必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): St. Louis

省份(region): Missouri

国家(country): United States

运营商(isp): RTC Communications LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.49.104.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23421
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.49.104.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:26:44 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
99.104.49.66.in-addr.arpa domain name pointer 66.49.104.99.nw.nuvox.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.104.49.66.in-addr.arpa	name = 66.49.104.99.nw.nuvox.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.163.109.153 attackbotsspam
0,30-11/22 [bc01/m13] PostRequest-Spammer scoring: zurich
2019-11-21 02:49:58
169.197.108.206 attack
firewall-block, port(s): 8443/tcp
2019-11-21 03:14:50
80.82.70.118 attackspam
Port scan: Attack repeated for 24 hours
2019-11-21 03:02:27
118.25.129.1 attack
HTTP: Joomla Object Injection Vulnerability
2019-11-21 02:43:06
129.204.23.5 attackspambots
Nov 20 20:02:38 ns41 sshd[30377]: Failed password for root from 129.204.23.5 port 41342 ssh2
Nov 20 20:06:32 ns41 sshd[30563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.23.5
Nov 20 20:06:34 ns41 sshd[30563]: Failed password for invalid user mariellen from 129.204.23.5 port 50094 ssh2
2019-11-21 03:07:02
92.253.23.7 attackbotsspam
Repeated brute force against a port
2019-11-21 03:12:14
179.104.29.142 attack
Telnet Server BruteForce Attack
2019-11-21 03:20:44
181.129.130.226 attackspam
firewall-block, port(s): 1433/tcp
2019-11-21 03:12:34
111.75.162.114 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-11-21 03:16:28
171.246.108.244 attackbots
Automatic report - Port Scan Attack
2019-11-21 02:44:22
91.106.193.72 attackbots
Repeated brute force against a port
2019-11-21 03:19:52
109.15.173.92 attack
109.15.173.92 was recorded 5 times by 1 hosts attempting to connect to the following ports: 23,2323. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-21 02:48:09
111.231.139.30 attackbots
Nov 20 19:34:04 herz-der-gamer sshd[10631]: Invalid user arjun from 111.231.139.30 port 55978
Nov 20 19:34:04 herz-der-gamer sshd[10631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.139.30
Nov 20 19:34:04 herz-der-gamer sshd[10631]: Invalid user arjun from 111.231.139.30 port 55978
Nov 20 19:34:05 herz-der-gamer sshd[10631]: Failed password for invalid user arjun from 111.231.139.30 port 55978 ssh2
...
2019-11-21 03:22:30
188.166.211.194 attackbotsspam
$f2bV_matches
2019-11-21 03:05:40
63.88.23.147 attackbotsspam
63.88.23.147 was recorded 10 times by 8 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 10, 83, 405
2019-11-21 02:53:35

最近上报的IP列表

159.159.69.124 71.163.196.246 53.167.126.183 50.97.27.85
119.254.179.248 128.88.81.59 219.119.168.123 28.227.32.91
72.37.224.107 131.118.118.32 73.219.214.63 143.175.11.116
20.226.39.124 35.200.24.130 203.3.175.83 168.240.17.159
134.133.215.118 70.60.4.104 44.17.126.230 27.107.151.113