必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.68.50.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.68.50.12.			IN	A

;; AUTHORITY SECTION:
.			263	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011001 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 05:54:11 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 12.50.68.136.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.82.98, trying next server
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.50.68.136.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.134.133.38 attackbotsspam
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-27 19:22:02
77.232.100.151 attackspam
Lines containing failures of 77.232.100.151
Feb 27 00:13:18 cdb sshd[6286]: Invalid user discordbot from 77.232.100.151 port 47008
Feb 27 00:13:18 cdb sshd[6286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.100.151
Feb 27 00:13:20 cdb sshd[6286]: Failed password for invalid user discordbot from 77.232.100.151 port 47008 ssh2
Feb 27 00:13:20 cdb sshd[6286]: Received disconnect from 77.232.100.151 port 47008:11: Bye Bye [preauth]
Feb 27 00:13:20 cdb sshd[6286]: Disconnected from invalid user discordbot 77.232.100.151 port 47008 [preauth]
Feb 27 00:31:33 cdb sshd[9347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.100.151  user=www-data
Feb 27 00:31:35 cdb sshd[9347]: Failed password for www-data from 77.232.100.151 port 53694 ssh2
Feb 27 00:31:35 cdb sshd[9347]: Received disconnect from 77.232.100.151 port 53694:11: Bye Bye [preauth]
Feb 27 00:31:35 cdb sshd[9347]: Disconne........
------------------------------
2020-02-27 19:52:37
36.90.68.107 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-27 19:42:59
51.255.168.152 attackspambots
$f2bV_matches
2020-02-27 19:19:23
71.6.232.5 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-27 19:40:54
222.186.30.209 attackbots
Feb 27 13:06:10 server2 sshd\[30931\]: User root from 222.186.30.209 not allowed because not listed in AllowUsers
Feb 27 13:08:26 server2 sshd\[31026\]: User root from 222.186.30.209 not allowed because not listed in AllowUsers
Feb 27 13:08:28 server2 sshd\[31028\]: User root from 222.186.30.209 not allowed because not listed in AllowUsers
Feb 27 13:15:27 server2 sshd\[31387\]: User root from 222.186.30.209 not allowed because not listed in AllowUsers
Feb 27 13:15:28 server2 sshd\[31385\]: User root from 222.186.30.209 not allowed because not listed in AllowUsers
Feb 27 13:15:37 server2 sshd\[31389\]: User root from 222.186.30.209 not allowed because not listed in AllowUsers
2020-02-27 19:15:58
124.120.30.74 attack
Honeypot attack, port: 81, PTR: ppp-124-120-30-74.revip2.asianet.co.th.
2020-02-27 19:31:14
189.203.130.134 attackspambots
unauthorized connection attempt
2020-02-27 19:45:22
128.199.90.245 attackspam
Feb 27 10:20:51 marvibiene sshd[62777]: Invalid user discordbot from 128.199.90.245 port 54135
Feb 27 10:20:51 marvibiene sshd[62777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.90.245
Feb 27 10:20:51 marvibiene sshd[62777]: Invalid user discordbot from 128.199.90.245 port 54135
Feb 27 10:20:53 marvibiene sshd[62777]: Failed password for invalid user discordbot from 128.199.90.245 port 54135 ssh2
...
2020-02-27 19:33:29
159.89.114.40 attack
2020-02-27T09:12:29.473115shield sshd\[8531\]: Invalid user bananapi from 159.89.114.40 port 39582
2020-02-27T09:12:29.479289shield sshd\[8531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.114.40
2020-02-27T09:12:31.501980shield sshd\[8531\]: Failed password for invalid user bananapi from 159.89.114.40 port 39582 ssh2
2020-02-27T09:15:49.073520shield sshd\[9444\]: Invalid user dan from 159.89.114.40 port 38118
2020-02-27T09:15:49.078759shield sshd\[9444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.114.40
2020-02-27 19:44:14
124.78.50.16 attackspam
1582782222 - 02/27/2020 06:43:42 Host: 124.78.50.16/124.78.50.16 Port: 445 TCP Blocked
2020-02-27 19:27:25
77.81.230.120 attackspambots
Feb 27 00:58:02 eddieflores sshd\[23273\]: Invalid user vnc from 77.81.230.120
Feb 27 00:58:02 eddieflores sshd\[23273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.120
Feb 27 00:58:04 eddieflores sshd\[23273\]: Failed password for invalid user vnc from 77.81.230.120 port 44478 ssh2
Feb 27 01:07:03 eddieflores sshd\[23993\]: Invalid user test1 from 77.81.230.120
Feb 27 01:07:03 eddieflores sshd\[23993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.120
2020-02-27 19:33:56
188.166.208.131 attackspambots
Feb 27 05:02:39 server sshd\[28013\]: Invalid user admin from 188.166.208.131
Feb 27 05:02:39 server sshd\[28013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131 
Feb 27 05:02:41 server sshd\[28013\]: Failed password for invalid user admin from 188.166.208.131 port 52840 ssh2
Feb 27 09:25:25 server sshd\[18497\]: Invalid user user2 from 188.166.208.131
Feb 27 09:25:25 server sshd\[18497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.208.131 
...
2020-02-27 19:09:00
116.105.225.137 attackbots
FTP Brute-Force
2020-02-27 19:24:07
167.114.98.234 attackspam
Feb 27 12:19:39 vpn01 sshd[15969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.234
Feb 27 12:19:41 vpn01 sshd[15969]: Failed password for invalid user rootalias from 167.114.98.234 port 47029 ssh2
...
2020-02-27 19:29:53

最近上报的IP列表

138.98.144.56 243.133.15.182 34.151.148.74 229.180.54.106
33.185.135.218 46.222.68.234 160.133.158.187 138.199.6.182
122.248.151.21 74.163.8.226 21.156.133.198 2804:18:33:1c3a:7c32:bce9:bb3c:5497
13.59.252.87 23.9.95.245 208.121.169.45 213.39.191.53
36.217.72.73 10.204.251.98 3.238.235.31 5.85.238.19