必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
164.68.114.169 attackspam
Invalid user recepcao from 164.68.114.169 port 51692
2020-09-23 21:40:18
164.68.114.169 attackspam
20 attempts against mh-ssh on star
2020-09-23 14:00:19
164.68.114.169 attackbots
20 attempts against mh-ssh on sand
2020-09-23 05:49:28
164.68.114.173 attackspam
SSH/22 MH Probe, BF, Hack -
2020-02-13 08:50:18
164.68.114.50 attackbotsspam
5060/udp 5060/udp 5060/udp...
[2019-09-25/10-22]6pkt,1pt.(udp)
2019-10-23 04:43:23
164.68.114.188 attackbotsspam
Message ID	
Created at:	Wed, Dec 31, 1969 at 7:00 PM (Delivered after 1570427092 seconds)
From:	Costco Survey Member <5CPX7C9Y@5cpx7c9y.changeconditions.com>
To:	b@gmail.com
Subject:	You Hav'e (1) New Costco© Surve'y Rewar'd Ready to Claim!
SPF:	NEUTRAL with IP 164.68.114.188
2019-10-08 02:14:43
164.68.114.50 attack
Automatic report - Port Scan Attack
2019-09-30 00:09:05
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.68.114.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.68.114.70.			IN	A

;; AUTHORITY SECTION:
.			225	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:46:13 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
70.114.68.164.in-addr.arpa domain name pointer magicshot.org.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.114.68.164.in-addr.arpa	name = magicshot.org.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.189.209.143 attackspam
SSH/22 MH Probe, BF, Hack -
2020-02-10 21:18:04
177.32.58.68 attack
port
2020-02-10 20:56:36
180.254.123.163 attack
Unauthorized connection attempt from IP address 180.254.123.163 on Port 445(SMB)
2020-02-10 21:22:55
106.13.96.222 attack
Feb 10 04:47:56 *** sshd[10867]: Invalid user yld from 106.13.96.222
2020-02-10 21:28:04
114.38.22.32 attack
unauthorized connection attempt
2020-02-10 21:00:39
113.161.37.86 attackspam
Unauthorized connection attempt from IP address 113.161.37.86 on Port 445(SMB)
2020-02-10 21:30:01
117.247.24.209 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-02-10 20:46:15
195.95.147.98 attackspam
" "
2020-02-10 20:46:59
206.81.29.166 attackbots
Automatic report - Banned IP Access
2020-02-10 20:48:22
87.255.81.5 attackbots
Automatic report - Port Scan Attack
2020-02-10 21:20:51
106.13.123.29 attackbots
$f2bV_matches
2020-02-10 21:13:38
1.64.60.183 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-10 21:21:37
112.134.226.75 attackspam
Port 22 Scan, PTR: None
2020-02-10 20:57:49
201.87.42.105 attackspambots
Automatic report - Port Scan Attack
2020-02-10 21:09:09
222.252.20.68 attackspambots
Feb 10 07:08:50 mail sshd[10585]: Invalid user mother from 222.252.20.68
Feb 10 07:08:50 mail sshd[10585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.20.68
Feb 10 07:08:52 mail sshd[10585]: Failed password for invalid user mother from 222.252.20.68 port 62813 ssh2
Feb 10 07:08:52 mail sshd[10585]: Connection closed by 222.252.20.68 port 62813 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=222.252.20.68
2020-02-10 20:49:23

最近上报的IP列表

164.68.113.198 164.68.117.163 164.68.119.178 164.68.119.120
164.68.117.243 164.68.117.249 164.68.118.67 164.68.118.98
164.68.119.225 164.68.119.64 164.68.124.35 164.68.122.239
164.68.119.79 164.68.124.224 164.68.126.236 164.68.126.230
164.68.97.89 164.68.97.55 164.68.127.146 164.68.98.107