必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Portugal

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.48.100.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56138
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.48.100.68.			IN	A

;; AUTHORITY SECTION:
.			350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062901 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 30 02:37:50 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
68.100.48.109.in-addr.arpa domain name pointer a109-48-100-68.cpe.netcabo.pt.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.100.48.109.in-addr.arpa	name = a109-48-100-68.cpe.netcabo.pt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.161 attackbotsspam
Fail2Ban - SSH Bruteforce Attempt
2019-12-05 16:44:56
80.211.205.227 attack
Dec  5 09:50:04 meumeu sshd[32309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.205.227 
Dec  5 09:50:06 meumeu sshd[32309]: Failed password for invalid user chuen-ch from 80.211.205.227 port 54728 ssh2
Dec  5 09:55:32 meumeu sshd[702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.205.227 
...
2019-12-05 16:59:14
152.32.98.154 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-12-05 17:17:12
182.242.104.23 attackspam
Automatic report - Web App Attack
2019-12-05 17:07:55
211.151.95.139 attackspambots
Dec  5 04:03:30 TORMINT sshd\[5485\]: Invalid user miw from 211.151.95.139
Dec  5 04:03:30 TORMINT sshd\[5485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.151.95.139
Dec  5 04:03:31 TORMINT sshd\[5485\]: Failed password for invalid user miw from 211.151.95.139 port 40174 ssh2
...
2019-12-05 17:13:13
139.59.56.121 attackbotsspam
Dec  5 03:29:38 ws22vmsma01 sshd[219311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121
Dec  5 03:29:40 ws22vmsma01 sshd[219311]: Failed password for invalid user zimbra from 139.59.56.121 port 50586 ssh2
...
2019-12-05 16:49:49
125.16.97.246 attack
Dec  5 14:17:24 vibhu-HP-Z238-Microtower-Workstation sshd\[27084\]: Invalid user wennevold from 125.16.97.246
Dec  5 14:17:24 vibhu-HP-Z238-Microtower-Workstation sshd\[27084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.97.246
Dec  5 14:17:26 vibhu-HP-Z238-Microtower-Workstation sshd\[27084\]: Failed password for invalid user wennevold from 125.16.97.246 port 58410 ssh2
Dec  5 14:25:34 vibhu-HP-Z238-Microtower-Workstation sshd\[27595\]: Invalid user lobenz from 125.16.97.246
Dec  5 14:25:34 vibhu-HP-Z238-Microtower-Workstation sshd\[27595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.97.246
...
2019-12-05 17:06:11
223.207.249.150 attack
IP blocked
2019-12-05 17:19:59
106.54.20.26 attack
Dec  4 22:44:09 kapalua sshd\[3803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.20.26  user=sshd
Dec  4 22:44:11 kapalua sshd\[3803\]: Failed password for sshd from 106.54.20.26 port 51006 ssh2
Dec  4 22:50:43 kapalua sshd\[4405\]: Invalid user server from 106.54.20.26
Dec  4 22:50:43 kapalua sshd\[4405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.20.26
Dec  4 22:50:45 kapalua sshd\[4405\]: Failed password for invalid user server from 106.54.20.26 port 55670 ssh2
2019-12-05 17:16:17
118.24.33.38 attackbotsspam
Dec  5 08:12:25 pi sshd\[29530\]: Failed password for invalid user search from 118.24.33.38 port 50102 ssh2
Dec  5 08:20:51 pi sshd\[29960\]: Invalid user guest from 118.24.33.38 port 55874
Dec  5 08:20:51 pi sshd\[29960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.33.38
Dec  5 08:20:53 pi sshd\[29960\]: Failed password for invalid user guest from 118.24.33.38 port 55874 ssh2
Dec  5 08:27:51 pi sshd\[30300\]: Invalid user nfs from 118.24.33.38 port 33338
...
2019-12-05 17:21:12
91.135.194.22 attack
Attempts against Pop3/IMAP
2019-12-05 17:01:22
49.235.240.21 attackbotsspam
Dec  5 09:37:31 MK-Soft-VM6 sshd[8400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.240.21 
Dec  5 09:37:33 MK-Soft-VM6 sshd[8400]: Failed password for invalid user kapeckas from 49.235.240.21 port 44704 ssh2
...
2019-12-05 17:10:24
101.127.109.218 attackspambots
Port Scan
2019-12-05 17:09:57
218.92.0.158 attack
2019-12-05T09:04:34.773296hub.schaetter.us sshd\[13724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
2019-12-05T09:04:36.842835hub.schaetter.us sshd\[13724\]: Failed password for root from 218.92.0.158 port 23861 ssh2
2019-12-05T09:04:40.005541hub.schaetter.us sshd\[13724\]: Failed password for root from 218.92.0.158 port 23861 ssh2
2019-12-05T09:04:43.579322hub.schaetter.us sshd\[13724\]: Failed password for root from 218.92.0.158 port 23861 ssh2
2019-12-05T09:04:46.896501hub.schaetter.us sshd\[13724\]: Failed password for root from 218.92.0.158 port 23861 ssh2
...
2019-12-05 17:09:06
134.175.36.138 attackbots
$f2bV_matches
2019-12-05 16:57:42

最近上报的IP列表

45.224.43.49 106.105.91.70 121.159.101.98 36.238.145.226
121.164.13.229 118.44.46.95 116.126.14.11 106.51.158.56
24.179.34.107 104.160.19.73 73.211.69.218 49.49.25.209
88.109.125.62 221.160.220.242 122.115.225.106 71.196.3.65
125.228.216.166 88.250.250.165 217.95.133.247 210.137.22.59