必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.21.39.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.21.39.247.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 22:02:20 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 247.39.21.66.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 247.39.21.66.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.254.125.211 attackbots
Brute-force attempt banned
2020-06-07 02:21:27
27.155.88.103 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 39267 24393
2020-06-07 02:24:22
183.136.225.45 attackspambots
 TCP (SYN) 183.136.225.45:61831 -> port 9876, len 44
2020-06-07 02:03:58
185.39.11.47 attackbotsspam
Jun  6 19:47:59 debian-2gb-nbg1-2 kernel: \[13724426.946346\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.39.11.47 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=61528 PROTO=TCP SPT=52416 DPT=35091 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-07 02:40:10
117.141.112.155 attackspambots
scans 2 times in preceeding hours on the ports (in chronological order) 3622 22228
2020-06-07 02:13:39
185.39.11.57 attackspambots
Jun  6 21:31:22 debian kernel: [370841.940255] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=185.39.11.57 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=31762 PROTO=TCP SPT=52342 DPT=30048 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-07 02:39:45
51.159.88.2 attackspambots
scans 2161 times in preceeding hours on the ports (in chronological order) 41848 41849 41850 41851 41852 41853 41854 41855 41856 41857 41858 41859 41861 41862 41863 41864 41865 41866 41867 41868 41869 41870 41872 41873 41874 41875 41876 41877 41878 41879 41880 41881 41882 41885 41886 41887 41889 41890 41891 41892 41893 41894 41895 41896 41897 41898 41899 41900 41901 41902 41903 41905 41906 41907 41908 41909 41910 41911 41912 41913 41914 41915 41916 41917 41918 41919 41920 41923 41925 41926 41927 41928 41929 41930 41932 41933 41934 41935 41936 41939 41940 41942 41943 41944 41945 41946 41947 41948 41949 41950 41951 41952 41953 41954 41955 41956 41957 41958 41959 41961 41962 41963 41964 41966 41967 41968 41969 41970 41971 41972 41973 41974 41975 41977 41978 41980 41981 41983 41985 41986 41987 41988 41991 41992 41993 41994 41995 41996 41997 41998 41999 42001 42002 42003 42004 42005 42006 42009 42011 42012 42013 42014 42015 42016 42017 42018 42019 42020 42021 42022 42023 42024 42025 42026 42260 42261 42262 42264 4
2020-06-07 02:23:05
222.186.173.154 attackspam
Jun  6 20:07:42 santamaria sshd\[24058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Jun  6 20:07:44 santamaria sshd\[24058\]: Failed password for root from 222.186.173.154 port 3414 ssh2
Jun  6 20:07:54 santamaria sshd\[24058\]: Failed password for root from 222.186.173.154 port 3414 ssh2
...
2020-06-07 02:08:22
195.54.167.120 attackbotsspam
Jun  6 19:50:47 debian-2gb-nbg1-2 kernel: \[13724595.517385\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.120 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=11804 PROTO=TCP SPT=52384 DPT=1020 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-07 02:27:24
165.22.187.76 attackbots
06/06/2020-12:44:20.272935 165.22.187.76 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-07 02:04:58
185.176.27.42 attack
 TCP (SYN) 185.176.27.42:41797 -> port 40877, len 44
2020-06-07 02:34:44
119.90.126.87 attack
scans 2 times in preceeding hours on the ports (in chronological order) 1727 3141
2020-06-07 02:12:23
58.188.221.13 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 17621 17621
2020-06-07 02:22:49
96.127.158.235 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 1200 6443
2020-06-07 02:15:31
185.156.73.50 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 20389 20333 resulting in total of 10 scans from 185.156.72.0/22 block.
2020-06-07 02:38:14

最近上报的IP列表

209.253.112.183 54.159.31.222 131.48.164.167 230.70.34.81
5.235.128.243 35.140.251.246 225.52.2.134 180.19.122.91
42.15.136.9 188.205.110.213 188.251.143.238 103.233.183.96
85.100.210.252 253.137.137.151 87.85.109.124 125.215.253.216
99.197.148.192 166.185.164.217 119.42.237.187 207.20.98.251