 15:08:43 web8 sshd\[2089\]: Failed password for root from 187.75.145.66 port 58449 ssh2
Dec 11 15:15:40 web8 sshd\[5576\]: Invalid user admin from 187.75.145.66
Dec 11 15:15:40 web8 sshd\[5576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.75.145.66
Dec 11 15:15:42 web8 sshd\[5576\]: Failed password for invalid user admin from 187.75.145.66 port 60021 ssh2
2019-12-11 23:21:07
183.166.137.188 attack
2019-12-11 00:23:32 H=(ylmf-pc) [183.166.137.188]:51945 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
2019-12-11 00:23:35 H=(ylmf-pc) [183.166.137.188]:57546 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
2019-12-11 00:23:36 H=(ylmf-pc) [183.166.137.188]:61203 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc
...
2019-12-11 23:11:09
123.233.210.217 attack
Scanning
2019-12-11 22:52:46
120.88.185.39 attack
Dec 11 09:29:21 icinga sshd[2313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.88.185.39
Dec 11 09:29:23 icinga sshd[2313]: Failed password for invalid user Heidelberg from 120.88.185.39 port 44758 ssh2
...
2019-12-11 23:07:50
129.211.77.44 attackbots
Dec 11 10:26:14 TORMINT sshd\[1931\]: Invalid user casella from 129.211.77.44
Dec 11 10:26:14 TORMINT sshd\[1931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.77.44
Dec 11 10:26:16 TORMINT sshd\[1931\]: Failed password for invalid user casella from 129.211.77.44 port 54506 ssh2
...
2019-12-11 23:27:18

最近上报的IP列表

18.132.7.218 136.69.113.195 114.178.14.82 213.192.172.171
150.46.41.5 122.213.153.215 103.22.212.151 39.23.201.125
204.19.59.152 219.50.248.242 148.14.113.52 123.165.160.196
209.83.236.193 136.189.207.194 252.125.239.56 42.1.247.231
228.176.145.137 167.137.191.75 108.225.136.155 137.109.113.96