必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.148.212.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.148.212.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 10:58:25 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
68.212.148.199.in-addr.arpa domain name pointer 199.148.212.68.4k.usda.gov.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.212.148.199.in-addr.arpa	name = 199.148.212.68.4k.usda.gov.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
149.202.81.101 attack
149.202.81.101 - - [14/Dec/2019:07:32:35 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.202.81.101 - - [14/Dec/2019:07:32:36 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-14 16:06:56
164.132.56.243 attackbotsspam
Invalid user uk from 164.132.56.243 port 49585
2019-12-14 16:10:19
118.48.211.197 attack
2019-12-14T07:55:41.769512shield sshd\[6057\]: Invalid user yoyo from 118.48.211.197 port 65405
2019-12-14T07:55:41.773741shield sshd\[6057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.48.211.197
2019-12-14T07:55:43.727730shield sshd\[6057\]: Failed password for invalid user yoyo from 118.48.211.197 port 65405 ssh2
2019-12-14T08:02:28.271336shield sshd\[8030\]: Invalid user mongodb from 118.48.211.197 port 30566
2019-12-14T08:02:28.275739shield sshd\[8030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.48.211.197
2019-12-14 16:11:16
106.51.137.113 attackbots
Dec 13 01:37:43 h2065291 sshd[10002]: reveeclipse mapping checking getaddrinfo for broadband.actcorp.in [106.51.137.113] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec 13 01:37:43 h2065291 sshd[10002]: Invalid user heyne from 106.51.137.113
Dec 13 01:37:43 h2065291 sshd[10002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.137.113 
Dec 13 01:37:45 h2065291 sshd[10002]: Failed password for invalid user heyne from 106.51.137.113 port 40276 ssh2
Dec 13 01:37:45 h2065291 sshd[10002]: Received disconnect from 106.51.137.113: 11: Bye Bye [preauth]
Dec 13 01:45:16 h2065291 sshd[10170]: reveeclipse mapping checking getaddrinfo for broadband.actcorp.in [106.51.137.113] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec 13 01:45:16 h2065291 sshd[10170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.137.113  user=r.r
Dec 13 01:45:18 h2065291 sshd[10170]: Failed password for r.r from 106.51.137.113 port........
-------------------------------
2019-12-14 15:56:03
74.83.196.67 attack
fail2ban
2019-12-14 15:51:51
220.133.95.68 attackbots
2019-12-14T08:07:57.781324shield sshd\[9692\]: Invalid user sierra from 220.133.95.68 port 45782
2019-12-14T08:07:57.785599shield sshd\[9692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-133-95-68.hinet-ip.hinet.net
2019-12-14T08:07:59.447773shield sshd\[9692\]: Failed password for invalid user sierra from 220.133.95.68 port 45782 ssh2
2019-12-14T08:15:43.927742shield sshd\[11984\]: Invalid user pantages from 220.133.95.68 port 52674
2019-12-14T08:15:43.932051shield sshd\[11984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-133-95-68.hinet-ip.hinet.net
2019-12-14 16:16:44
103.47.60.37 attackbotsspam
Dec 14 08:34:54 nextcloud sshd\[4389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.60.37  user=root
Dec 14 08:34:56 nextcloud sshd\[4389\]: Failed password for root from 103.47.60.37 port 59524 ssh2
Dec 14 08:42:05 nextcloud sshd\[14317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.60.37  user=root
...
2019-12-14 16:27:21
92.46.247.103 attackbots
Unauthorised access (Dec 14) SRC=92.46.247.103 LEN=52 TTL=120 ID=24747 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec 14) SRC=92.46.247.103 LEN=52 TTL=120 ID=21000 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-14 16:12:00
106.13.201.142 attackspambots
Dec 14 04:27:04 firewall sshd[10463]: Invalid user brightmail from 106.13.201.142
Dec 14 04:27:05 firewall sshd[10463]: Failed password for invalid user brightmail from 106.13.201.142 port 37572 ssh2
Dec 14 04:32:40 firewall sshd[10555]: Invalid user ferreg from 106.13.201.142
...
2019-12-14 15:53:08
14.225.11.25 attackbots
Dec 13 21:54:04 php1 sshd\[358\]: Invalid user qwerty from 14.225.11.25
Dec 13 21:54:04 php1 sshd\[358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.11.25
Dec 13 21:54:06 php1 sshd\[358\]: Failed password for invalid user qwerty from 14.225.11.25 port 49394 ssh2
Dec 13 22:00:51 php1 sshd\[1022\]: Invalid user ku2sf from 14.225.11.25
Dec 13 22:00:51 php1 sshd\[1022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.11.25
2019-12-14 16:17:57
113.23.24.12 attackbots
1576304916 - 12/14/2019 07:28:36 Host: 113.23.24.12/113.23.24.12 Port: 445 TCP Blocked
2019-12-14 15:56:27
50.16.64.127 attack
Dec 13 22:01:48 php1 sshd\[21363\]: Invalid user ohho from 50.16.64.127
Dec 13 22:01:48 php1 sshd\[21363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-50-16-64-127.compute-1.amazonaws.com
Dec 13 22:01:50 php1 sshd\[21363\]: Failed password for invalid user ohho from 50.16.64.127 port 35542 ssh2
Dec 13 22:07:58 php1 sshd\[22159\]: Invalid user frederik from 50.16.64.127
Dec 13 22:07:58 php1 sshd\[22159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-50-16-64-127.compute-1.amazonaws.com
2019-12-14 16:16:07
134.209.12.162 attackbots
Dec  8 23:26:59 vtv3 sshd[12273]: Failed password for invalid user yv from 134.209.12.162 port 53602 ssh2
Dec  8 23:32:32 vtv3 sshd[14858]: Failed password for root from 134.209.12.162 port 32964 ssh2
Dec  8 23:43:22 vtv3 sshd[20507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.12.162 
Dec  8 23:43:24 vtv3 sshd[20507]: Failed password for invalid user murai from 134.209.12.162 port 48152 ssh2
Dec  8 23:48:54 vtv3 sshd[23095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.12.162 
Dec  8 23:59:53 vtv3 sshd[28479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.12.162 
Dec  8 23:59:55 vtv3 sshd[28479]: Failed password for invalid user cramerm from 134.209.12.162 port 42702 ssh2
Dec  9 00:05:35 vtv3 sshd[31660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.12.162 
Dec  9 00:16:30 vtv3 sshd[4543]: Failed password fo
2019-12-14 16:05:29
147.135.208.234 attackbots
Dec 14 12:55:39 vibhu-HP-Z238-Microtower-Workstation sshd\[5224\]: Invalid user ssh from 147.135.208.234
Dec 14 12:55:39 vibhu-HP-Z238-Microtower-Workstation sshd\[5224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.208.234
Dec 14 12:55:41 vibhu-HP-Z238-Microtower-Workstation sshd\[5224\]: Failed password for invalid user ssh from 147.135.208.234 port 59292 ssh2
Dec 14 13:04:59 vibhu-HP-Z238-Microtower-Workstation sshd\[5777\]: Invalid user http from 147.135.208.234
Dec 14 13:04:59 vibhu-HP-Z238-Microtower-Workstation sshd\[5777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.208.234
...
2019-12-14 15:58:51
106.52.24.64 attack
Dec 14 03:22:45 firewall sshd[9488]: Failed password for invalid user nfs from 106.52.24.64 port 60428 ssh2
Dec 14 03:28:34 firewall sshd[9591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.64  user=daemon
Dec 14 03:28:36 firewall sshd[9591]: Failed password for daemon from 106.52.24.64 port 56086 ssh2
...
2019-12-14 15:55:38

最近上报的IP列表

84.105.13.76 126.59.59.249 185.169.93.226 212.255.5.111
243.67.244.4 58.69.110.8 187.51.131.159 90.182.162.36
89.53.244.56 233.67.148.206 72.242.124.199 244.212.67.152
151.47.56.54 60.150.161.188 114.171.250.140 72.42.132.9
200.222.215.252 70.26.19.5 78.66.16.245 49.30.90.248