必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.68.197.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34987
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.68.197.93.			IN	A

;; AUTHORITY SECTION:
.			165	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 19:34:55 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 93.197.68.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.197.68.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
86.142.127.63 attackbotsspam
Jun 21 00:22:24 hosname24 sshd[26919]: Bad protocol version identification '' from 86.142.127.63 port 33382
Jun 21 00:22:37 hosname24 sshd[26926]: Invalid user support from 86.142.127.63 port 34550
Jun 21 00:22:41 hosname24 sshd[26926]: Failed password for invalid user support from 86.142.127.63 port 34550 ssh2
Jun 21 00:22:46 hosname24 sshd[26926]: Connection closed by 86.142.127.63 port 34550 [preauth]
Jun 21 00:23:02 hosname24 sshd[26929]: Invalid user ubnt from 86.142.127.63 port 40950
Jun 21 00:23:05 hosname24 sshd[26929]: Failed password for invalid user ubnt from 86.142.127.63 port 40950 ssh2
Jun 21 00:23:08 hosname24 sshd[26929]: Connection closed by 86.142.127.63 port 40950 [preauth]
Jun 21 00:23:23 hosname24 sshd[26933]: Invalid user cisco from 86.142.127.63 port 47890
Jun 21 00:23:27 hosname24 sshd[26933]: Failed password for invalid user cisco from 86.142.127.63 port 47890 ssh2
Jun 21 00:23:32 hosname24 sshd[26933]: Connection closed by 86.142.127.63 port 47........
-------------------------------
2019-06-22 18:40:21
77.27.40.96 attackspambots
Jun 18 21:47:11 h2421860 postfix/postscreen[8772]: CONNECT from [77.27.40.96]:37730 to [85.214.119.52]:25
Jun 18 21:47:11 h2421860 postfix/dnsblog[8775]: addr 77.27.40.96 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 18 21:47:11 h2421860 postfix/dnsblog[8776]: addr 77.27.40.96 listed by domain bl.spamcop.net as 127.0.0.2
Jun 18 21:47:11 h2421860 postfix/dnsblog[8776]: addr 77.27.40.96 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 18 21:47:11 h2421860 postfix/dnsblog[8776]: addr 77.27.40.96 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 18 21:47:11 h2421860 postfix/dnsblog[8776]: addr 77.27.40.96 listed by domain Unknown.trblspam.com as 185.53.179.7
Jun 18 21:47:11 h2421860 postfix/dnsblog[8777]: addr 77.27.40.96 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 18 21:47:11 h2421860 postfix/dnsblog[8780]: addr 77.27.40.96 listed by domain dnsbl.sorbs.net as 127.0.0.6
Jun 18 21:47:12 h2421860 postfix/postscreen[8772]: PREGREET 46 after 1.2 from [77........
-------------------------------
2019-06-22 18:48:01
103.247.9.62 attackbotsspam
103.247.9.62 - - [22/Jun/2019:00:23:43 -0400] "GET /?page=category&categoryID=95999999.1%20union%20select%20unhex(hex(version()))%20--%20and%201%3D1 HTTP/1.1" 200 75565 "-" "-"
...
2019-06-22 19:05:01
202.97.138.28 attack
Unauthorized access to SSH at 22/Jun/2019:04:22:41 +0000.
2019-06-22 19:22:19
181.197.90.190 attackbotsspam
*Port Scan* detected from 181.197.90.190 (PA/Panama/-). 4 hits in the last 35 seconds
2019-06-22 18:42:56
205.185.124.95 attack
ZTE Router Exploit Scanner
2019-06-22 18:37:56
94.176.64.125 attackbots
(Jun 22)  LEN=40 TTL=245 ID=65385 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=245 ID=64385 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=245 ID=10947 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=245 ID=55316 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 22)  LEN=40 TTL=245 ID=11497 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=245 ID=60296 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=245 ID=34330 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=245 ID=61655 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=245 ID=61512 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=245 ID=36739 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=245 ID=31358 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=245 ID=53313 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 21)  LEN=40 TTL=245 ID=64231 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 20)  LEN=40 TTL=245 ID=32061 DF TCP DPT=23 WINDOW=14600 SYN 
 (Jun 20)  LEN=40 TTL=245 ID=1969 DF TCP DPT=23 WINDOW=14600 S...
2019-06-22 18:56:44
2.152.192.52 attackbotsspam
Jun 22 10:46:40 work-partkepr sshd\[5186\]: Invalid user admin from 2.152.192.52 port 36179
Jun 22 10:46:40 work-partkepr sshd\[5186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.152.192.52
...
2019-06-22 19:07:04
190.203.86.241 attackbots
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-22 06:22:54]
2019-06-22 19:11:11
50.113.15.242 attackspambots
NAME : RRWE CIDR : 50.113.0.0/16 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Colorado - block certain countries :) IP: 50.113.15.242  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 19:05:33
91.218.175.14 attackbotsspam
scan z
2019-06-22 18:58:57
148.233.0.22 attackspam
Jun 22 06:23:54 s64-1 sshd[8645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.233.0.22
Jun 22 06:23:57 s64-1 sshd[8645]: Failed password for invalid user eng from 148.233.0.22 port 57523 ssh2
Jun 22 06:25:19 s64-1 sshd[8740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.233.0.22
...
2019-06-22 18:37:02
69.158.249.123 attack
Jun 22 07:23:55 yabzik sshd[13629]: Failed password for root from 69.158.249.123 port 3667 ssh2
Jun 22 07:23:57 yabzik sshd[13629]: Failed password for root from 69.158.249.123 port 3667 ssh2
Jun 22 07:23:59 yabzik sshd[13629]: Failed password for root from 69.158.249.123 port 3667 ssh2
Jun 22 07:24:02 yabzik sshd[13629]: Failed password for root from 69.158.249.123 port 3667 ssh2
2019-06-22 19:00:39
80.55.243.130 attackspambots
Jun 22 01:17:04 Tower sshd[15026]: Connection from 80.55.243.130 port 50690 on 192.168.10.220 port 22
Jun 22 01:17:06 Tower sshd[15026]: Invalid user nu from 80.55.243.130 port 50690
Jun 22 01:17:06 Tower sshd[15026]: error: Could not get shadow information for NOUSER
Jun 22 01:17:06 Tower sshd[15026]: Failed password for invalid user nu from 80.55.243.130 port 50690 ssh2
Jun 22 01:17:06 Tower sshd[15026]: Received disconnect from 80.55.243.130 port 50690:11: Bye Bye [preauth]
Jun 22 01:17:06 Tower sshd[15026]: Disconnected from invalid user nu 80.55.243.130 port 50690 [preauth]
2019-06-22 19:12:22
194.28.115.244 attackbots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-06-22 18:51:59

最近上报的IP列表

117.196.22.224 120.68.159.98 120.68.98.122 120.68.159.96
120.68.159.94 120.68.98.159 120.68.159.92 120.68.251.107
120.68.98.41 120.68.236.78 120.68.20.106 120.68.201.50
117.196.23.157 120.69.108.239 120.69.108.250 120.69.113.181
120.69.142.82 120.69.191.122 120.69.123.204 120.69.27.223