必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.97.247.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.97.247.145.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 11 14:52:44 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
145.247.97.66.in-addr.arpa domain name pointer ip-66-97-247-145.midstatetel.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.247.97.66.in-addr.arpa	name = ip-66-97-247-145.midstatetel.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
128.199.105.221 attackspambots
<6 unauthorized SSH connections
2020-08-19 17:00:32
218.85.119.92 attackspam
Aug 19 05:45:23 minden010 sshd[19277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.85.119.92
Aug 19 05:45:26 minden010 sshd[19277]: Failed password for invalid user gonzalo from 218.85.119.92 port 57925 ssh2
Aug 19 05:50:13 minden010 sshd[20999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.85.119.92
...
2020-08-19 17:04:34
201.92.139.86 attack
Aug 19 07:54:36 dev0-dcde-rnet sshd[25877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.92.139.86
Aug 19 07:54:37 dev0-dcde-rnet sshd[25877]: Failed password for invalid user sw from 201.92.139.86 port 50671 ssh2
Aug 19 07:59:18 dev0-dcde-rnet sshd[25898]: Failed password for root from 201.92.139.86 port 55452 ssh2
2020-08-19 17:10:57
13.71.30.190 attack
Aug 19 10:55:17 OPSO sshd\[30967\]: Invalid user rootftp from 13.71.30.190 port 35428
Aug 19 10:55:17 OPSO sshd\[30967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.30.190
Aug 19 10:55:19 OPSO sshd\[30967\]: Failed password for invalid user rootftp from 13.71.30.190 port 35428 ssh2
Aug 19 11:01:10 OPSO sshd\[31975\]: Invalid user steam from 13.71.30.190 port 57846
Aug 19 11:01:10 OPSO sshd\[31975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.30.190
2020-08-19 17:14:26
49.206.34.65 attackspambots
Icarus honeypot on github
2020-08-19 17:21:35
125.214.50.243 attackbots
firewall-block, port(s): 445/tcp
2020-08-19 17:05:10
8.209.73.223 attack
Aug 19 08:22:35 electroncash sshd[24494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.209.73.223 
Aug 19 08:22:35 electroncash sshd[24494]: Invalid user admin from 8.209.73.223 port 48628
Aug 19 08:22:37 electroncash sshd[24494]: Failed password for invalid user admin from 8.209.73.223 port 48628 ssh2
Aug 19 08:26:27 electroncash sshd[25516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.209.73.223  user=root
Aug 19 08:26:29 electroncash sshd[25516]: Failed password for root from 8.209.73.223 port 42544 ssh2
...
2020-08-19 17:30:53
193.70.39.135 attack
Aug 19 10:29:26 * sshd[27315]: Failed password for root from 193.70.39.135 port 49002 ssh2
2020-08-19 17:19:38
138.68.21.125 attackspam
Aug 19 08:05:46 eventyay sshd[979]: Failed password for root from 138.68.21.125 port 52196 ssh2
Aug 19 08:10:10 eventyay sshd[1092]: Failed password for root from 138.68.21.125 port 33466 ssh2
Aug 19 08:14:33 eventyay sshd[1251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.21.125
...
2020-08-19 17:12:07
142.93.101.148 attackbotsspam
Aug 19 07:37:46 eventyay sshd[32413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148
Aug 19 07:37:49 eventyay sshd[32413]: Failed password for invalid user halt from 142.93.101.148 port 60372 ssh2
Aug 19 07:41:30 eventyay sshd[32535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.101.148
...
2020-08-19 16:59:01
78.186.248.243 attackspam
Automatic report - Banned IP Access
2020-08-19 17:24:47
45.6.18.65 attackbots
Aug 19 12:00:51 pkdns2 sshd\[15303\]: Failed password for root from 45.6.18.65 port 40907 ssh2Aug 19 12:03:05 pkdns2 sshd\[15401\]: Invalid user foobar from 45.6.18.65Aug 19 12:03:07 pkdns2 sshd\[15401\]: Failed password for invalid user foobar from 45.6.18.65 port 55698 ssh2Aug 19 12:05:22 pkdns2 sshd\[15517\]: Invalid user uki from 45.6.18.65Aug 19 12:05:24 pkdns2 sshd\[15517\]: Failed password for invalid user uki from 45.6.18.65 port 13992 ssh2Aug 19 12:07:33 pkdns2 sshd\[15577\]: Invalid user cd from 45.6.18.65
...
2020-08-19 17:24:13
110.49.70.247 attackspam
Aug 19 05:38:00 firewall sshd[28427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.247
Aug 19 05:38:00 firewall sshd[28427]: Invalid user cod4 from 110.49.70.247
Aug 19 05:38:02 firewall sshd[28427]: Failed password for invalid user cod4 from 110.49.70.247 port 19458 ssh2
...
2020-08-19 17:22:43
180.168.120.90 attackspambots
email spam from: 
2020-08-19 17:11:41
112.119.28.92 attackbotsspam
Invalid user osboxes from 112.119.28.92 port 34228
2020-08-19 17:25:17

最近上报的IP列表

66.70.168.102 67.205.183.14 67.209.249.122 67.43.227.162
68.183.104.14 68.183.238.243 68.183.104.160 68.183.83.13
68.66.233.20 68.183.82.209 68.66.240.189 68.183.34.242
69.112.255.20 69.30.229.68 68.183.83.208 69.155.105.98
69.30.199.122 69.202.165.191 69.30.240.27 69.30.230.62