必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.255.53.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.255.53.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 15:50:00 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
149.53.255.66.in-addr.arpa domain name pointer uslec-66-255-53-149.cust.uslec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.53.255.66.in-addr.arpa	name = uslec-66-255-53-149.cust.uslec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
116.239.4.130 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-01-09 07:13:49
222.186.175.217 attackbots
2020-01-08T23:13:42.400442shield sshd\[11896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
2020-01-08T23:13:43.727047shield sshd\[11896\]: Failed password for root from 222.186.175.217 port 23898 ssh2
2020-01-08T23:13:46.873830shield sshd\[11896\]: Failed password for root from 222.186.175.217 port 23898 ssh2
2020-01-08T23:13:50.238463shield sshd\[11896\]: Failed password for root from 222.186.175.217 port 23898 ssh2
2020-01-08T23:13:53.014000shield sshd\[11896\]: Failed password for root from 222.186.175.217 port 23898 ssh2
2020-01-09 07:20:05
222.186.42.4 attackbots
Jan  9 00:13:41 plex sshd[12366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4  user=root
Jan  9 00:13:43 plex sshd[12366]: Failed password for root from 222.186.42.4 port 30852 ssh2
2020-01-09 07:15:38
78.47.47.139 attack
Host Scan
2020-01-09 06:45:21
58.22.99.135 attackspam
Jan  8 21:09:12 sshgateway sshd\[12878\]: Invalid user admin from 58.22.99.135
Jan  8 21:09:12 sshgateway sshd\[12878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.22.99.135
Jan  8 21:09:14 sshgateway sshd\[12878\]: Failed password for invalid user admin from 58.22.99.135 port 39963 ssh2
2020-01-09 07:08:06
103.141.137.39 attack
Jan  8 23:31:00 srv01 postfix/smtpd[9980]: warning: unknown[103.141.137.39]: SASL LOGIN authentication failed: authentication failure
Jan  8 23:31:01 srv01 postfix/smtpd[9980]: warning: unknown[103.141.137.39]: SASL LOGIN authentication failed: authentication failure
Jan  8 23:31:02 srv01 postfix/smtpd[9980]: warning: unknown[103.141.137.39]: SASL LOGIN authentication failed: authentication failure
...
2020-01-09 06:51:38
106.12.199.74 attack
Jan  8 18:09:07 ws19vmsma01 sshd[66136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.199.74
Jan  8 18:09:10 ws19vmsma01 sshd[66136]: Failed password for invalid user vqf from 106.12.199.74 port 35732 ssh2
...
2020-01-09 07:20:49
183.232.36.13 attack
Jan  8 12:47:32 hanapaa sshd\[29585\]: Invalid user ashok from 183.232.36.13
Jan  8 12:47:32 hanapaa sshd\[29585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.232.36.13
Jan  8 12:47:34 hanapaa sshd\[29585\]: Failed password for invalid user ashok from 183.232.36.13 port 12672 ssh2
Jan  8 12:50:29 hanapaa sshd\[29840\]: Invalid user saaf from 183.232.36.13
Jan  8 12:50:29 hanapaa sshd\[29840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.232.36.13
2020-01-09 07:00:34
47.96.144.102 attackspam
Jan  8 22:07:15 vps sshd\[30428\]: Invalid user phion from 47.96.144.102
Jan  8 22:09:10 vps sshd\[30434\]: Invalid user firebird from 47.96.144.102
...
2020-01-09 07:21:26
188.2.120.213 attackbots
Jan  8 22:09:54 vps670341 sshd[9403]: Invalid user test from 188.2.120.213 port 53372
2020-01-09 06:58:51
103.10.30.224 attackspambots
Jan  8 21:13:46 www_kotimaassa_fi sshd[7435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.30.224
Jan  8 21:13:47 www_kotimaassa_fi sshd[7435]: Failed password for invalid user ubnt from 103.10.30.224 port 50490 ssh2
...
2020-01-09 07:21:44
185.176.27.54 attackspam
01/08/2020-17:52:57.705364 185.176.27.54 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-09 07:11:01
200.110.174.137 attack
SSH brutforce
2020-01-09 07:17:23
178.62.14.107 attackspam
Jan  8 11:45:16 hanapaa sshd\[23339\]: Invalid user cpw from 178.62.14.107
Jan  8 11:45:16 hanapaa sshd\[23339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.14.107
Jan  8 11:45:18 hanapaa sshd\[23339\]: Failed password for invalid user cpw from 178.62.14.107 port 50210 ssh2
Jan  8 11:48:00 hanapaa sshd\[23719\]: Invalid user teamspeak from 178.62.14.107
Jan  8 11:48:00 hanapaa sshd\[23719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.14.107
2020-01-09 06:52:32
201.168.155.205 attackspam
Automatic report - Banned IP Access
2020-01-09 06:55:34

最近上报的IP列表

13.106.46.217 125.135.153.120 99.9.32.112 251.27.168.70
187.44.211.239 225.250.245.194 40.166.98.97 25.45.16.206
97.156.17.171 251.162.247.104 129.194.45.204 244.104.216.76
235.31.218.89 72.208.5.196 224.206.163.84 12.180.44.75
63.1.193.37 36.140.135.236 118.187.21.17 41.200.74.18