必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.234.20.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5742
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.234.20.158.			IN	A

;; AUTHORITY SECTION:
.			2471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090800 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 09 06:46:57 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
158.20.234.66.in-addr.arpa domain name pointer pppoe.66.234.20.158.dslqz.com.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
158.20.234.66.in-addr.arpa	name = pppoe.66.234.20.158.dslqz.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.250.121.5 attackspam
Unauthorized connection attempt detected from IP address 140.250.121.5 to port 6656 [T]
2020-01-28 08:15:51
108.175.205.173 attack
Unauthorized connection attempt detected from IP address 108.175.205.173 to port 1433 [J]
2020-01-28 08:01:40
1.65.134.187 attackspam
Honeypot attack, port: 5555, PTR: 1-65-134-187.static.netvigator.com.
2020-01-28 07:47:48
112.118.211.8 attackspam
Unauthorized connection attempt detected from IP address 112.118.211.8 to port 5555 [J]
2020-01-28 07:43:15
91.171.25.9 attack
2019-07-07 14:07:53 1hk5xR-0007k1-81 SMTP connection from 91-171-25-9.subs.proxad.net \[91.171.25.9\]:43252 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 14:08:04 1hk5xb-0007kO-5h SMTP connection from 91-171-25-9.subs.proxad.net \[91.171.25.9\]:43258 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 14:08:10 1hk5xh-0007kR-9p SMTP connection from 91-171-25-9.subs.proxad.net \[91.171.25.9\]:43264 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 07:43:30
91.127.71.159 attackbots
2019-05-14 15:22:50 H=adsl-dyn159.91-127-71.t-com.sk \[91.127.71.159\]:38551 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-05-14 15:23:10 H=adsl-dyn159.91-127-71.t-com.sk \[91.127.71.159\]:38820 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-05-14 15:23:23 H=adsl-dyn159.91-127-71.t-com.sk \[91.127.71.159\]:38963 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-28 07:59:15
138.197.200.77 attackbotsspam
Aug 22 11:00:41 dallas01 sshd[27116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
Aug 22 11:00:43 dallas01 sshd[27116]: Failed password for invalid user webpop from 138.197.200.77 port 51276 ssh2
Aug 22 11:04:54 dallas01 sshd[27678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
2020-01-28 08:10:19
141.98.80.141 attack
Unauthorized SSH login attempts
2020-01-28 07:53:36
187.178.145.130 attackbots
port 23
2020-01-28 08:06:22
91.187.123.225 attackspambots
2019-07-06 02:16:55 1hjYNq-0006b6-WE SMTP connection from \(\[91.187.123.225\]\) \[91.187.123.225\]:41487 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 02:17:12 1hjYO8-0006bh-1L SMTP connection from \(\[91.187.123.225\]\) \[91.187.123.225\]:41612 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 02:17:30 1hjYOO-0006bw-JW SMTP connection from \(\[91.187.123.225\]\) \[91.187.123.225\]:41711 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 07:38:28
91.140.88.100 attack
2019-03-11 17:57:43 H=adsl-100.91.140.88.tellas.gr \[91.140.88.100\]:29497 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 17:57:54 H=adsl-100.91.140.88.tellas.gr \[91.140.88.100\]:9747 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 17:58:04 H=adsl-100.91.140.88.tellas.gr \[91.140.88.100\]:10005 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-28 07:49:28
91.134.125.198 attackbotsspam
2019-05-06 03:06:03 SMTP protocol error in "AUTH LOGIN" H=ip198.ip-91-134-125.eu \(8rfyIjqK7D\) \[91.134.125.198\]:62191 I=\[193.107.88.166\]:25 AUTH command used when not advertised
2019-05-06 03:06:04 SMTP protocol error in "AUTH LOGIN" H=ip198.ip-91-134-125.eu \(0e2V6Y\) \[91.134.125.198\]:53907 I=\[193.107.88.166\]:25 AUTH command used when not advertised
2019-05-06 03:06:04 SMTP protocol error in "AUTH LOGIN" H=ip198.ip-91-134-125.eu \(qf0GQD2\) \[91.134.125.198\]:62216 I=\[193.107.88.166\]:25 AUTH command used when not advertised
2019-05-06 03:06:04 SMTP protocol error in "AUTH LOGIN" H=ip198.ip-91-134-125.eu \(bmeccVes\) \[91.134.125.198\]:59346 I=\[193.107.88.166\]:25 AUTH command used when not advertised
2019-05-06 03:06:04 SMTP protocol error in "AUTH LOGIN" H=ip198.ip-91-134-125.eu \(y7wkuRegU\) \[91.134.125.198\]:62121 I=\[193.107.88.166\]:25 AUTH command used when not advertised
2019-05-06 03:06:04 SMTP protocol error in "AUTH LOGIN" H=ip198.ip-91-134-125.eu \(Sq1gc7\) \[9
...
2020-01-28 07:58:55
218.92.0.189 attackbotsspam
Jan 28 00:46:39 legacy sshd[17068]: Failed password for root from 218.92.0.189 port 12092 ssh2
Jan 28 00:47:29 legacy sshd[17085]: Failed password for root from 218.92.0.189 port 36645 ssh2
...
2020-01-28 08:09:17
182.247.60.126 attackbots
Unauthorized connection attempt detected from IP address 182.247.60.126 to port 6656 [T]
2020-01-28 08:14:12
222.220.153.185 attackbots
Unauthorized connection attempt detected from IP address 222.220.153.185 to port 6656 [T]
2020-01-28 08:13:05

最近上报的IP列表

194.8.147.22 206.189.56.234 41.239.149.151 45.156.158.147
14.247.178.89 186.208.122.46 70.215.11.70 152.199.204.225
149.206.140.251 159.203.199.101 79.60.107.11 118.97.97.162
89.151.178.9 36.233.180.90 116.109.70.96 113.140.68.148
45.115.4.170 46.29.166.225 204.63.127.220 196.188.241.91