必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.249.39.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.249.39.68.			IN	A

;; AUTHORITY SECTION:
.			183	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:20:44 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
68.39.249.13.in-addr.arpa domain name pointer server-13-249-39-68.iad89.r.cloudfront.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.39.249.13.in-addr.arpa	name = server-13-249-39-68.iad89.r.cloudfront.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
88.121.68.131 attack
Aug 11 16:14:24 microserver sshd[24309]: Invalid user craven from 88.121.68.131 port 43614
Aug 11 16:14:24 microserver sshd[24309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.121.68.131
Aug 11 16:14:26 microserver sshd[24309]: Failed password for invalid user craven from 88.121.68.131 port 43614 ssh2
Aug 11 16:19:50 microserver sshd[24946]: Invalid user ben from 88.121.68.131 port 37108
Aug 11 16:19:50 microserver sshd[24946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.121.68.131
Aug 11 16:30:35 microserver sshd[26649]: Invalid user kiosk from 88.121.68.131 port 51816
Aug 11 16:30:35 microserver sshd[26649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.121.68.131
Aug 11 16:30:37 microserver sshd[26649]: Failed password for invalid user kiosk from 88.121.68.131 port 51816 ssh2
Aug 11 16:35:56 microserver sshd[27271]: Invalid user jugo from 88.121.68.131 port 45762
Aug 11
2019-08-11 22:57:01
1.161.246.83 attackbots
23/tcp
[2019-08-11]1pkt
2019-08-11 23:13:09
201.161.58.67 attack
Aug 11 10:44:11 www sshd\[32510\]: Failed password for root from 201.161.58.67 port 50843 ssh2Aug 11 10:48:49 www sshd\[32680\]: Invalid user tye from 201.161.58.67Aug 11 10:48:50 www sshd\[32680\]: Failed password for invalid user tye from 201.161.58.67 port 47657 ssh2
...
2019-08-11 22:48:34
185.211.245.198 attack
Aug 11 16:38:32 relay postfix/smtpd\[28202\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 16:38:45 relay postfix/smtpd\[455\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 16:42:58 relay postfix/smtpd\[2635\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 16:43:13 relay postfix/smtpd\[455\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 16:45:33 relay postfix/smtpd\[3374\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-11 22:48:01
205.185.124.148 attackbots
scan z
2019-08-11 22:55:43
187.188.169.123 attackbots
2019-08-11T15:11:08.993769stark.klein-stark.info sshd\[2221\]: Invalid user web from 187.188.169.123 port 52240
2019-08-11T15:11:08.998193stark.klein-stark.info sshd\[2221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-169-123.totalplay.net
2019-08-11T15:11:11.899994stark.klein-stark.info sshd\[2221\]: Failed password for invalid user web from 187.188.169.123 port 52240 ssh2
...
2019-08-11 23:09:43
91.3.24.93 attackspam
5432/tcp
[2019-08-11]1pkt
2019-08-11 23:25:42
207.154.230.156 attack
Aug 11 14:34:38 MK-Soft-VM4 sshd\[32451\]: Invalid user pradeep from 207.154.230.156 port 42658
Aug 11 14:34:38 MK-Soft-VM4 sshd\[32451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.230.156
Aug 11 14:34:41 MK-Soft-VM4 sshd\[32451\]: Failed password for invalid user pradeep from 207.154.230.156 port 42658 ssh2
...
2019-08-11 22:40:58
218.150.220.230 attackbots
Aug 11 16:51:40 [host] sshd[8240]: Invalid user sangley_xmb1 from 218.150.220.230
Aug 11 16:51:40 [host] sshd[8240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.150.220.230
Aug 11 16:51:42 [host] sshd[8240]: Failed password for invalid user sangley_xmb1 from 218.150.220.230 port 45300 ssh2
2019-08-11 23:13:40
139.198.191.86 attackspambots
Automatic report - Banned IP Access
2019-08-11 23:43:09
81.22.45.148 attack
Aug 11 16:55:37 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=48139 PROTO=TCP SPT=44617 DPT=8068 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-11 23:19:09
103.91.85.229 attackbots
445/tcp
[2019-08-11]1pkt
2019-08-11 23:04:41
54.39.97.250 attack
Chat Spam
2019-08-11 23:06:23
112.118.99.95 attackspam
5555/tcp
[2019-08-11]1pkt
2019-08-11 22:58:20
117.48.212.113 attackspambots
Invalid user jugo from 117.48.212.113 port 32842
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.212.113
Failed password for invalid user jugo from 117.48.212.113 port 32842 ssh2
Invalid user raymond from 117.48.212.113 port 52064
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.212.113
2019-08-11 23:18:19

最近上报的IP列表

13.249.39.64 13.249.39.61 13.249.39.75 109.80.226.245
13.249.39.65 13.249.39.70 13.249.39.78 13.249.39.76
13.249.39.77 13.249.39.82 13.249.39.80 13.249.39.85
13.249.39.83 13.249.39.88 13.249.39.91 13.249.42.99
13.249.39.99 13.249.42.42 13.249.42.57 13.249.48.73