必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Athens

省份(region): Attiki

国家(country): Greece

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.66.136.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.66.136.22.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023082200 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 23 04:50:35 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
22.136.66.94.in-addr.arpa domain name pointer ppp-94-66-136-22.home.otenet.gr.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.136.66.94.in-addr.arpa	name = ppp-94-66-136-22.home.otenet.gr.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
211.57.153.250 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-06-13 03:38:49
103.80.36.34 attackspam
Jun 12 19:28:09 * sshd[4101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.36.34
Jun 12 19:28:12 * sshd[4101]: Failed password for invalid user ubnt from 103.80.36.34 port 51028 ssh2
2020-06-13 03:59:21
51.89.191.208 attack
Unauthorized connection attempt from IP address 51.89.191.208 on Port 445(SMB)
2020-06-13 03:30:36
109.123.117.241 attack
Attempted connection to port 7443.
2020-06-13 03:53:34
5.63.151.123 attackspambots
Attempted connection to port 4343.
2020-06-13 03:36:22
220.132.189.173 attackspam
Attempted connection to port 8080.
2020-06-13 03:42:10
45.229.100.20 attack
Unauthorized connection attempt from IP address 45.229.100.20 on Port 445(SMB)
2020-06-13 04:00:14
128.199.84.201 attackbots
Jun 12 11:49:21 propaganda sshd[20418]: Connection from 128.199.84.201 port 39988 on 10.0.0.160 port 22 rdomain ""
Jun 12 11:49:21 propaganda sshd[20418]: Connection closed by 128.199.84.201 port 39988 [preauth]
2020-06-13 03:58:42
77.237.87.208 attack
Unauthorized connection attempt from IP address 77.237.87.208 on Port 445(SMB)
2020-06-13 04:00:25
186.154.89.130 attackbotsspam
Unauthorized connection attempt from IP address 186.154.89.130 on Port 445(SMB)
2020-06-13 03:31:05
71.6.233.162 attackspambots
Attempted connection to port 49152.
2020-06-13 03:31:21
52.170.157.176 attack
WordPress XMLRPC scan :: 52.170.157.176 0.096 - [12/Jun/2020:16:57:40  0000] www.[censored_1] "POST //xmlrpc.php HTTP/1.1" 200 217 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36" "HTTP/1.1"
2020-06-13 03:34:51
109.123.117.244 attackspam
Attempted connection to port 9001.
2020-06-13 03:51:49
189.62.69.106 attackspam
Jun 12 19:20:21 abendstille sshd\[29674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.62.69.106  user=root
Jun 12 19:20:22 abendstille sshd\[29674\]: Failed password for root from 189.62.69.106 port 41917 ssh2
Jun 12 19:25:14 abendstille sshd\[1856\]: Invalid user postgres from 189.62.69.106
Jun 12 19:25:14 abendstille sshd\[1856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.62.69.106
Jun 12 19:25:16 abendstille sshd\[1856\]: Failed password for invalid user postgres from 189.62.69.106 port 40175 ssh2
...
2020-06-13 04:00:54
117.121.215.101 attackspambots
Jun 11 21:52:46 durga sshd[772620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.215.101  user=r.r
Jun 11 21:52:48 durga sshd[772620]: Failed password for r.r from 117.121.215.101 port 33450 ssh2
Jun 11 21:52:48 durga sshd[772620]: Received disconnect from 117.121.215.101: 11: Bye Bye [preauth]
Jun 11 22:04:37 durga sshd[775359]: Invalid user fregie2 from 117.121.215.101
Jun 11 22:04:37 durga sshd[775359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.215.101 
Jun 11 22:04:39 durga sshd[775359]: Failed password for invalid user fregie2 from 117.121.215.101 port 57206 ssh2
Jun 11 22:04:39 durga sshd[775359]: Received disconnect from 117.121.215.101: 11: Bye Bye [preauth]
Jun 11 22:07:23 durga sshd[776134]: Invalid user amor from 117.121.215.101
Jun 11 22:07:23 durga sshd[776134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.1........
-------------------------------
2020-06-13 03:37:44

最近上报的IP列表

188.242.82.194 202.116.85.146 158.42.2.75 44.152.3.192
210.78.90.46 120.29.117.187 134.94.220.25 189.215.80.170
244.231.197.225 178.104.153.4 220.191.107.172 73.131.33.184
180.241.240.43 103.43.19.38 178.191.36.73 189.213.147.63
189.218.7.32 189.218.7.54 84.171.25.6 49.97.71.197