必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.68.148.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6380
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.68.148.42.			IN	A

;; AUTHORITY SECTION:
.			436	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 17:17:28 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 42.148.68.13.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.148.68.13.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
144.217.183.134 attackbots
144.217.183.134 - - \[20/Sep/2020:10:23:19 +0200\] "POST /wp-login.php HTTP/1.1" 200 12843 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
144.217.183.134 - - \[20/Sep/2020:10:23:20 +0200\] "POST /wp-login.php HTTP/1.1" 200 12712 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-09-20 20:51:51
155.4.59.223 attackspam
Sep 19 19:02:47 vps639187 sshd\[27190\]: Invalid user ubnt from 155.4.59.223 port 60582
Sep 19 19:02:47 vps639187 sshd\[27190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.4.59.223
Sep 19 19:02:49 vps639187 sshd\[27190\]: Failed password for invalid user ubnt from 155.4.59.223 port 60582 ssh2
...
2020-09-20 20:59:05
85.224.217.221 attack
Sep 19 17:00:19 scw-focused-cartwright sshd[26247]: Failed password for root from 85.224.217.221 port 41857 ssh2
2020-09-20 20:58:20
88.202.238.213 attack
E-Mail Spam (RBL) [REJECTED]
2020-09-20 20:44:39
87.231.27.105 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-09-20 21:02:11
156.96.117.191 attack
[2020-09-20 08:38:37] NOTICE[1239][C-000059a0] chan_sip.c: Call from '' (156.96.117.191:61194) to extension '880110972567244623' rejected because extension not found in context 'public'.
[2020-09-20 08:38:37] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-20T08:38:37.421-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="880110972567244623",SessionID="0x7f4d48513438",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/156.96.117.191/61194",ACLName="no_extension_match"
[2020-09-20 08:41:47] NOTICE[1239][C-000059a5] chan_sip.c: Call from '' (156.96.117.191:62579) to extension '870110972567244623' rejected because extension not found in context 'public'.
[2020-09-20 08:41:47] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-20T08:41:47.650-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="870110972567244623",SessionID="0x7f4d482f9458",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAdd
...
2020-09-20 20:48:10
58.153.245.6 attackbotsspam
2020-09-20T08:48:19.667584Z de23279002e2 New connection: 58.153.245.6:58800 (172.17.0.5:2222) [session: de23279002e2]
2020-09-20T08:48:19.669414Z dbd6014f806a New connection: 58.153.245.6:58826 (172.17.0.5:2222) [session: dbd6014f806a]
2020-09-20 21:03:44
213.150.184.62 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 20:38:04
54.36.163.141 attackbotsspam
2020-09-20T14:25:45.187358mail.broermann.family sshd[12016]: Failed password for invalid user testuser from 54.36.163.141 port 35842 ssh2
2020-09-20T14:30:13.254368mail.broermann.family sshd[12472]: Invalid user ubuntu from 54.36.163.141 port 44694
2020-09-20T14:30:13.259545mail.broermann.family sshd[12472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.ip-54-36-163.eu
2020-09-20T14:30:13.254368mail.broermann.family sshd[12472]: Invalid user ubuntu from 54.36.163.141 port 44694
2020-09-20T14:30:14.666604mail.broermann.family sshd[12472]: Failed password for invalid user ubuntu from 54.36.163.141 port 44694 ssh2
...
2020-09-20 20:54:37
116.108.54.54 attack
Lines containing failures of 116.108.54.54
Sep 19 19:00:06 mellenthin sshd[20987]: Did not receive identification string from 116.108.54.54 port 57511
Sep 19 19:00:08 mellenthin sshd[20988]: Invalid user admin1 from 116.108.54.54 port 57710
Sep 19 19:00:08 mellenthin sshd[20988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.108.54.54
Sep 19 19:00:10 mellenthin sshd[20988]: Failed password for invalid user admin1 from 116.108.54.54 port 57710 ssh2
Sep 19 19:00:11 mellenthin sshd[20988]: Connection closed by invalid user admin1 116.108.54.54 port 57710 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.108.54.54
2020-09-20 21:06:11
193.218.118.130 attackbotsspam
Sep 20 12:12:20 ws26vmsma01 sshd[211953]: Failed password for root from 193.218.118.130 port 53200 ssh2
Sep 20 12:12:30 ws26vmsma01 sshd[211953]: Failed password for root from 193.218.118.130 port 53200 ssh2
...
2020-09-20 20:48:44
61.64.177.60 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 21:00:51
176.115.196.74 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-20 21:05:38
118.89.120.110 attackbots
Sep 20 12:48:07  sshd\[10134\]: User root from 118.89.120.110 not allowed because not listed in AllowUsersSep 20 12:48:09  sshd\[10134\]: Failed password for invalid user root from 118.89.120.110 port 42730 ssh2
...
2020-09-20 20:34:38
35.187.233.244 attack
firewall-block, port(s): 22782/tcp
2020-09-20 20:54:56

最近上报的IP列表

13.68.134.102 13.67.71.43 13.68.153.150 13.67.92.50
13.68.155.251 13.68.159.102 13.68.159.156 13.68.172.219
13.68.159.248 13.68.20.25 13.68.20.198 13.68.206.223
13.68.204.7 13.68.180.97 13.68.207.135 13.68.211.94
13.68.175.41 13.68.206.230 13.68.217.199 13.68.225.188