必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Russian Federation

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.68.191.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.68.191.165.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052100 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 21 20:10:06 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
165.191.68.109.in-addr.arpa domain name pointer mgnhost.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
165.191.68.109.in-addr.arpa	name = mgnhost.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.26.201.99 attackbotsspam
Jul 16 12:47:19 garuda postfix/smtpd[8703]: connect from unknown[27.26.201.99]
Jul 16 12:47:20 garuda postfix/smtpd[8704]: connect from unknown[27.26.201.99]
Jul 16 12:47:21 garuda postfix/smtpd[8704]: warning: unknown[27.26.201.99]: SASL LOGIN authentication failed: authentication failure
Jul 16 12:47:22 garuda postfix/smtpd[8704]: lost connection after AUTH from unknown[27.26.201.99]
Jul 16 12:47:22 garuda postfix/smtpd[8704]: disconnect from unknown[27.26.201.99] ehlo=1 auth=0/1 commands=1/2
Jul 16 12:47:22 garuda postfix/smtpd[8700]: connect from unknown[27.26.201.99]
Jul 16 12:47:24 garuda postfix/smtpd[8700]: warning: unknown[27.26.201.99]: SASL LOGIN authentication failed: authentication failure
Jul 16 12:47:24 garuda postfix/smtpd[8700]: lost connection after AUTH from unknown[27.26.201.99]
Jul 16 12:47:24 garuda postfix/smtpd[8700]: disconnect from unknown[27.26.201.99] ehlo=1 auth=0/1 commands=1/2
Jul 16 12:47:24 garuda postfix/smtpd[8704]: connect from unknow........
-------------------------------
2019-07-16 23:53:56
182.72.104.106 attack
Jul 16 17:37:01 meumeu sshd[20088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.104.106 
Jul 16 17:37:03 meumeu sshd[20088]: Failed password for invalid user carolina from 182.72.104.106 port 36452 ssh2
Jul 16 17:43:31 meumeu sshd[21229]: Failed password for root from 182.72.104.106 port 33528 ssh2
...
2019-07-16 23:47:33
77.247.110.216 attackbots
$f2bV_matches
2019-07-17 00:19:14
218.92.0.198 attack
2019-07-16T12:43:47.450841abusebot-8.cloudsearch.cf sshd\[11122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.198  user=root
2019-07-17 00:23:30
101.68.81.66 attack
2019-07-16T15:32:44.226192abusebot.cloudsearch.cf sshd\[5497\]: Invalid user cms from 101.68.81.66 port 49338
2019-07-17 00:02:08
60.167.116.110 attackspambots
abuse-sasl
2019-07-17 00:34:28
119.11.217.42 attackbots
Jul 16 12:43:40 server sshd[41590]: Failed password for invalid user jenkins from 119.11.217.42 port 35961 ssh2
Jul 16 12:59:38 server sshd[45202]: Failed password for invalid user ek from 119.11.217.42 port 51454 ssh2
Jul 16 13:09:45 server sshd[47662]: Failed password for invalid user ra from 119.11.217.42 port 51297 ssh2
2019-07-16 23:56:56
139.162.6.61 attackbotsspam
Jul 16 12:28:29 h2034429 sshd[14428]: Invalid user media from 139.162.6.61
Jul 16 12:28:29 h2034429 sshd[14428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.6.61
Jul 16 12:28:31 h2034429 sshd[14428]: Failed password for invalid user media from 139.162.6.61 port 36788 ssh2
Jul 16 12:28:31 h2034429 sshd[14428]: Received disconnect from 139.162.6.61 port 36788:11: Bye Bye [preauth]
Jul 16 12:28:31 h2034429 sshd[14428]: Disconnected from 139.162.6.61 port 36788 [preauth]
Jul 16 12:41:25 h2034429 sshd[14700]: Invalid user user from 139.162.6.61
Jul 16 12:41:25 h2034429 sshd[14700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.6.61
Jul 16 12:41:28 h2034429 sshd[14700]: Failed password for invalid user user from 139.162.6.61 port 59886 ssh2
Jul 16 12:41:28 h2034429 sshd[14700]: Received disconnect from 139.162.6.61 port 59886:11: Bye Bye [preauth]
Jul 16 12:41:28 h2034429 ssh........
-------------------------------
2019-07-16 23:49:55
60.167.112.136 attack
abuse-sasl
2019-07-17 00:51:38
106.12.121.40 attackspam
Jul 16 07:54:37 vps200512 sshd\[1919\]: Invalid user test from 106.12.121.40
Jul 16 07:54:37 vps200512 sshd\[1919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.121.40
Jul 16 07:54:39 vps200512 sshd\[1919\]: Failed password for invalid user test from 106.12.121.40 port 58894 ssh2
Jul 16 07:58:39 vps200512 sshd\[2004\]: Invalid user oracle from 106.12.121.40
Jul 16 07:58:39 vps200512 sshd\[2004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.121.40
2019-07-16 23:52:47
71.177.88.17 attackspam
POP
2019-07-17 00:14:21
104.248.29.180 attackspam
Jul 16 17:28:04 rpi sshd[32072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.29.180 
Jul 16 17:28:06 rpi sshd[32072]: Failed password for invalid user testuser from 104.248.29.180 port 49848 ssh2
2019-07-16 23:53:15
185.216.132.15 attackspambots
Jul 16 15:54:57 sshgateway sshd\[13148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.132.15  user=root
Jul 16 15:55:00 sshgateway sshd\[13148\]: Failed password for root from 185.216.132.15 port 18363 ssh2
Jul 16 15:55:00 sshgateway sshd\[13150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.132.15  user=root
2019-07-17 00:27:38
49.69.126.194 attackbotsspam
Jul 16 13:01:58 fv15 sshd[8082]: Bad protocol version identification '' from 49.69.126.194 port 54927
Jul 16 13:02:04 fv15 sshd[8107]: Failed password for invalid user NetLinx from 49.69.126.194 port 55199 ssh2
Jul 16 13:02:04 fv15 sshd[8107]: Connection closed by 49.69.126.194 [preauth]
Jul 16 13:02:09 fv15 sshd[9744]: Failed password for invalid user netscreen from 49.69.126.194 port 56172 ssh2
Jul 16 13:02:09 fv15 sshd[9744]: Connection closed by 49.69.126.194 [preauth]
Jul 16 13:02:13 fv15 sshd[11263]: Failed password for invalid user nexthink from 49.69.126.194 port 56965 ssh2
Jul 16 13:02:14 fv15 sshd[11263]: Connection closed by 49.69.126.194 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.69.126.194
2019-07-17 00:37:12
193.56.28.45 attackspambots
193.56.28.45 has been banned for [spam]
...
2019-07-17 00:48:02

最近上报的IP列表

109.68.190.212 109.68.204.40 109.68.212.168 109.68.212.92
109.68.213.6 109.68.230.189 109.68.232.38 109.68.238.18
109.68.26.230 109.68.26.250 109.68.40.11 109.68.48.198
109.68.72.100 207.71.113.110 109.69.0.62 109.69.119.168
109.69.119.29 109.69.16.3 109.69.186.60 109.69.190.168