城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 66.249.76.82 | attackbots | [06/Aug/2020:07:18:39 +0200] Web-Request: "GET /.well-known/assetlinks.json", User-Agent: "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" |
2020-08-06 19:48:48 |
| 66.249.76.140 | attackspam | MYH,DEF GET /sitebackup/adminer.php |
2020-07-30 23:41:18 |
| 66.249.76.33 | attackspambots | [30/Jul/2020:14:38:18 +0200] Web-Request: "GET /.well-known/assetlinks.json", User-Agent: "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" |
2020-07-30 23:33:36 |
| 66.249.76.11 | attack | 66.249.76.11 - - [27/Jul/2020:13:57:36 +0200] "GET /awstats.pl?config=oraux.pnzone.net&lang=fr&output=lasthosts HTTP/1.1" 404 280 "-" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.92 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" |
2020-07-27 20:28:07 |
| 66.249.76.23 | attack | MYH,DEF GET /news/wp-content/plugins/custom-background/uploadify/uploadify.php |
2020-07-25 17:30:45 |
| 66.249.76.158 | attack | MYH,DEF GET /news/wp-content/plugins/custom-background/uploadify/uploadify.php |
2020-07-25 17:24:06 |
| 66.249.76.92 | attackbotsspam | MYH,DEF GET /shop/errors/adminer.php |
2020-06-14 17:25:47 |
| 66.249.76.117 | attackspam | MYH,DEF GET /magmi/web/magmi.php |
2020-06-13 15:06:07 |
| 66.249.76.132 | attack | MYH,DEF GET /magmi/web/magmi.php |
2020-06-13 15:05:16 |
| 66.249.76.129 | attack | MYH,DEF GET /news/wp-content/plugins/custom-background/uploadify/uploadify.php |
2020-06-05 15:02:56 |
| 66.249.76.1 | attack | MYH,DEF GET /news/wp-content/plugins/custom-background/uploadify/uploadify |
2020-06-02 22:29:31 |
| 66.249.76.153 | attackspam | Another failed trust whitelist here I see, and you charge for this service? shocking FREE list available for-ever at plonkatronix.com 66.249.76.153 forum registration/abuse ignore robots.txt then scan for nothing but javascript files then tries to register |
2020-04-13 17:30:09 |
| 66.249.76.126 | attackbotsspam | MYH,DEF GET /adminer-4.6.2.php |
2020-02-19 08:21:49 |
| 66.249.76.121 | attackbotsspam | MYH,DEF GET /adminer-4.6.2.php |
2020-02-19 08:18:32 |
| 66.249.76.9 | attackbotsspam | 66.249.76.9 - - [16/Jan/2020:05:52:52 +0100] "GET /awstats.pl?config=omniscrypto.omniscreative.com%2Fgroups%2Fsifat-kusus-situs-aduq-terpercaya-ada-bagi-tamu99%2F&lang=en&output=main HTTP/1.1" 404 280 "-" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.96 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" |
2020-01-16 14:48:52 |
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 66.249.64.0 - 66.249.95.255
CIDR: 66.249.64.0/19
NetName: GOOGLE
NetHandle: NET-66-249-64-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google LLC (GOGL)
RegDate: 2004-03-05
Updated: 2012-02-24
Ref: https://rdap.arin.net/registry/ip/66.249.64.0
OrgName: Google LLC
OrgId: GOGL
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2000-03-30
Updated: 2019-10-31
Comment: Please note that the recommended way to file abuse complaints are located in the following links.
Comment:
Comment: To report abuse and illegal activity: https://www.google.com/contact/
Comment:
Comment: For legal requests: http://support.google.com/legal
Comment:
Comment: Regards,
Comment: The Google Team
Ref: https://rdap.arin.net/registry/entity/GOGL
OrgTechHandle: ZG39-ARIN
OrgTechName: Google LLC
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZG39-ARIN
OrgAbuseHandle: ABUSE5250-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: network-abuse@google.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5250-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.249.76.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.249.76.65. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052200 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 22 23:00:58 CST 2026
;; MSG SIZE rcvd: 105
65.76.249.66.in-addr.arpa domain name pointer crawl-66-249-76-65.googlebot.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
65.76.249.66.in-addr.arpa name = crawl-66-249-76-65.googlebot.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 115.49.254.3 | attack | Unauthorized connection attempt detected from IP address 115.49.254.3 to port 23 [J] |
2020-03-02 16:12:56 |
| 117.228.182.56 | attack | Unauthorized connection attempt detected from IP address 117.228.182.56 to port 5900 [J] |
2020-03-02 15:37:00 |
| 131.0.164.76 | attackspambots | Unauthorized connection attempt detected from IP address 131.0.164.76 to port 23 [J] |
2020-03-02 15:31:06 |
| 1.2.134.99 | attackbotsspam | Unauthorized connection attempt detected from IP address 1.2.134.99 to port 23 [J] |
2020-03-02 15:53:59 |
| 27.45.126.194 | attackspam | Unauthorized connection attempt detected from IP address 27.45.126.194 to port 23 [J] |
2020-03-02 15:51:52 |
| 103.140.127.135 | attackspambots | Mar 2 08:10:29 silence02 sshd[8823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.140.127.135 Mar 2 08:10:32 silence02 sshd[8823]: Failed password for invalid user hubihao from 103.140.127.135 port 36068 ssh2 Mar 2 08:18:24 silence02 sshd[9871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.140.127.135 |
2020-03-02 15:40:20 |
| 190.246.12.133 | attack | Unauthorized connection attempt detected from IP address 190.246.12.133 to port 81 [J] |
2020-03-02 15:59:06 |
| 118.40.220.77 | attackbotsspam | Unauthorized connection attempt detected from IP address 118.40.220.77 to port 23 [J] |
2020-03-02 15:36:30 |
| 171.234.180.182 | attackbots | Unauthorized connection attempt detected from IP address 171.234.180.182 to port 23 [J] |
2020-03-02 16:03:24 |
| 85.74.25.100 | attackbotsspam | Unauthorized connection attempt detected from IP address 85.74.25.100 to port 8080 [J] |
2020-03-02 15:43:26 |
| 124.156.55.143 | attackspam | Unauthorized connection attempt detected from IP address 124.156.55.143 to port 902 [J] |
2020-03-02 16:07:43 |
| 196.203.72.11 | attackspam | Unauthorized connection attempt detected from IP address 196.203.72.11 to port 23 [J] |
2020-03-02 15:58:38 |
| 171.239.193.60 | attackspambots | Unauthorized connection attempt detected from IP address 171.239.193.60 to port 23 [J] |
2020-03-02 16:03:03 |
| 103.73.182.51 | attack | Unauthorized connection attempt detected from IP address 103.73.182.51 to port 23 [J] |
2020-03-02 15:41:13 |
| 116.252.0.26 | attackbotsspam | Unauthorized connection attempt detected from IP address 116.252.0.26 to port 8082 [J] |
2020-03-02 16:11:31 |