必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Ukraine

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.203.140.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15745
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.203.140.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:28:18 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
66.140.203.91.in-addr.arpa domain name pointer 91-203-140-66-nat.retail.vinertelecom.ua.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.140.203.91.in-addr.arpa	name = 91-203-140-66-nat.retail.vinertelecom.ua.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.176.57.51 attack
Aug 26 01:30:49 tuxlinux sshd[4824]: Invalid user jj from 122.176.57.51 port 41100
Aug 26 01:30:49 tuxlinux sshd[4824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.57.51 
Aug 26 01:30:49 tuxlinux sshd[4824]: Invalid user jj from 122.176.57.51 port 41100
Aug 26 01:30:49 tuxlinux sshd[4824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.57.51 
Aug 26 01:30:49 tuxlinux sshd[4824]: Invalid user jj from 122.176.57.51 port 41100
Aug 26 01:30:49 tuxlinux sshd[4824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.57.51 
Aug 26 01:30:51 tuxlinux sshd[4824]: Failed password for invalid user jj from 122.176.57.51 port 41100 ssh2
...
2019-08-26 08:46:47
142.93.198.86 attackbotsspam
2019-08-26T00:20:26.417104abusebot-4.cloudsearch.cf sshd\[9550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.86  user=root
2019-08-26 08:54:37
178.128.195.6 attack
$f2bV_matches
2019-08-26 08:40:04
104.223.67.231 attackspambots
1,26-03/03 [bc02/m49] concatform PostRequest-Spammer scoring: Dodoma
2019-08-26 08:21:55
121.200.55.37 attack
$f2bV_matches
2019-08-26 08:22:58
87.196.190.173 attackspam
Aug 26 00:45:44 www sshd\[183046\]: Invalid user onie from 87.196.190.173
Aug 26 00:45:44 www sshd\[183046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.196.190.173
Aug 26 00:45:46 www sshd\[183046\]: Failed password for invalid user onie from 87.196.190.173 port 41339 ssh2
...
2019-08-26 08:48:38
124.204.36.138 attackspam
Aug 25 20:08:09 vtv3 sshd\[8003\]: Invalid user anonymous. from 124.204.36.138 port 32607
Aug 25 20:08:09 vtv3 sshd\[8003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.36.138
Aug 25 20:08:11 vtv3 sshd\[8003\]: Failed password for invalid user anonymous. from 124.204.36.138 port 32607 ssh2
Aug 25 20:13:34 vtv3 sshd\[10527\]: Invalid user 1234qwer from 124.204.36.138 port 51540
Aug 25 20:13:34 vtv3 sshd\[10527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.36.138
Aug 25 20:23:57 vtv3 sshd\[15673\]: Invalid user password123 from 124.204.36.138 port 24703
Aug 25 20:23:57 vtv3 sshd\[15673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.36.138
Aug 25 20:23:59 vtv3 sshd\[15673\]: Failed password for invalid user password123 from 124.204.36.138 port 24703 ssh2
Aug 25 20:29:08 vtv3 sshd\[18158\]: Invalid user rpcuser123 from 124.204.36.138 port 43509
Aug 2
2019-08-26 08:31:20
109.251.248.90 attack
WordPress login Brute force / Web App Attack on client site.
2019-08-26 08:27:18
41.35.228.39 attackbots
Aug 25 20:44:58 mail sshd\[20486\]: Invalid user admin from 41.35.228.39
Aug 25 20:44:58 mail sshd\[20486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.35.228.39
Aug 25 20:45:00 mail sshd\[20486\]: Failed password for invalid user admin from 41.35.228.39 port 58960 ssh2
...
2019-08-26 08:32:41
177.16.83.195 attackspambots
Aug 26 02:52:22 vps647732 sshd[2987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.16.83.195
Aug 26 02:52:24 vps647732 sshd[2987]: Failed password for invalid user userftp from 177.16.83.195 port 55438 ssh2
...
2019-08-26 08:53:27
190.196.60.203 attackspambots
6 failed attempt(s) in the last 24h
2019-08-26 08:37:13
134.209.104.205 attack
Lines containing failures of 134.209.104.205
Aug 24 04:04:03 shared03 sshd[14268]: Invalid user programmer from 134.209.104.205 port 41632
Aug 24 04:04:03 shared03 sshd[14268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.104.205
Aug 24 04:04:05 shared03 sshd[14268]: Failed password for invalid user programmer from 134.209.104.205 port 41632 ssh2
Aug 24 04:04:05 shared03 sshd[14268]: Received disconnect from 134.209.104.205 port 41632:11: Bye Bye [preauth]
Aug 24 04:04:05 shared03 sshd[14268]: Disconnected from invalid user programmer 134.209.104.205 port 41632 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.209.104.205
2019-08-26 08:51:11
81.215.197.226 attack
Automatic report - Port Scan Attack
2019-08-26 08:20:15
159.65.219.48 attackbots
Aug 26 02:35:59 OPSO sshd\[17324\]: Invalid user update from 159.65.219.48 port 49084
Aug 26 02:35:59 OPSO sshd\[17324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.48
Aug 26 02:36:01 OPSO sshd\[17324\]: Failed password for invalid user update from 159.65.219.48 port 49084 ssh2
Aug 26 02:40:35 OPSO sshd\[18159\]: Invalid user odoo from 159.65.219.48 port 41148
Aug 26 02:40:35 OPSO sshd\[18159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.219.48
2019-08-26 08:48:20
73.2.139.100 attackspam
Aug 25 21:57:29 plex sshd[29287]: Invalid user fabercastell from 73.2.139.100 port 48826
2019-08-26 08:35:15

最近上报的IP列表

159.193.205.190 137.113.56.101 123.130.111.65 147.213.224.58
210.143.43.183 236.19.185.53 195.6.253.220 207.178.241.248
59.255.37.123 16.189.67.47 184.156.168.167 141.85.176.37
244.11.173.158 242.137.206.179 143.160.168.144 118.43.224.100
17.38.118.85 240.160.137.230 76.220.247.146 94.141.26.71