必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.91.83.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46258
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.91.83.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 00:32:06 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
68.83.91.108.in-addr.arpa domain name pointer 108-91-83-68.lightspeed.cicril.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.83.91.108.in-addr.arpa	name = 108-91-83-68.lightspeed.cicril.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.167.193.151 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-28 06:31:08
78.128.113.88 attackbots
Jan 27 23:21:08 vmanager6029 postfix/smtpd\[23154\]: warning: unknown\[78.128.113.88\]: SASL PLAIN authentication failed:
Jan 27 23:21:15 vmanager6029 postfix/smtpd\[23154\]: warning: unknown\[78.128.113.88\]: SASL PLAIN authentication failed:
2020-01-28 06:49:11
91.225.201.142 attack
2019-01-30 19:51:01 H=\(\[91.225.201.142\]\) \[91.225.201.142\]:48484 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-01-30 19:51:59 H=\(\[91.225.201.142\]\) \[91.225.201.142\]:48717 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-01-30 19:52:39 H=\(\[91.225.201.142\]\) \[91.225.201.142\]:48551 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-28 07:03:06
138.197.73.215 attackspam
Unauthorized connection attempt detected from IP address 138.197.73.215 to port 2220 [J]
2020-01-28 07:02:07
106.54.139.117 attackbots
Unauthorized connection attempt detected from IP address 106.54.139.117 to port 2220 [J]
2020-01-28 06:37:31
138.197.78.121 attackbotsspam
Aug 14 15:58:14 dallas01 sshd[23094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.78.121
Aug 14 15:58:17 dallas01 sshd[23094]: Failed password for invalid user debian from 138.197.78.121 port 50892 ssh2
Aug 14 16:02:57 dallas01 sshd[24715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.78.121
Aug 14 16:02:59 dallas01 sshd[24715]: Failed password for invalid user product from 138.197.78.121 port 43884 ssh2
2020-01-28 06:54:11
45.72.220.247 attackbots
Honeypot attack, port: 5555, PTR: 45-72-220-247.cpe.teksavvy.com.
2020-01-28 07:04:55
43.228.130.66 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-28 06:38:07
83.97.20.46 attack
Jan 27 22:54:20 h2177944 kernel: \[3360288.849955\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=83.97.20.46 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=45775 DPT=6664 WINDOW=65535 RES=0x00 SYN URGP=0 
Jan 27 22:54:20 h2177944 kernel: \[3360288.849970\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=83.97.20.46 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=45775 DPT=6664 WINDOW=65535 RES=0x00 SYN URGP=0 
Jan 27 23:14:28 h2177944 kernel: \[3361496.657197\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=83.97.20.46 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=46556 DPT=28017 WINDOW=65535 RES=0x00 SYN URGP=0 
Jan 27 23:14:28 h2177944 kernel: \[3361496.657211\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=83.97.20.46 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=46556 DPT=28017 WINDOW=65535 RES=0x00 SYN URGP=0 
Jan 27 23:47:35 h2177944 kernel: \[3363483.496270\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=83.97.20.46 DST=85.214.117.9 LEN
2020-01-28 07:04:30
220.133.25.95 attackbots
Unauthorised access (Jan 27) SRC=220.133.25.95 LEN=44 TTL=234 ID=5959 TCP DPT=445 WINDOW=1024 SYN
2020-01-28 06:42:19
91.225.198.12 attackspambots
2019-06-22 12:39:48 1hedQy-0002c0-0x SMTP connection from \(\[91.225.198.12\]\) \[91.225.198.12\]:41950 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 12:39:57 1hedR7-0002c3-48 SMTP connection from \(\[91.225.198.12\]\) \[91.225.198.12\]:42082 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 12:40:02 1hedRC-0002di-7U SMTP connection from \(\[91.225.198.12\]\) \[91.225.198.12\]:42139 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 07:03:57
91.226.243.139 attackspambots
2019-03-15 18:44:22 H=\(\[91.226.243.140\]\) \[91.226.243.139\]:41324 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-15 18:44:54 H=\(\[91.226.243.140\]\) \[91.226.243.139\]:41577 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-15 18:45:10 H=\(\[91.226.243.140\]\) \[91.226.243.139\]:41738 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-28 07:02:48
204.48.29.202 attack
Unauthorized connection attempt detected from IP address 204.48.29.202 to port 6379 [J]
2020-01-28 06:56:42
91.224.252.224 attackbots
2019-03-21 23:13:54 1h75wg-0001Vk-NV SMTP connection from \(\[91.224.252.224\]\) \[91.224.252.224\]:22463 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-21 23:14:14 1h75x0-0001WX-B0 SMTP connection from \(\[91.224.252.224\]\) \[91.224.252.224\]:22528 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-21 23:14:25 1h75xA-0001Wg-Lz SMTP connection from \(\[91.224.252.224\]\) \[91.224.252.224\]:22587 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 07:06:11
190.202.124.107 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-28 06:59:45

最近上报的IP列表

14.57.133.221 144.36.145.74 236.60.65.22 191.84.146.214
228.47.42.1 42.56.121.220 204.170.189.14 66.131.183.195
145.114.167.248 123.125.186.135 255.82.230.35 251.89.114.182
96.151.227.237 206.237.251.6 48.167.114.128 95.173.27.0
204.253.83.89 206.161.184.13 172.149.97.134 140.24.116.239