必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.138.225.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5808
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.138.225.68.			IN	A

;; AUTHORITY SECTION:
.			280	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 12:05:11 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 68.225.138.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.225.138.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
223.205.91.150 attackbots
Honeypot attack, port: 445, PTR: mx-ll-223.205.91-150.dynamic.3bb.in.th.
2020-07-15 18:52:07
165.227.225.195 attackspam
Brute-force attempt banned
2020-07-15 18:57:54
51.116.178.86 attackspambots
Jul 15 13:33:43 taivassalofi sshd[18749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.116.178.86
Jul 15 13:33:45 taivassalofi sshd[18749]: Failed password for invalid user admin from 51.116.178.86 port 6794 ssh2
...
2020-07-15 18:37:55
188.226.131.171 attack
2020-07-15T13:12:52.294407afi-git.jinr.ru sshd[13250]: Invalid user fw from 188.226.131.171 port 59268
2020-07-15T13:12:52.297746afi-git.jinr.ru sshd[13250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.131.171
2020-07-15T13:12:52.294407afi-git.jinr.ru sshd[13250]: Invalid user fw from 188.226.131.171 port 59268
2020-07-15T13:12:53.942076afi-git.jinr.ru sshd[13250]: Failed password for invalid user fw from 188.226.131.171 port 59268 ssh2
2020-07-15T13:16:34.875923afi-git.jinr.ru sshd[14202]: Invalid user sc from 188.226.131.171 port 57252
...
2020-07-15 18:41:04
114.31.9.194 attackspam
Unauthorized connection attempt from IP address 114.31.9.194 on Port 445(SMB)
2020-07-15 19:00:20
181.229.217.221 attackbotsspam
2020-07-15T12:12:24.433630vps773228.ovh.net sshd[21494]: Invalid user service from 181.229.217.221 port 40822
2020-07-15T12:12:24.453045vps773228.ovh.net sshd[21494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.229.217.221
2020-07-15T12:12:24.433630vps773228.ovh.net sshd[21494]: Invalid user service from 181.229.217.221 port 40822
2020-07-15T12:12:26.584725vps773228.ovh.net sshd[21494]: Failed password for invalid user service from 181.229.217.221 port 40822 ssh2
2020-07-15T12:16:18.093881vps773228.ovh.net sshd[21516]: Invalid user nico from 181.229.217.221 port 39084
...
2020-07-15 19:07:50
218.92.0.192 attackspam
Jul 15 12:42:41 sip sshd[948416]: Failed password for root from 218.92.0.192 port 57256 ssh2
Jul 15 12:43:46 sip sshd[948431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.192  user=root
Jul 15 12:43:48 sip sshd[948431]: Failed password for root from 218.92.0.192 port 11760 ssh2
...
2020-07-15 18:55:09
94.25.127.178 attackspambots
Unauthorized connection attempt from IP address 94.25.127.178 on Port 445(SMB)
2020-07-15 19:09:45
52.191.248.156 attackbotsspam
Lines containing failures of 52.191.248.156
Jul 14 23:19:54 nexus sshd[21531]: Invalid user admin from 52.191.248.156 port 40125
Jul 14 23:19:54 nexus sshd[21531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.191.248.156
Jul 14 23:19:54 nexus sshd[21532]: Invalid user admin from 52.191.248.156 port 40142
Jul 14 23:19:54 nexus sshd[21532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.191.248.156
Jul 14 23:19:56 nexus sshd[21531]: Failed password for invalid user admin from 52.191.248.156 port 40125 ssh2
Jul 14 23:19:56 nexus sshd[21532]: Failed password for invalid user admin from 52.191.248.156 port 40142 ssh2
Jul 14 23:19:56 nexus sshd[21531]: Received disconnect from 52.191.248.156 port 40125:11: Client disconnecting normally [preauth]
Jul 14 23:19:56 nexus sshd[21531]: Disconnected from 52.191.248.156 port 40125 [preauth]
Jul 14 23:19:56 nexus sshd[21532]: Received disconnect f........
------------------------------
2020-07-15 19:10:06
192.241.246.167 attackbots
Jul 15 07:13:07 firewall sshd[29089]: Invalid user sc from 192.241.246.167
Jul 15 07:13:10 firewall sshd[29089]: Failed password for invalid user sc from 192.241.246.167 port 27701 ssh2
Jul 15 07:16:26 firewall sshd[29163]: Invalid user lalo from 192.241.246.167
...
2020-07-15 18:55:33
113.160.201.151 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-07-15 18:58:38
113.168.171.224 attack
Unauthorized connection attempt from IP address 113.168.171.224 on Port 445(SMB)
2020-07-15 18:37:26
103.7.129.210 attackbotsspam
Unauthorized connection attempt from IP address 103.7.129.210 on Port 445(SMB)
2020-07-15 19:05:31
222.252.17.56 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt-hanoi.com.vn.
2020-07-15 18:45:48
40.113.7.145 attackbotsspam
Jul 15 12:37:26 ArkNodeAT sshd\[1689\]: Invalid user admin from 40.113.7.145
Jul 15 12:37:26 ArkNodeAT sshd\[1689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.113.7.145
Jul 15 12:37:28 ArkNodeAT sshd\[1689\]: Failed password for invalid user admin from 40.113.7.145 port 4032 ssh2
2020-07-15 18:42:26

最近上报的IP列表

119.138.225.65 119.138.225.7 119.138.225.72 119.139.35.12
119.140.160.112 119.140.160.122 119.140.160.129 119.140.160.132
119.140.160.135 119.140.160.137 119.140.160.158 119.140.160.16
119.140.160.176 119.140.160.190 119.140.160.201 119.140.160.21
119.140.160.215 119.140.160.218 119.140.160.228 119.140.160.233