必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.66.195.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27260
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.66.195.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 21:46:32 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
150.195.66.93.in-addr.arpa domain name pointer net-93-66-195-150.cust.vodafonedsl.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.195.66.93.in-addr.arpa	name = net-93-66-195-150.cust.vodafonedsl.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.114.113.141 attack
Unauthorized connection attempt detected from IP address 167.114.113.141 to port 2220 [J]
2020-01-14 07:41:01
179.186.29.52 attackbots
Automatic report - Port Scan Attack
2020-01-14 07:44:59
103.94.217.214 attack
Unauthorized connection attempt detected from IP address 103.94.217.214 to port 2220 [J]
2020-01-14 07:48:49
46.99.67.5 attackbotsspam
Jan 13 22:21:11 linuxrulz sshd[18941]: Invalid user user from 46.99.67.5 port 42247
Jan 13 22:21:11 linuxrulz sshd[18941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.99.67.5
Jan 13 22:21:14 linuxrulz sshd[18941]: Failed password for invalid user user from 46.99.67.5 port 42247 ssh2
Jan 13 22:21:14 linuxrulz sshd[18941]: Connection closed by 46.99.67.5 port 42247 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.99.67.5
2020-01-14 08:01:46
222.186.15.10 attackspambots
Brute-force attempt banned
2020-01-14 07:41:17
212.64.54.49 attack
Unauthorized connection attempt detected from IP address 212.64.54.49 to port 2220 [J]
2020-01-14 07:38:18
222.186.30.248 attackspambots
Jan 14 01:43:19 server2 sshd\[21588\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Jan 14 01:43:19 server2 sshd\[21592\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Jan 14 01:49:28 server2 sshd\[21968\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Jan 14 01:49:28 server2 sshd\[21970\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Jan 14 01:49:29 server2 sshd\[21972\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
Jan 14 01:49:29 server2 sshd\[21973\]: User root from 222.186.30.248 not allowed because not listed in AllowUsers
2020-01-14 07:56:23
196.196.50.212 attackspam
Registration form abuse
2020-01-14 07:32:38
14.191.128.209 attack
...
2020-01-14 07:43:43
2409:4055:504:856d:4804:44b2:fabb:a470 attackbots
/?__cf_chl_captcha_tk__=6c6db5d02f15c38780f70d81c78c2c1c656cd593-1578903446-0-AYRZ5Wz23QbCLTx7q_v3Sn9Nj1VUSxYOUdnEFS0xlZ5x_tobVTvavhnRx6n-z7KEtjKr_TdGWbmETWnhCjABt6ZAhP8D_vsKfk9zOQ6lZWqIUtcoaDh8_JyCg2AAsxF_ZYYedT1urkJ6P6T6_Oee5TFSFVVsIH_cd2EdlSB8ty9EI5wbpoORP8Tx-jRCoTW2NK0rI9TCntCQ1b-90HXlle_Xk1MZ7GDpvWbqVxYp-wUspp_WLRq6qWZo33ACRt2y68tOqRSnSbOrUeLNSY_cB-Fq6pVfnq3DzcBu9EpGmq-maadhBHXbqAF-PQqZ1vyBsuAbnsy8A8KTqiTZsSHCSClSwiX-fz7ZazGHrESHiC4U
2020-01-14 07:55:35
200.229.239.226 attack
Jan 13 23:58:56 master sshd[30590]: Failed password for invalid user qa from 200.229.239.226 port 55175 ssh2
Jan 14 00:19:59 master sshd[31086]: Failed password for invalid user user from 200.229.239.226 port 55971 ssh2
Jan 14 00:24:09 master sshd[31118]: Failed password for invalid user none from 200.229.239.226 port 43213 ssh2
Jan 14 00:27:50 master sshd[31146]: Failed password for root from 200.229.239.226 port 58662 ssh2
Jan 14 00:31:22 master sshd[31497]: Failed password for invalid user spamfilter from 200.229.239.226 port 45875 ssh2
Jan 14 00:35:01 master sshd[31527]: Failed password for invalid user starbound from 200.229.239.226 port 33077 ssh2
Jan 14 00:38:44 master sshd[32128]: Failed password for invalid user test from 200.229.239.226 port 48518 ssh2
2020-01-14 07:38:50
168.232.158.30 attackspam
$f2bV_matches
2020-01-14 07:48:04
1.6.114.75 attack
Jan 13 21:20:37 raspberrypi sshd\[24023\]: Failed password for root from 1.6.114.75 port 53230 ssh2Jan 13 21:21:58 raspberrypi sshd\[24052\]: Invalid user maneesh from 1.6.114.75Jan 13 21:22:01 raspberrypi sshd\[24052\]: Failed password for invalid user maneesh from 1.6.114.75 port 36018 ssh2
...
2020-01-14 07:43:55
118.25.101.161 attack
2020-01-13T23:42:07.556643shield sshd\[16587\]: Invalid user li from 118.25.101.161 port 54546
2020-01-13T23:42:07.564681shield sshd\[16587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.101.161
2020-01-13T23:42:10.032664shield sshd\[16587\]: Failed password for invalid user li from 118.25.101.161 port 54546 ssh2
2020-01-13T23:45:34.148326shield sshd\[17646\]: Invalid user ftptest from 118.25.101.161 port 54842
2020-01-13T23:45:34.155125shield sshd\[17646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.101.161
2020-01-14 07:51:57
123.20.6.18 attackspam
Jan 13 22:13:14 pl2server sshd[28280]: Invalid user admin from 123.20.6.18
Jan 13 22:13:14 pl2server sshd[28280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.20.6.18
Jan 13 22:13:15 pl2server sshd[28280]: Failed password for invalid user admin from 123.20.6.18 port 45257 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.20.6.18
2020-01-14 07:34:50

最近上报的IP列表

4.68.249.46 124.92.224.16 53.173.25.67 174.155.161.78
134.35.249.237 128.153.170.207 23.216.187.244 177.62.94.46
216.251.76.133 133.193.85.200 209.7.151.67 207.135.232.146
164.124.5.218 8.124.82.210 51.227.126.68 221.171.189.125
134.72.35.37 177.45.25.166 226.164.94.230 17.163.81.84