必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Morocco

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.68.138.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.68.138.198.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 17:48:50 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 198.138.68.196.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 198.138.68.196.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.253 attackbots
Jul  3 17:22:08 amit sshd\[25312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.253  user=root
Jul  3 17:22:10 amit sshd\[25312\]: Failed password for root from 218.92.0.253 port 47442 ssh2
Jul  3 17:22:32 amit sshd\[25314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.253  user=root
...
2020-07-03 23:30:17
164.163.211.4 attackbots
$f2bV_matches
2020-07-03 23:13:04
51.77.150.203 attackbotsspam
Jul  3 13:52:29 ns37 sshd[17701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.150.203
2020-07-03 23:08:39
192.35.169.41 attackspambots
 TCP (SYN) 192.35.169.41:12910 -> port 9013, len 44
2020-07-03 22:53:01
178.47.142.5 attack
2020-07-0304:10:041jrB9J-0007ZO-DE\<=info@whatsup2013.chH=\(localhost\)[178.47.142.5]:59066P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4985id=882492c1cae1cbc35f5aec40a7d3f9edeb7eb3@whatsup2013.chT="Matchactualfemalesforsexualintercourserightnow"forsangaretata1999@gmail.comxbcnvn@gmail.commrmaytag1974@gmail.com2020-07-0304:11:181jrBAc-0007jA-27\<=info@whatsup2013.chH=\(localhost\)[37.34.102.207]:33872P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4936id=8c23f3919ab16497b44abcefe43009a58664ef21e5@whatsup2013.chT="Signuptodaytogetsextonite"forsandeep_gura@hotmail.comgoodhardpaddling@gmail.comdigitlandscaping92@gmail.com2020-07-0304:10:461jrBA5-0007gA-Ms\<=info@whatsup2013.chH=\(localhost\)[113.172.156.54]:60556P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4928id=aecc01131833e61536c83e6d66b28b2704e6a6215f@whatsup2013.chT="Jointodaytolocatesextonight"forkjud@comcast.netjorda
2020-07-03 22:45:36
103.104.119.133 attackbotsspam
Jul  2 20:03:06 server1 sshd\[10361\]: Invalid user bao from 103.104.119.133
Jul  2 20:03:06 server1 sshd\[10361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.119.133 
Jul  2 20:03:07 server1 sshd\[10361\]: Failed password for invalid user bao from 103.104.119.133 port 54796 ssh2
Jul  2 20:07:50 server1 sshd\[11886\]: Invalid user kross from 103.104.119.133
Jul  2 20:07:50 server1 sshd\[11886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.119.133 
...
2020-07-03 23:21:53
192.34.61.161 attack
Jul  1 04:53:43 ahost sshd[31600]: Invalid user mig from 192.34.61.161
Jul  1 04:53:43 ahost sshd[31600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.34.61.161 
Jul  1 04:53:45 ahost sshd[31600]: Failed password for invalid user mig from 192.34.61.161 port 54576 ssh2
Jul  1 04:53:45 ahost sshd[31600]: Received disconnect from 192.34.61.161: 11: Bye Bye [preauth]
Jul  1 05:03:48 ahost sshd[2262]: Invalid user rocky from 192.34.61.161
Jul  1 05:03:48 ahost sshd[2262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.34.61.161 
Jul  1 05:03:49 ahost sshd[2262]: Failed password for invalid user rocky from 192.34.61.161 port 46994 ssh2
Jul  1 05:03:50 ahost sshd[2262]: Received disconnect from 192.34.61.161: 11: Bye Bye [preauth]
Jul  1 05:06:56 ahost sshd[2328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.34.61.161  user=postgres
Jul  1 0........
------------------------------
2020-07-03 23:20:55
123.108.35.186 attackbots
Jul  2 23:36:49 xeon sshd[58583]: Failed password for invalid user chains from 123.108.35.186 port 47776 ssh2
2020-07-03 23:16:46
218.92.0.171 attack
2020-07-03T16:59:09.832416vps751288.ovh.net sshd\[7522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
2020-07-03T16:59:11.662424vps751288.ovh.net sshd\[7522\]: Failed password for root from 218.92.0.171 port 33098 ssh2
2020-07-03T16:59:14.820945vps751288.ovh.net sshd\[7522\]: Failed password for root from 218.92.0.171 port 33098 ssh2
2020-07-03T16:59:18.196883vps751288.ovh.net sshd\[7522\]: Failed password for root from 218.92.0.171 port 33098 ssh2
2020-07-03T16:59:21.318828vps751288.ovh.net sshd\[7522\]: Failed password for root from 218.92.0.171 port 33098 ssh2
2020-07-03 23:02:34
94.180.247.20 attackspam
2020-07-03T14:38:55.312463mail.csmailer.org sshd[762]: Failed password for root from 94.180.247.20 port 38214 ssh2
2020-07-03T14:41:55.618297mail.csmailer.org sshd[1106]: Invalid user webmaster from 94.180.247.20 port 35142
2020-07-03T14:41:55.623854mail.csmailer.org sshd[1106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.180.247.20
2020-07-03T14:41:55.618297mail.csmailer.org sshd[1106]: Invalid user webmaster from 94.180.247.20 port 35142
2020-07-03T14:41:57.503948mail.csmailer.org sshd[1106]: Failed password for invalid user webmaster from 94.180.247.20 port 35142 ssh2
...
2020-07-03 22:48:17
209.17.96.26 attackspambots
port scan and connect, tcp 8081 (blackice-icecap)
2020-07-03 23:00:34
175.144.248.172 attackspambots
Jul304:10:45server6sshd[5801]:refusedconnectfrom175.144.248.172\(175.144.248.172\)Jul304:10:45server6sshd[5803]:refusedconnectfrom175.144.248.172\(175.144.248.172\)Jul304:10:45server6sshd[5805]:refusedconnectfrom175.144.248.172\(175.144.248.172\)Jul304:10:45server6sshd[5804]:refusedconnectfrom175.144.248.172\(175.144.248.172\)Jul304:10:48server6sshd[5808]:refusedconnectfrom175.144.248.172\(175.144.248.172\)
2020-07-03 22:52:19
112.85.42.176 attackspambots
Jul  3 15:20:58 scw-6657dc sshd[6152]: Failed password for root from 112.85.42.176 port 28936 ssh2
Jul  3 15:20:58 scw-6657dc sshd[6152]: Failed password for root from 112.85.42.176 port 28936 ssh2
Jul  3 15:21:02 scw-6657dc sshd[6152]: Failed password for root from 112.85.42.176 port 28936 ssh2
...
2020-07-03 23:23:51
185.143.72.16 attackspambots
Jul  3 00:18:34 web01.agentur-b-2.de postfix/smtpd[2133622]: warning: unknown[185.143.72.16]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  3 00:20:02 web01.agentur-b-2.de postfix/smtpd[2133622]: warning: unknown[185.143.72.16]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  3 00:21:32 web01.agentur-b-2.de postfix/smtpd[2129285]: warning: unknown[185.143.72.16]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  3 00:22:58 web01.agentur-b-2.de postfix/smtpd[2129285]: warning: unknown[185.143.72.16]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  3 00:24:27 web01.agentur-b-2.de postfix/smtpd[2129285]: warning: unknown[185.143.72.16]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-03 22:45:12
185.38.3.138 attackspam
2020-07-03T16:38:30.974629ks3355764 sshd[18853]: Invalid user test1 from 185.38.3.138 port 43714
2020-07-03T16:38:32.730468ks3355764 sshd[18853]: Failed password for invalid user test1 from 185.38.3.138 port 43714 ssh2
...
2020-07-03 22:53:31

最近上报的IP列表

47.47.224.131 244.1.54.166 2.182.169.132 33.202.8.78
2.3.78.188 89.187.73.55 208.39.79.44 43.43.103.76
132.36.251.140 216.10.14.126 190.83.240.82 233.74.132.158
252.43.221.141 90.179.164.17 20.110.56.47 43.28.146.3
187.131.209.15 75.199.204.34 136.122.41.74 166.88.211.125