必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
66.249.68.30 attackspam
404 NOT FOUND
2020-09-27 02:02:20
66.249.68.30 attack
404 NOT FOUND
2020-09-26 17:56:37
66.249.68.52 attackspam
[Tue Aug 25 03:14:51.658211 2020] [:error] [pid 26844:tid 139693576779520] [client 66.249.68.52:62139] [client 66.249.68.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "((?:[~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>][^~!@#\\\\$%\\\\^&\\\\*\\\\(\\\\)\\\\-\\\\+=\\\\{\\\\}\\\\[\\\\]\\\\|:;\"'\\xc2\\xb4\\xe2\\x80\\x99\\xe2\\x80\\x98`<>]*?){6})" at ARGS:id. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "1526"] [id "942431"] [msg "Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (6)"] [data "Matched Data: :analisis-dinamika-atmosfer-dan-laut- found within ARGS:id: 656:analisis-dinamika-atmosfer-dan-laut-dasarian-i-agustus-2017"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "OWASP_CRS"] [tag "OWASP_CRS/WEB
...
2020-08-25 06:22:38
66.249.68.50 attack
Unauthorized connection attempt detected, IP banned.
2020-07-05 01:30:33
66.249.68.26 attack
MYH,DEF GET /_adminer/adminer.php
2020-06-24 14:04:37
66.249.68.16 attackbots
$f2bV_matches
2020-06-04 05:57:43
66.249.68.18 attackspambots
$f2bV_matches
2020-05-31 16:33:19
66.249.68.28 attack
MYH,DEF GET /adminer123.php
2020-03-03 15:44:47
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.249.68.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.249.68.13.			IN	A

;; AUTHORITY SECTION:
.			439	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 12:17:58 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
13.68.249.66.in-addr.arpa domain name pointer crawl-66-249-68-13.googlebot.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.68.249.66.in-addr.arpa	name = crawl-66-249-68-13.googlebot.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.61.27.149 attackbotsspam
IP blocked
2020-04-18 16:11:00
129.28.177.29 attackbots
Apr 18 06:32:01 vps647732 sshd[25563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.177.29
Apr 18 06:32:03 vps647732 sshd[25563]: Failed password for invalid user jz from 129.28.177.29 port 46400 ssh2
...
2020-04-18 15:26:40
159.89.177.46 attackbotsspam
Invalid user glt from 159.89.177.46 port 57380
2020-04-18 15:29:23
49.233.193.237 attackspambots
no
2020-04-18 15:28:00
66.42.43.150 attack
Unauthorized connection attempt detected from IP address 66.42.43.150 to port 22 [T]
2020-04-18 15:49:13
92.63.194.25 attackspam
Apr 18 06:16:37 IngegnereFirenze sshd[32258]: Failed password for invalid user Administrator from 92.63.194.25 port 39959 ssh2
...
2020-04-18 15:33:18
188.165.255.8 attackbotsspam
Apr 18 09:13:42 ourumov-web sshd\[29005\]: Invalid user pr from 188.165.255.8 port 39730
Apr 18 09:13:42 ourumov-web sshd\[29005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.255.8
Apr 18 09:13:44 ourumov-web sshd\[29005\]: Failed password for invalid user pr from 188.165.255.8 port 39730 ssh2
...
2020-04-18 16:09:45
183.131.84.141 attack
Apr 18 07:15:44 vmd48417 sshd[18964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.84.141
2020-04-18 15:40:45
164.68.127.40 attackspambots
Apr 18 06:51:46 legacy sshd[19897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.127.40
Apr 18 06:51:48 legacy sshd[19897]: Failed password for invalid user oracle from 164.68.127.40 port 42176 ssh2
Apr 18 06:57:25 legacy sshd[20030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.127.40
...
2020-04-18 15:58:54
141.98.81.83 attackspam
Apr 18 07:58:12 localhost sshd\[4593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.83  user=root
Apr 18 07:58:14 localhost sshd\[4593\]: Failed password for root from 141.98.81.83 port 35385 ssh2
Apr 18 07:58:40 localhost sshd\[4612\]: Invalid user guest from 141.98.81.83
Apr 18 07:58:40 localhost sshd\[4612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.83
Apr 18 07:58:42 localhost sshd\[4612\]: Failed password for invalid user guest from 141.98.81.83 port 38393 ssh2
...
2020-04-18 15:48:09
82.19.173.98 attackspam
Automatic report - Port Scan Attack
2020-04-18 15:45:53
182.50.132.103 attack
182.50.132.103 has been banned for [WebApp Attack]
...
2020-04-18 15:46:47
141.98.81.107 attackbots
Apr 18 07:58:24 localhost sshd\[4603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.107  user=root
Apr 18 07:58:27 localhost sshd\[4603\]: Failed password for root from 141.98.81.107 port 33431 ssh2
Apr 18 07:58:55 localhost sshd\[4636\]: Invalid user admin from 141.98.81.107
Apr 18 07:58:55 localhost sshd\[4636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.107
Apr 18 07:58:57 localhost sshd\[4636\]: Failed password for invalid user admin from 141.98.81.107 port 43623 ssh2
...
2020-04-18 15:37:54
111.229.111.160 attackbots
" "
2020-04-18 16:08:54
189.202.204.230 attackspam
Invalid user test from 189.202.204.230 port 38296
2020-04-18 15:42:21

最近上报的IP列表

117.177.205.39 59.24.217.51 181.129.224.170 111.18.135.103
159.224.14.173 117.86.127.220 218.161.91.98 201.150.177.21
122.114.0.151 103.221.246.138 117.241.33.136 64.124.51.154
203.150.128.233 35.225.215.251 216.230.232.36 213.81.220.209
83.63.173.233 114.86.167.70 123.8.162.192 35.234.69.58