必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.242.117.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.242.117.153.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:42:50 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 153.117.242.66.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 153.117.242.66.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.135.182.84 attackbotsspam
2019-09-14T07:50:45.284487abusebot-4.cloudsearch.cf sshd\[8844\]: Invalid user nazrul from 5.135.182.84 port 50778
2019-09-14 16:05:22
91.204.188.50 attack
Sep 14 10:12:23 server sshd\[14199\]: Invalid user cmuir from 91.204.188.50 port 49542
Sep 14 10:12:23 server sshd\[14199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.188.50
Sep 14 10:12:25 server sshd\[14199\]: Failed password for invalid user cmuir from 91.204.188.50 port 49542 ssh2
Sep 14 10:17:06 server sshd\[26317\]: Invalid user web from 91.204.188.50 port 39030
Sep 14 10:17:06 server sshd\[26317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.188.50
2019-09-14 15:36:12
45.114.166.39 attackspam
Sep 14 09:24:29 our-server-hostname postfix/smtpd[31154]: connect from unknown[45.114.166.39]
Sep 14 09:24:30 our-server-hostname postfix/smtpd[31154]: NOQUEUE: reject: RCPT from unknown[45.114.166.39]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Sep 14 09:24:30 our-server-hostname postfix/smtpd[31154]: disconnect from unknown[45.114.166.39]
Sep 14 09:24:30 our-server-hostname postfix/smtpd[21858]: connect from unknown[45.114.166.39]
Sep 14 09:24:31 our-server-hostname postfix/smtpd[21858]: NOQUEUE: reject: RCPT from unknown[45.114.166.39]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Sep 14 09:24:31 our-server-hostname postfix/smtpd[21858]: disconnect from unknown[45.114.166.39]
Sep 14 09:28:34 our-server-hostname postfix/smtpd[26338]: connect from unknown[45.114.166.39]
Sep 14 09:28:34 our-server-hostname postfix/smtpd[26338]: NOQUEUE: reject: RCPT from unk........
-------------------------------
2019-09-14 16:19:33
89.133.103.216 attack
Sep 13 21:23:58 friendsofhawaii sshd\[6514\]: Invalid user test123 from 89.133.103.216
Sep 13 21:23:58 friendsofhawaii sshd\[6514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=catv-89-133-103-216.catv.broadband.hu
Sep 13 21:24:00 friendsofhawaii sshd\[6514\]: Failed password for invalid user test123 from 89.133.103.216 port 54914 ssh2
Sep 13 21:28:19 friendsofhawaii sshd\[6938\]: Invalid user 123 from 89.133.103.216
Sep 13 21:28:19 friendsofhawaii sshd\[6938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=catv-89-133-103-216.catv.broadband.hu
2019-09-14 15:40:48
157.100.234.45 attackbots
Sep 14 10:48:23 microserver sshd[16027]: Invalid user john from 157.100.234.45 port 60972
Sep 14 10:48:23 microserver sshd[16027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.100.234.45
Sep 14 10:48:25 microserver sshd[16027]: Failed password for invalid user john from 157.100.234.45 port 60972 ssh2
Sep 14 10:52:53 microserver sshd[16646]: Invalid user telegraf from 157.100.234.45 port 47254
Sep 14 10:52:53 microserver sshd[16646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.100.234.45
Sep 14 11:05:57 microserver sshd[18522]: Invalid user ts from 157.100.234.45 port 34318
Sep 14 11:05:57 microserver sshd[18522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.100.234.45
Sep 14 11:05:58 microserver sshd[18522]: Failed password for invalid user ts from 157.100.234.45 port 34318 ssh2
Sep 14 11:10:28 microserver sshd[18906]: Invalid user axfrdns from 157.100.234.45 port 48838
2019-09-14 16:02:16
93.21.138.116 attackbots
Invalid user alessandro from 93.21.138.116 port 51758
2019-09-14 16:16:32
71.6.165.200 attackbotsspam
Automatic report - Port Scan Attack
2019-09-14 15:55:12
167.71.151.74 attack
Sep 13 22:26:00 netserv300 sshd[22259]: Connection from 167.71.151.74 port 42862 on 188.40.78.230 port 22
Sep 13 22:26:00 netserv300 sshd[22258]: Connection from 167.71.151.74 port 46118 on 188.40.78.229 port 22
Sep 13 22:26:00 netserv300 sshd[22257]: Connection from 167.71.151.74 port 45606 on 188.40.78.197 port 22
Sep 13 22:26:00 netserv300 sshd[22260]: Connection from 167.71.151.74 port 46372 on 188.40.78.228 port 22
Sep 13 22:28:36 netserv300 sshd[22265]: Connection from 167.71.151.74 port 55610 on 188.40.78.230 port 22
Sep 13 22:28:36 netserv300 sshd[22264]: Connection from 167.71.151.74 port 59130 on 188.40.78.228 port 22
Sep 13 22:28:36 netserv300 sshd[22266]: Connection from 167.71.151.74 port 58858 on 188.40.78.229 port 22
Sep 13 22:28:36 netserv300 sshd[22267]: Connection from 167.71.151.74 port 58418 on 188.40.78.197 port 22
Sep 13 22:29:10 netserv300 sshd[22272]: Connection from 167.71.151.74 port 49814 on 188.40.78.197 port 22
Sep 13 22:29:10 netserv300 sshd........
------------------------------
2019-09-14 16:11:29
176.31.250.160 attackspam
Sep 14 10:15:18 vps691689 sshd[3403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.160
Sep 14 10:15:21 vps691689 sshd[3403]: Failed password for invalid user catering from 176.31.250.160 port 36570 ssh2
Sep 14 10:19:41 vps691689 sshd[3509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.160
...
2019-09-14 16:20:43
190.104.246.114 attack
SMB Server BruteForce Attack
2019-09-14 15:37:50
188.166.150.79 attack
2019-09-14T14:54:05.957139enmeeting.mahidol.ac.th sshd\[14994\]: Invalid user test from 188.166.150.79 port 58576
2019-09-14T14:54:05.971565enmeeting.mahidol.ac.th sshd\[14994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.79
2019-09-14T14:54:08.162485enmeeting.mahidol.ac.th sshd\[14994\]: Failed password for invalid user test from 188.166.150.79 port 58576 ssh2
...
2019-09-14 16:08:13
68.183.23.254 attackspam
Sep 14 08:15:42 hb sshd\[17660\]: Invalid user hall from 68.183.23.254
Sep 14 08:15:42 hb sshd\[17660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.23.254
Sep 14 08:15:44 hb sshd\[17660\]: Failed password for invalid user hall from 68.183.23.254 port 41502 ssh2
Sep 14 08:20:11 hb sshd\[18047\]: Invalid user jin from 68.183.23.254
Sep 14 08:20:11 hb sshd\[18047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.23.254
2019-09-14 16:31:36
89.36.215.178 attackspambots
Sep 13 21:50:49 wbs sshd\[13862\]: Invalid user adrc from 89.36.215.178
Sep 13 21:50:49 wbs sshd\[13862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.215.178
Sep 13 21:50:51 wbs sshd\[13862\]: Failed password for invalid user adrc from 89.36.215.178 port 60384 ssh2
Sep 13 21:54:35 wbs sshd\[14178\]: Invalid user colord from 89.36.215.178
Sep 13 21:54:35 wbs sshd\[14178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.215.178
2019-09-14 16:17:09
58.59.101.234 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:35:52,118 INFO [amun_request_handler] PortScan Detected on Port: 445 (58.59.101.234)
2019-09-14 16:14:09
106.12.197.119 attackbotsspam
Sep 14 03:34:14 xtremcommunity sshd\[65792\]: Invalid user nin from 106.12.197.119 port 50542
Sep 14 03:34:14 xtremcommunity sshd\[65792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.197.119
Sep 14 03:34:16 xtremcommunity sshd\[65792\]: Failed password for invalid user nin from 106.12.197.119 port 50542 ssh2
Sep 14 03:39:19 xtremcommunity sshd\[66043\]: Invalid user tsdp from 106.12.197.119 port 34328
Sep 14 03:39:19 xtremcommunity sshd\[66043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.197.119
...
2019-09-14 15:51:59

最近上报的IP列表

51.113.67.108 23.32.5.253 20.79.198.121 49.244.14.41
190.184.225.7 117.33.218.145 246.45.0.191 211.194.43.235
96.136.119.75 127.164.170.248 169.72.36.186 177.121.222.83
108.64.126.159 136.16.175.201 72.136.126.27 68.4.54.251
160.95.46.71 8.221.37.204 251.122.253.240 32.129.26.170