必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.45.104.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.45.104.68.			IN	A

;; AUTHORITY SECTION:
.			492	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 05:39:36 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 68.104.45.0.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.104.45.0.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.102.49.190 attack
scan z
2019-08-04 17:23:53
177.38.3.232 attackspambots
failed_logins
2019-08-04 17:13:20
138.197.151.248 attackspambots
Aug  4 02:54:21 xtremcommunity sshd\[32354\]: Invalid user aric from 138.197.151.248 port 60510
Aug  4 02:54:21 xtremcommunity sshd\[32354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.248
Aug  4 02:54:23 xtremcommunity sshd\[32354\]: Failed password for invalid user aric from 138.197.151.248 port 60510 ssh2
Aug  4 02:59:30 xtremcommunity sshd\[32483\]: Invalid user hadoop from 138.197.151.248 port 56844
Aug  4 02:59:30 xtremcommunity sshd\[32483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.248
...
2019-08-04 17:25:18
165.22.72.226 attackbotsspam
2019-08-04T10:32:19.714307lon01.zurich-datacenter.net sshd\[31690\]: Invalid user long from 165.22.72.226 port 53698
2019-08-04T10:32:19.719834lon01.zurich-datacenter.net sshd\[31690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.72.226
2019-08-04T10:32:21.344418lon01.zurich-datacenter.net sshd\[31690\]: Failed password for invalid user long from 165.22.72.226 port 53698 ssh2
2019-08-04T10:32:22.367425lon01.zurich-datacenter.net sshd\[31692\]: Invalid user long from 165.22.72.226 port 54834
2019-08-04T10:32:22.372508lon01.zurich-datacenter.net sshd\[31692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.72.226
...
2019-08-04 17:18:30
142.93.195.189 attack
Aug  4 00:42:02 XXX sshd[33851]: Invalid user hadoop from 142.93.195.189 port 40132
2019-08-04 17:36:46
128.199.53.39 attack
Mar  5 08:26:14 motanud sshd\[20126\]: Invalid user nw from 128.199.53.39 port 47572
Mar  5 08:26:14 motanud sshd\[20126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.53.39
Mar  5 08:26:16 motanud sshd\[20126\]: Failed password for invalid user nw from 128.199.53.39 port 47572 ssh2
2019-08-04 17:08:01
202.51.74.92 attackbotsspam
xmlrpc attack
2019-08-04 17:39:30
128.199.95.223 attackbotsspam
Jan 13 07:07:32 motanud sshd\[10549\]: Invalid user linker from 128.199.95.223 port 39938
Jan 13 07:07:32 motanud sshd\[10549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.223
Jan 13 07:07:33 motanud sshd\[10549\]: Failed password for invalid user linker from 128.199.95.223 port 39938 ssh2
2019-08-04 16:57:41
128.199.51.154 attackbots
Dec 20 21:35:20 motanud sshd\[25498\]: Invalid user user from 128.199.51.154 port 52872
Dec 20 21:35:20 motanud sshd\[25498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.51.154
Dec 20 21:35:22 motanud sshd\[25498\]: Failed password for invalid user user from 128.199.51.154 port 52872 ssh2
2019-08-04 17:12:11
51.254.34.87 attack
Aug  4 07:01:18 eventyay sshd[17732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.34.87
Aug  4 07:01:20 eventyay sshd[17732]: Failed password for invalid user nokia from 51.254.34.87 port 42324 ssh2
Aug  4 07:06:30 eventyay sshd[18967]: Failed password for root from 51.254.34.87 port 37078 ssh2
...
2019-08-04 17:27:21
128.199.154.237 attackspambots
blacklist username alexk
Invalid user alexk from 128.199.154.237 port 39466
2019-08-04 16:53:43
113.185.19.242 attackbotsspam
Aug  4 03:38:29 vps691689 sshd[11263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.185.19.242
Aug  4 03:38:31 vps691689 sshd[11263]: Failed password for invalid user suser from 113.185.19.242 port 54389 ssh2
...
2019-08-04 17:43:49
185.230.127.239 attackspambots
Invalid user hduser from 185.230.127.239 port 36013
2019-08-04 16:52:22
54.37.68.66 attackbotsspam
k+ssh-bruteforce
2019-08-04 17:17:35
143.0.58.173 attackspam
Aug  4 04:51:16 xeon sshd[3673]: Failed password for invalid user ndoe from 143.0.58.173 port 20094 ssh2
2019-08-04 17:11:46

最近上报的IP列表

0.44.246.156 0.49.231.234 0.46.12.210 0.41.95.210
0.45.195.43 0.50.210.150 0.47.212.64 0.49.24.70
0.42.161.123 0.45.32.127 0.42.45.30 0.45.194.182
0.45.146.48 0.40.89.124 0.40.219.143 1.12.175.221
0.43.138.206 0.45.103.192 1.12.208.173 0.50.190.63