必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.168.5.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41382
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.168.5.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 16:39:42 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
81.5.168.66.in-addr.arpa domain name pointer syn-066-168-005-081.res.spectrum.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.5.168.66.in-addr.arpa	name = syn-066-168-005-081.res.spectrum.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.49.38.7 attackbots
$f2bV_matches
2020-09-04 14:41:45
186.22.74.193 attack
Sep  3 18:48:08 mellenthin postfix/smtpd[19006]: NOQUEUE: reject: RCPT from unknown[186.22.74.193]: 554 5.7.1 Service unavailable; Client host [186.22.74.193] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/186.22.74.193; from= to= proto=ESMTP helo=
2020-09-04 14:43:29
106.54.20.184 attack
Sep  3 16:43:10 onepixel sshd[1500408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.20.184  user=root
Sep  3 16:43:12 onepixel sshd[1500408]: Failed password for root from 106.54.20.184 port 41586 ssh2
Sep  3 16:45:52 onepixel sshd[1500795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.20.184  user=root
Sep  3 16:45:54 onepixel sshd[1500795]: Failed password for root from 106.54.20.184 port 40458 ssh2
Sep  3 16:48:24 onepixel sshd[1501214]: Invalid user ftp from 106.54.20.184 port 39332
2020-09-04 14:34:19
190.181.86.212 attackspam
Sep  3 11:48:39 mailman postfix/smtpd[14029]: warning: unknown[190.181.86.212]: SASL PLAIN authentication failed: authentication failure
2020-09-04 14:18:12
218.92.0.172 attackspambots
Sep  4 02:23:06 NPSTNNYC01T sshd[15024]: Failed password for root from 218.92.0.172 port 28910 ssh2
Sep  4 02:23:09 NPSTNNYC01T sshd[15024]: Failed password for root from 218.92.0.172 port 28910 ssh2
Sep  4 02:23:12 NPSTNNYC01T sshd[15024]: Failed password for root from 218.92.0.172 port 28910 ssh2
Sep  4 02:23:15 NPSTNNYC01T sshd[15024]: Failed password for root from 218.92.0.172 port 28910 ssh2
...
2020-09-04 14:27:46
201.132.110.82 attackspambots
1599151726 - 09/03/2020 18:48:46 Host: 201.132.110.82/201.132.110.82 Port: 445 TCP Blocked
2020-09-04 14:10:48
176.250.96.111 attack
Lines containing failures of 176.250.96.111
/var/log/mail.err:Sep  2 10:12:18 server01 postfix/smtpd[18393]: warning: hostname b0fa606f.bb.sky.com does not resolve to address 176.250.96.111: Name or service not known
/var/log/apache/pucorp.org.log:Sep  2 10:12:18 server01 postfix/smtpd[18393]: warning: hostname b0fa606f.bb.sky.com does not resolve to address 176.250.96.111: Name or service not known
/var/log/apache/pucorp.org.log:Sep  2 10:12:18 server01 postfix/smtpd[18393]: connect from unknown[176.250.96.111]
/var/log/apache/pucorp.org.log:Sep x@x
/var/log/apache/pucorp.org.log:Sep x@x
/var/log/apache/pucorp.org.log:Sep  2 10:12:19 server01 postfix/policy-spf[18396]: : Policy action=PREPEND Received-SPF: none (wrhostnameeedge.com: No applicable sender policy available) receiver=x@x
/var/log/apache/pucorp.org.log:Sep x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=176.250.96.111
2020-09-04 14:09:28
45.142.120.179 attackspambots
2020-09-03T23:56:16.793329linuxbox-skyline auth[63661]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=gloria rhost=45.142.120.179
...
2020-09-04 14:07:06
115.73.247.7 attack
Automatic report - Port Scan Attack
2020-09-04 14:44:50
115.76.48.148 attackspam
Sep  3 18:48:34 mellenthin postfix/smtpd[20954]: NOQUEUE: reject: RCPT from unknown[115.76.48.148]: 554 5.7.1 Service unavailable; Client host [115.76.48.148] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/115.76.48.148; from= to= proto=ESMTP helo=
2020-09-04 14:23:12
106.13.18.86 attackspam
Sep  4 03:41:33 roki-contabo sshd\[2722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86  user=root
Sep  4 03:41:35 roki-contabo sshd\[2722\]: Failed password for root from 106.13.18.86 port 39604 ssh2
Sep  4 03:53:25 roki-contabo sshd\[2837\]: Invalid user www from 106.13.18.86
Sep  4 03:53:25 roki-contabo sshd\[2837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86
Sep  4 03:53:27 roki-contabo sshd\[2837\]: Failed password for invalid user www from 106.13.18.86 port 42920 ssh2
...
2020-09-04 14:16:08
185.220.102.253 attack
failed root login
2020-09-04 14:21:22
93.73.115.119 attack
Sep  3 18:48:52 mellenthin postfix/smtpd[20981]: NOQUEUE: reject: RCPT from kindness-elegance.volia.net[93.73.115.119]: 554 5.7.1 Service unavailable; Client host [93.73.115.119] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/93.73.115.119; from= to= proto=ESMTP helo=
2020-09-04 14:06:30
162.142.125.50 attack
Icarus honeypot on github
2020-09-04 14:37:25
54.37.68.66 attackbotsspam
(sshd) Failed SSH login from 54.37.68.66 (FR/France/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  4 02:06:51 server4 sshd[12281]: Invalid user mysql2 from 54.37.68.66
Sep  4 02:06:52 server4 sshd[12281]: Failed password for invalid user mysql2 from 54.37.68.66 port 43892 ssh2
Sep  4 02:14:27 server4 sshd[19432]: Invalid user sa from 54.37.68.66
Sep  4 02:14:29 server4 sshd[19432]: Failed password for invalid user sa from 54.37.68.66 port 50900 ssh2
Sep  4 02:17:32 server4 sshd[21888]: Invalid user phil from 54.37.68.66
2020-09-04 14:26:54

最近上报的IP列表

187.70.71.27 26.51.240.57 214.33.102.49 169.62.18.41
243.220.140.246 9.65.174.81 25.121.225.57 34.20.72.96
103.193.237.150 98.0.225.119 52.204.86.104 146.157.48.165
43.135.229.208 240.242.178.107 100.87.191.171 131.98.86.72
203.158.170.223 235.195.71.55 246.101.80.66 202.168.233.101