必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.90.2.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.90.2.41.			IN	A

;; AUTHORITY SECTION:
.			253	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071601 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 17 02:20:06 CST 2020
;; MSG SIZE  rcvd: 114
HOST信息:
41.2.90.66.in-addr.arpa domain name pointer 66.90.2.41.host.smartcitytelecom.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.2.90.66.in-addr.arpa	name = 66.90.2.41.host.smartcitytelecom.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.28.152.133 attack
Sep 12 00:09:42 webhost01 sshd[14081]: Failed password for root from 181.28.152.133 port 32823 ssh2
...
2020-09-12 01:36:07
45.142.120.83 attackspam
Sep  9 04:18:13 web02.agentur-b-2.de postfix/smtpd[1652531]: warning: unknown[45.142.120.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 04:18:52 web02.agentur-b-2.de postfix/smtpd[1652531]: warning: unknown[45.142.120.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 04:19:32 web02.agentur-b-2.de postfix/smtpd[1652531]: warning: unknown[45.142.120.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 04:20:14 web02.agentur-b-2.de postfix/smtpd[1651912]: warning: unknown[45.142.120.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 04:21:36 web02.agentur-b-2.de postfix/smtpd[1653765]: warning: unknown[45.142.120.83]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-12 01:28:16
98.150.250.138 attackbotsspam
Invalid user osmc from 98.150.250.138 port 54024
2020-09-12 01:01:27
103.237.57.200 attackbots
Sep  7 13:11:45 mail.srvfarm.net postfix/smtps/smtpd[1073053]: warning: unknown[103.237.57.200]: SASL PLAIN authentication failed: 
Sep  7 13:11:45 mail.srvfarm.net postfix/smtps/smtpd[1073053]: lost connection after AUTH from unknown[103.237.57.200]
Sep  7 13:12:39 mail.srvfarm.net postfix/smtps/smtpd[1072842]: warning: unknown[103.237.57.200]: SASL PLAIN authentication failed: 
Sep  7 13:12:39 mail.srvfarm.net postfix/smtps/smtpd[1072842]: lost connection after AUTH from unknown[103.237.57.200]
Sep  7 13:20:58 mail.srvfarm.net postfix/smtpd[1058623]: warning: unknown[103.237.57.200]: SASL PLAIN authentication failed:
2020-09-12 01:23:21
78.39.193.36 attackspam
Found on   CINS badguys     / proto=6  .  srcport=46205  .  dstport=1433  .     (766)
2020-09-12 01:39:21
45.142.120.192 attackspam
Sep  9 04:09:28 web02.agentur-b-2.de postfix/smtpd[1651912]: warning: unknown[45.142.120.192]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 04:10:07 web02.agentur-b-2.de postfix/smtpd[1651912]: warning: unknown[45.142.120.192]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 04:10:45 web02.agentur-b-2.de postfix/smtpd[1652531]: warning: unknown[45.142.120.192]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 04:11:24 web02.agentur-b-2.de postfix/smtpd[1652531]: warning: unknown[45.142.120.192]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 04:12:01 web02.agentur-b-2.de postfix/smtpd[1651912]: warning: unknown[45.142.120.192]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-12 01:26:07
62.210.194.9 attackbotsspam
Sep 10 15:28:42 mail.srvfarm.net postfix/smtpd[3126192]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
Sep 10 15:29:52 mail.srvfarm.net postfix/smtpd[3122971]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
Sep 10 15:30:57 mail.srvfarm.net postfix/smtpd[3142403]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
Sep 10 15:33:27 mail.srvfarm.net postfix/smtpd[3126191]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
Sep 10 15:34:36 mail.srvfarm.net postfix/smtpd[3126191]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9]
2020-09-12 01:24:26
178.169.171.129 attack
Found on   CINS badguys     / proto=6  .  srcport=24523  .  dstport=23  .     (771)
2020-09-12 01:09:24
195.54.167.91 attack
 TCP (SYN) 195.54.167.91:54488 -> port 25972, len 44
2020-09-12 01:00:02
210.211.116.80 attack
Sep 11 16:52:48 sshgateway sshd\[11390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.211.116.80  user=root
Sep 11 16:52:50 sshgateway sshd\[11390\]: Failed password for root from 210.211.116.80 port 61398 ssh2
Sep 11 16:54:24 sshgateway sshd\[11559\]: Invalid user open from 210.211.116.80
2020-09-12 01:04:17
161.35.230.3 attackspambots
Port scan on 1 port(s): 4443
2020-09-12 01:04:32
80.227.119.114 attackbotsspam
Sep 10 18:53:13 * sshd[14361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.227.119.114
Sep 10 18:53:15 * sshd[14361]: Failed password for invalid user pi from 80.227.119.114 port 49386 ssh2
2020-09-12 01:09:03
210.16.88.122 attackbotsspam
Sep  7 13:10:07 mail.srvfarm.net postfix/smtpd[1058629]: warning: unknown[210.16.88.122]: SASL PLAIN authentication failed: 
Sep  7 13:10:07 mail.srvfarm.net postfix/smtpd[1058629]: lost connection after AUTH from unknown[210.16.88.122]
Sep  7 13:11:33 mail.srvfarm.net postfix/smtpd[1053353]: warning: unknown[210.16.88.122]: SASL PLAIN authentication failed: 
Sep  7 13:11:34 mail.srvfarm.net postfix/smtpd[1053353]: lost connection after AUTH from unknown[210.16.88.122]
Sep  7 13:14:27 mail.srvfarm.net postfix/smtpd[1072432]: warning: unknown[210.16.88.122]: SASL PLAIN authentication failed:
2020-09-12 01:17:08
118.89.229.84 attackbots
Sep 11 16:17:21 sshgateway sshd\[6535\]: Invalid user developer from 118.89.229.84
Sep 11 16:17:21 sshgateway sshd\[6535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.84
Sep 11 16:17:23 sshgateway sshd\[6535\]: Failed password for invalid user developer from 118.89.229.84 port 50548 ssh2
2020-09-12 01:31:14
113.161.151.29 attackspambots
(imapd) Failed IMAP login from 113.161.151.29 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 11 19:38:39 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 4 secs): user=, method=PLAIN, rip=113.161.151.29, lip=5.63.12.44, TLS: Connection closed, session=
2020-09-12 00:57:18

最近上报的IP列表

229.240.170.125 156.247.13.9 117.232.67.151 154.127.204.10
151.29.91.100 116.236.41.165 51.103.132.83 140.44.250.5
14.233.10.186 189.19.233.109 237.20.146.163 59.121.152.103
188.182.235.208 172.244.32.130 105.77.159.246 104.22.106.118
38.27.170.77 54.204.12.187 114.40.243.60 72.0.60.87