必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.214.103.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.214.103.159.			IN	A

;; AUTHORITY SECTION:
.			169	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 09:07:53 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
159.103.214.66.in-addr.arpa domain name pointer 066-214-103-159.biz.spectrum.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.103.214.66.in-addr.arpa	name = 066-214-103-159.biz.spectrum.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.211.245.181 attackbots
Sep  9 04:49:06 master sshd[30841]: Failed password for root from 58.211.245.181 port 33605 ssh2
2020-09-10 02:10:09
159.203.44.177 attackbotsspam
21 attempts against mh-misbehave-ban on fire
2020-09-10 02:39:02
62.99.90.10 attack
k+ssh-bruteforce
2020-09-10 02:02:27
58.87.119.237 attackbotsspam
Lines containing failures of 58.87.119.237
Sep  7 01:22:57 MAKserver06 sshd[15491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.119.237  user=r.r
Sep  7 01:22:59 MAKserver06 sshd[15491]: Failed password for r.r from 58.87.119.237 port 48338 ssh2
Sep  7 01:23:01 MAKserver06 sshd[15491]: Received disconnect from 58.87.119.237 port 48338:11: Bye Bye [preauth]
Sep  7 01:23:01 MAKserver06 sshd[15491]: Disconnected from authenticating user r.r 58.87.119.237 port 48338 [preauth]
Sep  7 01:35:24 MAKserver06 sshd[17282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.119.237  user=r.r
Sep  7 01:35:25 MAKserver06 sshd[17282]: Failed password for r.r from 58.87.119.237 port 39516 ssh2
Sep  7 01:35:26 MAKserver06 sshd[17282]: Received disconnect from 58.87.119.237 port 39516:11: Bye Bye [preauth]
Sep  7 01:35:26 MAKserver06 sshd[17282]: Disconnected from authenticating user r.r 58.87.119........
------------------------------
2020-09-10 02:04:46
218.92.0.247 attack
Sep  9 20:05:27 cp sshd[3132]: Failed password for root from 218.92.0.247 port 8112 ssh2
Sep  9 20:05:27 cp sshd[3132]: Failed password for root from 218.92.0.247 port 8112 ssh2
2020-09-10 02:13:50
144.217.60.239 attackbotsspam
Time:     Wed Sep  9 18:16:02 2020 +0000
IP:       144.217.60.239 (CA/Canada/ip239.ip-144-217-60.net)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  9 18:15:49 ca-29-ams1 sshd[14220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.60.239  user=root
Sep  9 18:15:51 ca-29-ams1 sshd[14220]: Failed password for root from 144.217.60.239 port 48048 ssh2
Sep  9 18:15:54 ca-29-ams1 sshd[14220]: Failed password for root from 144.217.60.239 port 48048 ssh2
Sep  9 18:15:58 ca-29-ams1 sshd[14220]: Failed password for root from 144.217.60.239 port 48048 ssh2
Sep  9 18:16:01 ca-29-ams1 sshd[14220]: Failed password for root from 144.217.60.239 port 48048 ssh2
2020-09-10 02:31:25
95.141.25.193 attackspam
2020-09-08 11:46:01.771238-0500  localhost smtpd[80895]: NOQUEUE: reject: RCPT from unknown[95.141.25.193]: 450 4.7.25 Client host rejected: cannot find your hostname, [95.141.25.193]; from= to= proto=ESMTP helo=
2020-09-10 02:15:39
46.163.211.128 attack
Port Scan: TCP/443
2020-09-10 02:32:20
51.11.240.184 attack
[H1.VM2] Blocked by UFW
2020-09-10 02:33:40
122.155.17.174 attackspam
Sep  9 20:11:28 santamaria sshd\[19375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.17.174  user=root
Sep  9 20:11:30 santamaria sshd\[19375\]: Failed password for root from 122.155.17.174 port 25637 ssh2
Sep  9 20:18:22 santamaria sshd\[19526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.17.174  user=root
...
2020-09-10 02:19:39
129.145.2.238 attackspam
srvr2: (mod_security) mod_security (id:920350) triggered by 129.145.2.238 (US/-/oc-129-145-2-238.compute.oraclecloud.com): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/09 09:11:08 [error] 862802#0: *405716 [client 129.145.2.238] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host'  [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "15996354686.524278"] [ref "o0,17v21,17"], client: 129.145.2.238, [redacted] request: "GET / HTTP/1.1" [redacted]
2020-09-10 02:21:06
152.32.164.141 attackspambots
2020-09-09T09:17:56.848447upcloud.m0sh1x2.com sshd[9070]: Invalid user auy from 152.32.164.141 port 55566
2020-09-10 02:08:50
187.58.162.10 attackspam
1599583708 - 09/08/2020 18:48:28 Host: 187.58.162.10/187.58.162.10 Port: 445 TCP Blocked
2020-09-10 02:00:31
63.143.57.146 attackbotsspam
TCP Port: 25     invalid blocked  Listed on   spam-sorbs also NoSolicitado and justspam           (190)
2020-09-10 02:38:21
88.80.20.86 attack
Sep  9 15:44:05 rotator sshd\[21134\]: Failed password for root from 88.80.20.86 port 33329 ssh2Sep  9 15:44:09 rotator sshd\[21134\]: Failed password for root from 88.80.20.86 port 33329 ssh2Sep  9 15:44:11 rotator sshd\[21134\]: Failed password for root from 88.80.20.86 port 33329 ssh2Sep  9 15:44:13 rotator sshd\[21134\]: Failed password for root from 88.80.20.86 port 33329 ssh2Sep  9 15:44:16 rotator sshd\[21134\]: Failed password for root from 88.80.20.86 port 33329 ssh2Sep  9 15:44:19 rotator sshd\[21134\]: Failed password for root from 88.80.20.86 port 33329 ssh2
...
2020-09-10 02:34:27

最近上报的IP列表

66.190.67.13 66.208.113.82 66.181.160.81 66.225.156.3
66.223.133.180 66.211.228.227 66.228.42.7 66.228.62.231
66.228.45.180 66.228.42.11 66.229.53.68 66.228.46.77
66.228.46.215 66.225.251.227 66.245.215.181 66.249.64.215
66.244.206.126 66.249.70.3 66.249.70.155 66.249.70.54