必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Columbus

省份(region): Ohio

国家(country): United States

运营商(isp): AT&T

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.47.107.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2011
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.47.107.68.			IN	A

;; AUTHORITY SECTION:
.			430	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010402 1800 900 604800 86400

;; Query time: 154 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 05 02:54:50 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
Host 68.107.47.12.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.107.47.12.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.180.250.42 attack
Time:     Mon Sep 28 18:59:37 2020 +0000
IP:       222.180.250.42 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 28 18:49:10 14-2 sshd[8712]: Invalid user css from 222.180.250.42 port 2048
Sep 28 18:49:12 14-2 sshd[8712]: Failed password for invalid user css from 222.180.250.42 port 2048 ssh2
Sep 28 18:57:04 14-2 sshd[1638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.180.250.42  user=root
Sep 28 18:57:07 14-2 sshd[1638]: Failed password for root from 222.180.250.42 port 2049 ssh2
Sep 28 18:59:31 14-2 sshd[9868]: Invalid user postgres2 from 222.180.250.42 port 2050
2020-09-29 03:22:08
185.147.212.13 attackbotsspam
[2020-09-28 14:27:31] NOTICE[1159] chan_sip.c: Registration from '' failed for '185.147.212.13:58388' - Wrong password
[2020-09-28 14:27:31] SECURITY[1198] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-28T14:27:31.273-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="71",SessionID="0x7fcaa02091e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.212.13/58388",Challenge="230eb8fd",ReceivedChallenge="230eb8fd",ReceivedHash="b35ce1336a4afb6e169a9e4738e18fc5"
[2020-09-28 14:31:16] NOTICE[1159] chan_sip.c: Registration from '' failed for '185.147.212.13:53995' - Wrong password
[2020-09-28 14:31:16] SECURITY[1198] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-28T14:31:16.295-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="121",SessionID="0x7fcaa0092e98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.212.13/5
...
2020-09-29 03:35:58
81.69.174.79 attackbots
Sep 28 15:00:37 logopedia-1vcpu-1gb-nyc1-01 sshd[224080]: Invalid user wp from 81.69.174.79 port 37464
...
2020-09-29 03:41:10
128.199.193.246 attackbotsspam
Sep 28 19:00:06 onepixel sshd[3309012]: Failed password for invalid user albert from 128.199.193.246 port 59146 ssh2
Sep 28 19:03:54 onepixel sshd[3309607]: Invalid user git from 128.199.193.246 port 55068
Sep 28 19:03:54 onepixel sshd[3309607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.193.246 
Sep 28 19:03:54 onepixel sshd[3309607]: Invalid user git from 128.199.193.246 port 55068
Sep 28 19:03:56 onepixel sshd[3309607]: Failed password for invalid user git from 128.199.193.246 port 55068 ssh2
2020-09-29 03:18:26
46.101.164.33 attackbotsspam
Sep 28 19:43:00 buvik sshd[16243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.164.33
Sep 28 19:43:02 buvik sshd[16243]: Failed password for invalid user guest from 46.101.164.33 port 41658 ssh2
Sep 28 19:46:29 buvik sshd[16709]: Invalid user viktor from 46.101.164.33
...
2020-09-29 03:07:55
113.53.238.195 attackspambots
$f2bV_matches
2020-09-29 03:26:42
111.72.196.61 attackbotsspam
Sep 28 04:34:21 srv01 postfix/smtpd\[4615\]: warning: unknown\[111.72.196.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 28 04:34:33 srv01 postfix/smtpd\[4615\]: warning: unknown\[111.72.196.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 28 04:34:50 srv01 postfix/smtpd\[4615\]: warning: unknown\[111.72.196.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 28 04:35:08 srv01 postfix/smtpd\[4615\]: warning: unknown\[111.72.196.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 28 04:35:22 srv01 postfix/smtpd\[4615\]: warning: unknown\[111.72.196.61\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-29 03:13:36
93.108.242.140 attack
Sep 28 16:55:34 pve1 sshd[19253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 
Sep 28 16:55:36 pve1 sshd[19253]: Failed password for invalid user noreply from 93.108.242.140 port 44053 ssh2
...
2020-09-29 03:27:29
80.252.22.111 attackspam
(sshd) Failed SSH login from 80.252.22.111 (RU/Russia/Samara Oblast/Samara/-/[AS39042 LLC Global Telecom Co]): 10 in the last 3600 secs
2020-09-29 03:35:03
139.59.59.102 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-29 03:29:55
106.13.82.231 attack
Sep 29 00:29:37 itv-usvr-01 sshd[11989]: Invalid user usuario from 106.13.82.231
Sep 29 00:29:37 itv-usvr-01 sshd[11989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.231
Sep 29 00:29:37 itv-usvr-01 sshd[11989]: Invalid user usuario from 106.13.82.231
Sep 29 00:29:39 itv-usvr-01 sshd[11989]: Failed password for invalid user usuario from 106.13.82.231 port 45596 ssh2
Sep 29 00:35:29 itv-usvr-01 sshd[12264]: Invalid user deploy from 106.13.82.231
2020-09-29 03:09:16
154.124.250.242 attackspambots
Invalid user admin from 154.124.250.242 port 45733
2020-09-29 03:20:31
154.8.151.81 attack
$f2bV_matches
2020-09-29 03:40:17
116.113.30.26 attackspambots
 TCP (SYN) 116.113.30.26:56686 -> port 1433, len 60
2020-09-29 03:26:19
106.52.81.37 attackspambots
Sep 28 11:53:19 xeon sshd[47381]: Failed password for mysql from 106.52.81.37 port 40888 ssh2
2020-09-29 03:18:56

最近上报的IP列表

121.133.104.129 115.81.96.11 115.25.37.66 110.51.31.14
110.17.2.37 109.101.173.214 106.197.105.245 213.139.0.17
106.68.225.89 105.52.34.249 105.205.212.13 246.172.37.62
101.143.147.92 100.124.0.99 10.156.217.86 10.22.237.52
10.184.203.210 1.116.230.169 1.160.67.170 1.10.253.185