必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.41.26.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.41.26.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:45:41 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 68.26.41.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.26.41.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.78.53.37 attackspam
no
2019-11-07 19:43:40
106.13.29.223 attackspambots
Nov  7 11:27:55 game-panel sshd[12880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.223
Nov  7 11:27:57 game-panel sshd[12880]: Failed password for invalid user rohit from 106.13.29.223 port 45803 ssh2
Nov  7 11:33:40 game-panel sshd[13078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.223
2019-11-07 20:07:19
212.237.51.190 attackspambots
detected by Fail2Ban
2019-11-07 19:36:59
91.200.151.226 attackspambots
113 tries to connect with "cannot find your hostname" in one day.
2019-11-07 20:05:09
78.204.123.164 attackspam
Nov  7 07:22:43 MK-Soft-VM7 sshd[14726]: Failed password for root from 78.204.123.164 port 40751 ssh2
...
2019-11-07 19:58:24
104.248.32.164 attack
2019-11-07T06:15:29.990969shield sshd\[13914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.32.164  user=root
2019-11-07T06:15:31.971933shield sshd\[13914\]: Failed password for root from 104.248.32.164 port 39146 ssh2
2019-11-07T06:19:12.924878shield sshd\[14205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.32.164  user=root
2019-11-07T06:19:14.850478shield sshd\[14205\]: Failed password for root from 104.248.32.164 port 47590 ssh2
2019-11-07T06:22:50.798872shield sshd\[14571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.32.164  user=root
2019-11-07 19:56:33
206.189.153.178 attackspambots
2019-11-07T06:34:16.117306WS-Zach sshd[1753367]: User root from 206.189.153.178 not allowed because none of user's groups are listed in AllowGroups
2019-11-07T06:34:16.128166WS-Zach sshd[1753367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.153.178  user=root
2019-11-07T06:34:16.117306WS-Zach sshd[1753367]: User root from 206.189.153.178 not allowed because none of user's groups are listed in AllowGroups
2019-11-07T06:34:17.909737WS-Zach sshd[1753367]: Failed password for invalid user root from 206.189.153.178 port 38016 ssh2
2019-11-07T06:39:18.979466WS-Zach sshd[1753978]: Invalid user usuario from 206.189.153.178 port 51832
...
2019-11-07 20:03:56
138.197.36.189 attackspambots
2019-11-07T11:03:10.693439  sshd[8564]: Invalid user qmailr from 138.197.36.189 port 59190
2019-11-07T11:03:10.708642  sshd[8564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.36.189
2019-11-07T11:03:10.693439  sshd[8564]: Invalid user qmailr from 138.197.36.189 port 59190
2019-11-07T11:03:12.441766  sshd[8564]: Failed password for invalid user qmailr from 138.197.36.189 port 59190 ssh2
2019-11-07T11:10:58.648554  sshd[8645]: Invalid user hart from 138.197.36.189 port 34886
...
2019-11-07 19:38:07
54.37.155.42 attack
Nov  7 07:17:04 derzbach sshd[14211]: Invalid user virus from 54.37.155.42 port 47228
Nov  7 07:17:04 derzbach sshd[14211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.155.42 
Nov  7 07:17:04 derzbach sshd[14211]: Invalid user virus from 54.37.155.42 port 47228
Nov  7 07:17:06 derzbach sshd[14211]: Failed password for invalid user virus from 54.37.155.42 port 47228 ssh2
Nov  7 07:17:35 derzbach sshd[15201]: Invalid user windows from 54.37.155.42 port 40350


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=54.37.155.42
2019-11-07 19:51:30
185.165.28.163 attack
11/07/2019-02:32:08.060700 185.165.28.163 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-07 20:03:40
115.57.127.137 attackbots
Nov  7 09:12:10 server sshd\[4788\]: Invalid user rfoenander from 115.57.127.137
Nov  7 09:12:10 server sshd\[4788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.57.127.137 
Nov  7 09:12:11 server sshd\[4788\]: Failed password for invalid user rfoenander from 115.57.127.137 port 58069 ssh2
Nov  7 09:23:06 server sshd\[7412\]: Invalid user ashah from 115.57.127.137
Nov  7 09:23:06 server sshd\[7412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.57.127.137 
...
2019-11-07 19:45:47
38.98.158.39 attack
Nov  6 01:26:46 rb06 sshd[25465]: Address 38.98.158.39 maps to unassigned.psychz.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov  6 01:26:48 rb06 sshd[25465]: Failed password for invalid user vagrant from 38.98.158.39 port 49828 ssh2
Nov  6 01:26:48 rb06 sshd[25465]: Received disconnect from 38.98.158.39: 11: Bye Bye [preauth]
Nov  6 01:33:32 rb06 sshd[709]: Address 38.98.158.39 maps to unassigned.psychz.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov  6 01:33:32 rb06 sshd[709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.98.158.39  user=r.r
Nov  6 01:33:33 rb06 sshd[709]: Failed password for r.r from 38.98.158.39 port 51166 ssh2
Nov  6 01:33:33 rb06 sshd[709]: Received disconnect from 38.98.158.39: 11: Bye Bye [preauth]
Nov  6 01:37:05 rb06 sshd[1145]: Address 38.98.158.39 maps to unassigned.psychz.net, but this does not map back to the address - POSSIBLE BREA........
-------------------------------
2019-11-07 19:40:54
178.128.242.233 attack
$f2bV_matches
2019-11-07 20:02:12
198.108.67.136 attack
198.108.67.136 was recorded 5 times by 5 hosts attempting to connect to the following ports: 6443,22,81,8080,21. Incident counter (4h, 24h, all-time): 5, 41, 92
2019-11-07 20:06:31
82.117.190.170 attackspam
Nov  7 01:22:08 web1 sshd\[1614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.117.190.170  user=root
Nov  7 01:22:10 web1 sshd\[1614\]: Failed password for root from 82.117.190.170 port 39765 ssh2
Nov  7 01:26:12 web1 sshd\[2028\]: Invalid user sa from 82.117.190.170
Nov  7 01:26:12 web1 sshd\[2028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.117.190.170
Nov  7 01:26:14 web1 sshd\[2028\]: Failed password for invalid user sa from 82.117.190.170 port 58003 ssh2
2019-11-07 19:34:22

最近上报的IP列表

100.19.246.221 44.136.108.91 76.13.48.185 107.8.170.202
187.133.21.59 95.96.181.17 91.62.14.230 99.107.248.116
222.42.137.207 248.152.65.40 147.89.237.141 238.107.220.88
29.253.197.11 86.21.35.10 231.37.105.195 122.222.145.162
231.221.129.58 124.121.56.241 245.253.210.167 97.158.114.168