必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.13.68.233
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31120
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.13.68.233.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:41:37 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
233.68.13.163.in-addr.arpa domain name pointer pc233.cable68.tku.edu.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
233.68.13.163.in-addr.arpa	name = pc233.cable68.tku.edu.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.215.26 attackbots
Feb 23 15:21:47 ift sshd\[56502\]: Invalid user sammy from 106.13.215.26Feb 23 15:21:49 ift sshd\[56502\]: Failed password for invalid user sammy from 106.13.215.26 port 37556 ssh2Feb 23 15:24:38 ift sshd\[56696\]: Invalid user oracle from 106.13.215.26Feb 23 15:24:40 ift sshd\[56696\]: Failed password for invalid user oracle from 106.13.215.26 port 56488 ssh2Feb 23 15:27:35 ift sshd\[57228\]: Invalid user sarvub from 106.13.215.26
...
2020-02-23 23:57:55
188.64.245.51 attackspam
Feb 23 15:37:29 server sshd[392713]: Failed password for invalid user photos from 188.64.245.51 port 38292 ssh2
Feb 23 15:51:35 server sshd[401113]: Failed password for invalid user info from 188.64.245.51 port 37992 ssh2
Feb 23 16:05:33 server sshd[409333]: Failed password for invalid user vnc from 188.64.245.51 port 37696 ssh2
2020-02-24 00:22:15
103.207.39.183 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 103.207.39.183 (-): 5 in the last 3600 secs - Thu Jun 21 13:02:08 2018
2020-02-24 00:24:45
104.168.142.227 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 104.168.142.227 (hwsrv-273223.hostwindsdns.com): 5 in the last 3600 secs - Fri Jun 22 19:11:59 2018
2020-02-23 23:48:05
117.62.62.154 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 117.62.62.154 (-): 5 in the last 3600 secs - Thu Jun 21 08:41:24 2018
2020-02-24 00:26:05
222.186.30.167 attackbotsspam
Feb 23 17:07:01 dcd-gentoo sshd[18797]: User root from 222.186.30.167 not allowed because none of user's groups are listed in AllowGroups
Feb 23 17:07:05 dcd-gentoo sshd[18797]: error: PAM: Authentication failure for illegal user root from 222.186.30.167
Feb 23 17:07:01 dcd-gentoo sshd[18797]: User root from 222.186.30.167 not allowed because none of user's groups are listed in AllowGroups
Feb 23 17:07:05 dcd-gentoo sshd[18797]: error: PAM: Authentication failure for illegal user root from 222.186.30.167
Feb 23 17:07:01 dcd-gentoo sshd[18797]: User root from 222.186.30.167 not allowed because none of user's groups are listed in AllowGroups
Feb 23 17:07:05 dcd-gentoo sshd[18797]: error: PAM: Authentication failure for illegal user root from 222.186.30.167
Feb 23 17:07:05 dcd-gentoo sshd[18797]: Failed keyboard-interactive/pam for invalid user root from 222.186.30.167 port 27527 ssh2
...
2020-02-24 00:09:57
89.208.230.102 attack
Feb 23 15:31:33 klukluk sshd\[26048\]: Invalid user admin1 from 89.208.230.102
Feb 23 15:31:51 klukluk sshd\[26061\]: Invalid user admin1 from 89.208.230.102
Feb 23 15:32:08 klukluk sshd\[26064\]: Invalid user admin1 from 89.208.230.102
...
2020-02-23 23:58:19
178.128.22.249 attack
Feb 23 14:16:04 ovpn sshd\[22221\]: Invalid user bkroot from 178.128.22.249
Feb 23 14:16:04 ovpn sshd\[22221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.22.249
Feb 23 14:16:06 ovpn sshd\[22221\]: Failed password for invalid user bkroot from 178.128.22.249 port 51239 ssh2
Feb 23 14:27:20 ovpn sshd\[24949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.22.249  user=root
Feb 23 14:27:22 ovpn sshd\[24949\]: Failed password for root from 178.128.22.249 port 59515 ssh2
2020-02-24 00:08:30
83.252.11.112 attackspam
Honeypot attack, port: 5555, PTR: c83-252-11-112.bredband.comhem.se.
2020-02-24 00:14:27
85.238.35.18 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-24 00:21:10
123.24.162.179 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-24 00:19:01
185.53.88.125 attackbotsspam
Port 5082 scan denied
2020-02-23 23:42:35
125.214.49.175 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 125.214.49.175 (VN/Vietnam/-): 5 in the last 3600 secs - Fri Jun 22 11:53:13 2018
2020-02-24 00:12:50
113.186.241.135 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-02-24 00:13:02
104.131.14.14 attackbots
(sshd) Failed SSH login from 104.131.14.14 (US/United States/nyxstudios.moe): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 23 15:16:23 srv sshd[11650]: Invalid user work from 104.131.14.14 port 48203
Feb 23 15:16:24 srv sshd[11650]: Failed password for invalid user work from 104.131.14.14 port 48203 ssh2
Feb 23 15:22:06 srv sshd[11768]: Invalid user bitrix from 104.131.14.14 port 38228
Feb 23 15:22:09 srv sshd[11768]: Failed password for invalid user bitrix from 104.131.14.14 port 38228 ssh2
Feb 23 15:27:27 srv sshd[11843]: Invalid user redmine from 104.131.14.14 port 52984
2020-02-24 00:05:44

最近上报的IP列表

223.163.47.148 176.139.94.186 137.77.171.44 47.94.37.139
29.118.101.76 52.80.45.76 208.88.48.176 181.89.38.166
235.21.44.237 87.130.174.11 177.102.173.120 175.31.114.13
224.148.74.163 114.209.217.156 52.198.113.46 107.111.27.79
191.148.126.252 74.128.49.80 80.174.76.96 78.119.59.65