必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.68.54.2 attack
Apr  8 01:20:56 www sshd\[62925\]: Invalid user andy from 138.68.54.2Apr  8 01:20:58 www sshd\[62925\]: Failed password for invalid user andy from 138.68.54.2 port 42076 ssh2Apr  8 01:24:55 www sshd\[63048\]: Invalid user anon from 138.68.54.2
...
2020-04-08 06:44:11
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.54.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64574
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.54.119.			IN	A

;; AUTHORITY SECTION:
.			552	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:53:17 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 119.54.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.54.68.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.236.239.60 attack
2019-09-30T23:43:33.793510WS-Zach sshd[20862]: Invalid user rt from 104.236.239.60 port 42504
2019-09-30T23:43:33.797478WS-Zach sshd[20862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.239.60
2019-09-30T23:43:33.793510WS-Zach sshd[20862]: Invalid user rt from 104.236.239.60 port 42504
2019-09-30T23:43:35.347658WS-Zach sshd[20862]: Failed password for invalid user rt from 104.236.239.60 port 42504 ssh2
2019-09-30T23:49:14.278678WS-Zach sshd[23712]: Invalid user apache from 104.236.239.60 port 40232
...
2019-10-01 17:27:58
159.192.247.6 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/159.192.247.6/ 
 TH - 1H : (91)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TH 
 NAME ASN : ASN131090 
 
 IP : 159.192.247.6 
 
 CIDR : 159.192.247.0/24 
 
 PREFIX COUNT : 407 
 
 UNIQUE IP COUNT : 199424 
 
 
 WYKRYTE ATAKI Z ASN131090 :  
  1H - 2 
  3H - 4 
  6H - 6 
 12H - 6 
 24H - 10 
 
 DateTime : 2019-10-01 05:48:53 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 17:45:32
123.126.34.54 attackspam
Oct  1 07:04:35 www sshd\[181274\]: Invalid user system from 123.126.34.54
Oct  1 07:04:35 www sshd\[181274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.126.34.54
Oct  1 07:04:37 www sshd\[181274\]: Failed password for invalid user system from 123.126.34.54 port 42453 ssh2
...
2019-10-01 17:13:13
151.80.75.125 attackbotsspam
Oct  1 09:11:50  postfix/smtpd: warning: unknown[151.80.75.125]: SASL LOGIN authentication failed
2019-10-01 17:34:02
1.58.105.170 attackbotsspam
Automatic report - FTP Brute Force
2019-10-01 17:38:30
103.89.124.170 attack
Oct  1 09:57:39 jane sshd[7985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.124.170 
Oct  1 09:57:41 jane sshd[7985]: Failed password for invalid user pam from 103.89.124.170 port 50486 ssh2
...
2019-10-01 17:42:39
107.172.77.172 attackspambots
C1,WP GET /suche/wp-login.php
2019-10-01 17:32:07
178.217.205.144 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/178.217.205.144/ 
 UA - 1H : (160)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UA 
 NAME ASN : ASN196767 
 
 IP : 178.217.205.144 
 
 CIDR : 178.217.205.0/24 
 
 PREFIX COUNT : 48 
 
 UNIQUE IP COUNT : 13312 
 
 
 WYKRYTE ATAKI Z ASN196767 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-01 05:48:53 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 17:44:45
144.217.164.104 attackspambots
Oct  1 08:22:12 rotator sshd\[16899\]: Failed password for root from 144.217.164.104 port 32930 ssh2Oct  1 08:22:15 rotator sshd\[16899\]: Failed password for root from 144.217.164.104 port 32930 ssh2Oct  1 08:22:18 rotator sshd\[16899\]: Failed password for root from 144.217.164.104 port 32930 ssh2Oct  1 08:22:21 rotator sshd\[16899\]: Failed password for root from 144.217.164.104 port 32930 ssh2Oct  1 08:22:24 rotator sshd\[16899\]: Failed password for root from 144.217.164.104 port 32930 ssh2Oct  1 08:22:27 rotator sshd\[16899\]: Failed password for root from 144.217.164.104 port 32930 ssh2
...
2019-10-01 17:05:56
103.51.153.235 attackspambots
Oct  1 11:01:18 core sshd[18781]: Invalid user dacc from 103.51.153.235 port 34710
Oct  1 11:01:20 core sshd[18781]: Failed password for invalid user dacc from 103.51.153.235 port 34710 ssh2
...
2019-10-01 17:07:11
110.138.137.238 attackspambots
Sep 30 23:49:27 localhost kernel: [3639586.297534] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=110.138.137.238 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=245 ID=31727 DF PROTO=TCP SPT=4519 DPT=445 SEQ=955856925 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405840103030801010402) 
Sep 30 23:49:30 localhost kernel: [3639589.327975] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=110.138.137.238 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=245 ID=241 DF PROTO=TCP SPT=4519 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
Sep 30 23:49:30 localhost kernel: [3639589.328005] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=110.138.137.238 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=245 ID=241 DF PROTO=TCP SPT=4519 DPT=445 SEQ=955856925 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405840103030801010402)
2019-10-01 17:16:43
202.129.241.102 attackspambots
Oct  1 07:05:16 www sshd\[37271\]: Invalid user dragos from 202.129.241.102Oct  1 07:05:17 www sshd\[37271\]: Failed password for invalid user dragos from 202.129.241.102 port 43006 ssh2Oct  1 07:06:51 www sshd\[37286\]: Invalid user jia from 202.129.241.102
...
2019-10-01 17:19:26
185.170.131.9 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/185.170.131.9/ 
 LB - 1H : (3)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : LB 
 NAME ASN : ASN48629 
 
 IP : 185.170.131.9 
 
 CIDR : 185.170.131.0/24 
 
 PREFIX COUNT : 8 
 
 UNIQUE IP COUNT : 2048 
 
 
 WYKRYTE ATAKI Z ASN48629 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-01 05:48:53 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 17:43:48
117.200.69.3 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-10-01 17:26:35
124.204.45.66 attack
Oct  1 08:01:41 tux-35-217 sshd\[1211\]: Invalid user monroe from 124.204.45.66 port 49546
Oct  1 08:01:41 tux-35-217 sshd\[1211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.45.66
Oct  1 08:01:43 tux-35-217 sshd\[1211\]: Failed password for invalid user monroe from 124.204.45.66 port 49546 ssh2
Oct  1 08:06:31 tux-35-217 sshd\[1220\]: Invalid user www from 124.204.45.66 port 60250
Oct  1 08:06:31 tux-35-217 sshd\[1220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.45.66
...
2019-10-01 17:34:45

最近上报的IP列表

118.183.34.226 138.68.54.0 138.68.53.89 138.68.54.110
138.68.53.178 138.68.53.23 138.68.54.127 138.68.53.220
138.68.53.59 138.68.53.94 138.68.53.44 138.68.54.209
118.183.58.91 138.68.56.211 138.68.55.186 138.68.56.96
138.68.54.87 138.68.54.78 138.68.58.121 138.68.57.12