必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.180.21.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.180.21.162.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110102 1800 900 604800 86400

;; Query time: 543 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 05:44:06 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 162.21.180.66.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 162.21.180.66.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.231.115.87 attackspambots
Jul 23 14:33:04 *hidden* sshd[9436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.231.115.87 Jul 23 14:33:06 *hidden* sshd[9436]: Failed password for invalid user dmg from 201.231.115.87 port 24545 ssh2 Jul 23 14:39:19 *hidden* sshd[10397]: Invalid user georgia from 201.231.115.87 port 20929
2020-07-23 22:02:58
103.86.180.10 attackbots
Jul 23 15:19:35 h2779839 sshd[11849]: Invalid user ab from 103.86.180.10 port 43333
Jul 23 15:19:35 h2779839 sshd[11849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.86.180.10
Jul 23 15:19:35 h2779839 sshd[11849]: Invalid user ab from 103.86.180.10 port 43333
Jul 23 15:19:37 h2779839 sshd[11849]: Failed password for invalid user ab from 103.86.180.10 port 43333 ssh2
Jul 23 15:23:35 h2779839 sshd[11883]: Invalid user dba from 103.86.180.10 port 44427
Jul 23 15:23:35 h2779839 sshd[11883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.86.180.10
Jul 23 15:23:35 h2779839 sshd[11883]: Invalid user dba from 103.86.180.10 port 44427
Jul 23 15:23:36 h2779839 sshd[11883]: Failed password for invalid user dba from 103.86.180.10 port 44427 ssh2
Jul 23 15:27:23 h2779839 sshd[11924]: Invalid user csn from 103.86.180.10 port 45503
...
2020-07-23 21:59:01
111.161.41.156 attackspambots
Jul 23 14:10:56 sip sshd[22731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.41.156
Jul 23 14:10:58 sip sshd[22731]: Failed password for invalid user bx from 111.161.41.156 port 58410 ssh2
Jul 23 14:21:43 sip sshd[26795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.41.156
2020-07-23 22:18:58
178.62.5.39 attackspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-23 22:30:29
23.95.226.131 attackbotsspam
2020-07-23T17:28:34.770231mail.standpoint.com.ua sshd[15356]: Invalid user kai from 23.95.226.131 port 56044
2020-07-23T17:28:34.773182mail.standpoint.com.ua sshd[15356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.226.131
2020-07-23T17:28:34.770231mail.standpoint.com.ua sshd[15356]: Invalid user kai from 23.95.226.131 port 56044
2020-07-23T17:28:36.662283mail.standpoint.com.ua sshd[15356]: Failed password for invalid user kai from 23.95.226.131 port 56044 ssh2
2020-07-23T17:30:41.730886mail.standpoint.com.ua sshd[15732]: Invalid user elvis from 23.95.226.131 port 50976
...
2020-07-23 22:32:35
206.167.33.33 attackbots
Jul 23 10:04:06 firewall sshd[3851]: Invalid user monitor from 206.167.33.33
Jul 23 10:04:08 firewall sshd[3851]: Failed password for invalid user monitor from 206.167.33.33 port 56210 ssh2
Jul 23 10:08:03 firewall sshd[3961]: Invalid user lcz from 206.167.33.33
...
2020-07-23 21:56:51
220.184.176.167 attackbotsspam
[portscan] Port scan
2020-07-23 22:16:14
41.62.226.136 attackbotsspam
Email rejected due to spam filtering
2020-07-23 22:06:30
115.79.200.206 attack
Unauthorized connection attempt from IP address 115.79.200.206 on Port 445(SMB)
2020-07-23 22:18:30
62.219.164.172 attackbots
Unauthorized connection attempt detected
2020-07-23 22:08:16
211.248.231.125 attackbots
Email rejected due to spam filtering
2020-07-23 22:16:54
79.33.190.227 attackspam
Jul 23 14:02:22 ns382633 sshd\[6612\]: Invalid user pi from 79.33.190.227 port 39208
Jul 23 14:02:23 ns382633 sshd\[6612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.33.190.227
Jul 23 14:02:23 ns382633 sshd\[6614\]: Invalid user pi from 79.33.190.227 port 39212
Jul 23 14:02:23 ns382633 sshd\[6614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.33.190.227
Jul 23 14:02:24 ns382633 sshd\[6612\]: Failed password for invalid user pi from 79.33.190.227 port 39208 ssh2
Jul 23 14:02:24 ns382633 sshd\[6614\]: Failed password for invalid user pi from 79.33.190.227 port 39212 ssh2
2020-07-23 22:00:03
27.34.24.56 attack
Email rejected due to spam filtering
2020-07-23 22:11:16
177.18.132.32 attack
Jul 23 08:57:25 ws12vmsma01 sshd[36802]: Failed password for root from 177.18.132.32 port 50555 ssh2
Jul 23 09:01:05 ws12vmsma01 sshd[39575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.18.132.32  user=root
Jul 23 09:01:07 ws12vmsma01 sshd[39575]: Failed password for root from 177.18.132.32 port 51179 ssh2
...
2020-07-23 21:55:39
96.69.13.140 attack
2020-07-23T13:55:04.470307centos sshd[7340]: Invalid user redisserver from 96.69.13.140 port 41009
2020-07-23T13:55:05.660684centos sshd[7340]: Failed password for invalid user redisserver from 96.69.13.140 port 41009 ssh2
2020-07-23T14:01:52.615014centos sshd[7720]: Invalid user dmin from 96.69.13.140 port 35522
...
2020-07-23 22:34:56

最近上报的IP列表

18.30.206.161 243.240.222.101 246.75.86.179 34.83.179.226
8.156.159.23 218.35.210.113 140.131.191.225 2.74.20.125
31.23.34.251 221.198.182.131 50.240.237.134 88.30.80.161
163.39.41.195 13.254.249.79 219.69.4.201 130.221.229.53
59.167.145.229 139.123.6.196 224.31.8.246 203.213.54.66