必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
66.249.72.27 attackbots
[Thu Sep 24 15:27:36.894798 2020] [php7:error] [pid 32575] [client 66.249.72.27:60939] script /Library/Server/Web/Data/Sites/worldawakeinc.org/wp-login.php not found or unable to stat
2020-09-25 19:42:46
66.249.72.95 attack
[Tue Jul 28 07:01:49.839857 2020] [php7:error] [pid 22749] [client 66.249.72.95:55360] script /Library/Server/Web/Data/Sites/windridgewoodcrafts.com/wp-login.php not found or unable to stat
2020-07-28 22:44:44
66.249.72.23 attack
Unauthorized connection attempt detected from IP address 66.249.72.23 to port 80
2020-01-12 15:06:25
66.249.72.17 attackspambots
Automatic report - Web App Attack
2019-11-13 14:57:16
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.249.72.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46168
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.249.72.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025111402 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 15 11:00:40 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
138.72.249.66.in-addr.arpa domain name pointer crawl-66-249-72-138.googlebot.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.72.249.66.in-addr.arpa	name = crawl-66-249-72-138.googlebot.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.254.143.169 attackspambots
Telnetd brute force attack detected by fail2ban
2019-09-22 08:56:56
159.89.229.244 attackspam
Sep 22 02:37:56 MK-Soft-VM6 sshd[12759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.229.244 
Sep 22 02:37:58 MK-Soft-VM6 sshd[12759]: Failed password for invalid user jboss from 159.89.229.244 port 44714 ssh2
...
2019-09-22 09:27:02
46.99.195.53 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/46.99.195.53/ 
 XK - 1H : (6)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : XK 
 NAME ASN : ASN21246 
 
 IP : 46.99.195.53 
 
 CIDR : 46.99.192.0/21 
 
 PREFIX COUNT : 124 
 
 UNIQUE IP COUNT : 77824 
 
 
 WYKRYTE ATAKI Z ASN21246 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 3 
 
 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-22 09:20:47
180.150.189.206 attack
Sep 21 23:09:19 hcbbdb sshd\[10657\]: Invalid user fi from 180.150.189.206
Sep 21 23:09:19 hcbbdb sshd\[10657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.150.189.206
Sep 21 23:09:20 hcbbdb sshd\[10657\]: Failed password for invalid user fi from 180.150.189.206 port 34091 ssh2
Sep 21 23:13:36 hcbbdb sshd\[11227\]: Invalid user nrg from 180.150.189.206
Sep 21 23:13:36 hcbbdb sshd\[11227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.150.189.206
2019-09-22 08:54:17
220.121.58.55 attack
Automatic report - Banned IP Access
2019-09-22 08:56:12
186.92.158.176 attack
Unauthorized connection attempt from IP address 186.92.158.176 on Port 445(SMB)
2019-09-22 09:13:33
157.245.198.59 attackspambots
Port scan on 4 port(s): 7076 7153 7194 7195
2019-09-22 08:49:56
140.213.45.221 attackspam
Unauthorized connection attempt from IP address 140.213.45.221 on Port 445(SMB)
2019-09-22 09:04:29
213.33.244.187 attackbots
$f2bV_matches
2019-09-22 08:54:46
213.194.74.226 attack
Unauthorized connection attempt from IP address 213.194.74.226 on Port 445(SMB)
2019-09-22 09:08:03
122.195.200.148 attackbotsspam
Sep 22 03:01:13 MK-Soft-VM5 sshd[12562]: Failed password for root from 122.195.200.148 port 42057 ssh2
Sep 22 03:01:16 MK-Soft-VM5 sshd[12562]: Failed password for root from 122.195.200.148 port 42057 ssh2
...
2019-09-22 09:07:07
113.176.212.158 attackspambots
Unauthorized connection attempt from IP address 113.176.212.158 on Port 445(SMB)
2019-09-22 08:53:06
178.128.242.233 attackspam
Sep 22 01:44:23 localhost sshd\[14633\]: Invalid user rheal123 from 178.128.242.233 port 46474
Sep 22 01:44:23 localhost sshd\[14633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.242.233
Sep 22 01:44:25 localhost sshd\[14633\]: Failed password for invalid user rheal123 from 178.128.242.233 port 46474 ssh2
2019-09-22 09:30:11
94.102.3.242 attackspambots
Unauthorized connection attempt from IP address 94.102.3.242 on Port 445(SMB)
2019-09-22 09:07:47
66.249.79.136 attack
Automatic report - Banned IP Access
2019-09-22 09:25:08

最近上报的IP列表

3.252.39.56 113.215.188.231 125.67.173.0 118.114.21.138
121.40.47.199 58.59.235.228 116.172.201.167 111.224.221.252
113.95.133.207 183.7.16.221 159.223.15.8 34.243.217.79
120.232.51.126 120.233.109.179 50.0.183.135 50.0.183.168
44.220.185.206 177.25.138.182 113.95.134.151 144.48.80.33