必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.68.159.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.68.159.207.			IN	A

;; AUTHORITY SECTION:
.			577	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031102 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 12:42:42 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 207.159.68.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.159.68.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.121.158.251 attack
Automatic report - Port Scan Attack
2020-06-12 01:22:20
49.32.31.137 attack
1591877511 - 06/11/2020 14:11:51 Host: 49.32.31.137/49.32.31.137 Port: 445 TCP Blocked
2020-06-12 01:26:49
213.217.0.101 attackspambots
Jun 11 19:08:32 debian-2gb-nbg1-2 kernel: \[14154037.299636\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.0.101 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=52548 PROTO=TCP SPT=50413 DPT=5906 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-12 01:11:39
61.161.209.134 attack
'IP reached maximum auth failures for a one day block'
2020-06-12 01:15:07
40.85.100.216 attack
Jun 11 14:53:49 pve1 sshd[29248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.85.100.216 
Jun 11 14:53:51 pve1 sshd[29248]: Failed password for invalid user tc from 40.85.100.216 port 59932 ssh2
...
2020-06-12 01:50:24
142.4.214.151 attackbots
Jun 11 19:34:41 abendstille sshd\[26885\]: Invalid user scp from 142.4.214.151
Jun 11 19:34:41 abendstille sshd\[26885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.214.151
Jun 11 19:34:44 abendstille sshd\[26885\]: Failed password for invalid user scp from 142.4.214.151 port 35402 ssh2
Jun 11 19:37:30 abendstille sshd\[29590\]: Invalid user yaq from 142.4.214.151
Jun 11 19:37:30 abendstille sshd\[29590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.214.151
...
2020-06-12 01:46:24
220.156.172.49 attackbots
(imapd) Failed IMAP login from 220.156.172.49 (NC/New Caledonia/host-220-156-172-49.canl.nc): 1 in the last 3600 secs
2020-06-12 01:37:47
91.121.116.65 attackbotsspam
(sshd) Failed SSH login from 91.121.116.65 (FR/France/ns349510.ip-91-121-116.eu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 11 16:25:16 ubnt-55d23 sshd[22398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.116.65  user=root
Jun 11 16:25:18 ubnt-55d23 sshd[22398]: Failed password for root from 91.121.116.65 port 52274 ssh2
2020-06-12 01:29:41
77.243.218.63 attackbots
Jun 11 16:11:31 OPSO sshd\[28204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.243.218.63  user=root
Jun 11 16:11:33 OPSO sshd\[28204\]: Failed password for root from 77.243.218.63 port 54552 ssh2
Jun 11 16:13:29 OPSO sshd\[28416\]: Invalid user fangwx from 77.243.218.63 port 33486
Jun 11 16:13:29 OPSO sshd\[28416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.243.218.63
Jun 11 16:13:31 OPSO sshd\[28416\]: Failed password for invalid user fangwx from 77.243.218.63 port 33486 ssh2
2020-06-12 01:14:54
82.80.49.147 attack
Honeypot attack, port: 445, PTR: bzq-80-49-147.red.bezeqint.net.
2020-06-12 01:52:09
159.203.72.14 attack
Invalid user tmpu from 159.203.72.14 port 50924
2020-06-12 01:20:52
134.175.18.118 attack
SSH brutforce
2020-06-12 01:38:45
104.131.139.147 attack
104.131.139.147 - - [11/Jun/2020:15:45:12 +0200] "GET /wp-login.php HTTP/1.1" 200 6302 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.131.139.147 - - [11/Jun/2020:15:45:18 +0200] "POST /wp-login.php HTTP/1.1" 200 6469 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.131.139.147 - - [11/Jun/2020:15:45:19 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-12 01:34:56
180.76.165.254 attackbotsspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-06-12 01:19:36
122.152.213.85 attack
Jun 11 14:10:02 minden010 sshd[25005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.213.85
Jun 11 14:10:04 minden010 sshd[25005]: Failed password for invalid user admin from 122.152.213.85 port 48164 ssh2
Jun 11 14:11:26 minden010 sshd[26463]: Failed password for root from 122.152.213.85 port 33674 ssh2
...
2020-06-12 01:47:48

最近上报的IP列表

120.68.159.204 120.68.159.208 120.68.159.211 120.68.159.214
120.68.159.216 120.68.159.218 120.68.159.22 120.68.159.221
120.68.159.222 120.68.159.225 120.68.159.226 120.68.159.227
120.68.159.228 120.68.159.230 120.68.159.232 120.68.159.235
120.68.159.236 120.68.159.239 120.68.159.240 120.68.159.242