必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.20.133.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.20.133.139.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:10:48 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
139.133.20.66.in-addr.arpa domain name pointer host-66-20-133-139.aby.bellsouth.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.133.20.66.in-addr.arpa	name = host-66-20-133-139.aby.bellsouth.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.203.215.28 attack
11/05/2019-15:41:06.157859 193.203.215.28 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-05 23:38:05
186.92.155.242 attack
Automatic report - Port Scan
2019-11-05 23:55:05
14.18.93.114 attack
Nov  5 16:45:43 vmanager6029 sshd\[7811\]: Invalid user whocares from 14.18.93.114 port 32874
Nov  5 16:45:43 vmanager6029 sshd\[7811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.93.114
Nov  5 16:45:45 vmanager6029 sshd\[7811\]: Failed password for invalid user whocares from 14.18.93.114 port 32874 ssh2
2019-11-06 00:03:45
146.185.25.171 attackbots
DNS Enumeration
2019-11-05 23:55:35
45.55.88.94 attackspam
Nov  5 16:21:25 srv01 sshd[1381]: Invalid user test from 45.55.88.94
Nov  5 16:21:25 srv01 sshd[1381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=retailnes.com
Nov  5 16:21:25 srv01 sshd[1381]: Invalid user test from 45.55.88.94
Nov  5 16:21:27 srv01 sshd[1381]: Failed password for invalid user test from 45.55.88.94 port 50834 ssh2
Nov  5 16:26:52 srv01 sshd[1866]: Invalid user ibmadrc from 45.55.88.94
...
2019-11-05 23:37:40
222.143.242.66 attack
Nov  5 15:34:34 icinga sshd[32178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.143.242.66 
Nov  5 15:34:36 icinga sshd[32178]: Failed password for invalid user support from 222.143.242.66 port 41777 ssh2
Nov  5 15:43:23 icinga sshd[40109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.143.242.66 
...
2019-11-05 23:58:52
157.245.166.183 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-05 23:47:22
34.199.69.28 attackspam
www.lust-auf-land.com 34.199.69.28 \[05/Nov/2019:15:40:58 +0100\] "POST /wp-login.php HTTP/1.1" 200 5828 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
lust-auf-land.com 34.199.69.28 \[05/Nov/2019:15:40:58 +0100\] "POST /xmlrpc.php HTTP/1.1" 301 4139 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-05 23:44:00
91.121.103.175 attack
Nov  5 17:04:40 SilenceServices sshd[11946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.103.175
Nov  5 17:04:41 SilenceServices sshd[11946]: Failed password for invalid user dff from 91.121.103.175 port 40110 ssh2
Nov  5 17:08:33 SilenceServices sshd[14018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.103.175
2019-11-06 00:10:07
45.136.110.41 attackspambots
45.136.110.41 was recorded 7 times by 2 hosts attempting to connect to the following ports: 533,14148,10480,18185,9520,3140,9485. Incident counter (4h, 24h, all-time): 7, 50, 214
2019-11-05 23:37:16
81.22.45.159 attack
11/05/2019-09:40:57.922357 81.22.45.159 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-05 23:44:52
173.249.6.245 attackbotsspam
Masscan Port Scanning Tool PA
2019-11-06 00:01:35
139.59.34.17 attackbotsspam
SSH Bruteforce
2019-11-05 23:48:54
67.205.139.165 attackspambots
Nov  5 15:57:07 game-panel sshd[18881]: Failed password for root from 67.205.139.165 port 36436 ssh2
Nov  5 16:01:07 game-panel sshd[19007]: Failed password for root from 67.205.139.165 port 46446 ssh2
Nov  5 16:04:56 game-panel sshd[19093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.139.165
2019-11-06 00:12:15
165.227.97.108 attack
Nov  5 10:11:59 debian sshd\[2501\]: Invalid user jboss from 165.227.97.108 port 45996
Nov  5 10:11:59 debian sshd\[2501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.97.108
Nov  5 10:12:01 debian sshd\[2501\]: Failed password for invalid user jboss from 165.227.97.108 port 45996 ssh2
...
2019-11-06 00:16:16

最近上报的IP列表

200.145.192.55 239.88.232.254 180.113.219.96 76.128.168.49
252.205.104.235 94.24.66.250 4.230.54.196 204.161.174.227
167.111.198.233 41.90.125.219 101.152.254.137 147.6.227.254
45.143.65.181 170.206.235.98 61.49.51.214 212.34.98.102
135.234.157.251 218.54.24.55 251.204.217.168 137.185.114.237