必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 206.168.80.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;206.168.80.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:43:42 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 68.80.168.206.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 68.80.168.206.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.181.186 attackbots
Jul 23 04:30:32 srv-4 sshd\[8164\]: Invalid user ts3 from 178.128.181.186
Jul 23 04:30:32 srv-4 sshd\[8164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.181.186
Jul 23 04:30:34 srv-4 sshd\[8164\]: Failed password for invalid user ts3 from 178.128.181.186 port 49066 ssh2
...
2019-07-23 09:48:06
106.13.32.106 attack
2019-07-23T01:31:43.680009abusebot-5.cloudsearch.cf sshd\[29694\]: Invalid user anna from 106.13.32.106 port 56198
2019-07-23 09:44:36
2.139.209.78 attackspam
Jul 23 01:13:09 localhost sshd\[113015\]: Invalid user clayton from 2.139.209.78 port 40505
Jul 23 01:13:09 localhost sshd\[113015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
Jul 23 01:13:10 localhost sshd\[113015\]: Failed password for invalid user clayton from 2.139.209.78 port 40505 ssh2
Jul 23 01:21:25 localhost sshd\[113340\]: Invalid user shuang from 2.139.209.78 port 57724
Jul 23 01:21:25 localhost sshd\[113340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78
...
2019-07-23 09:24:49
197.55.75.208 attackbotsspam
Lines containing failures of 197.55.75.208
Jul 22 16:21:58 metroid sshd[19432]: warning: /etc/hosts.deny, line 18: can't verify hostname: getaddrinfo(host-197.55.75.208.tedata.net, AF_INET) failed
Jul 22 16:22:00 metroid sshd[19432]: Invalid user admin from 197.55.75.208 port 41440
Jul 22 16:22:01 metroid sshd[19432]: Connection closed by invalid user admin 197.55.75.208 port 41440 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.55.75.208
2019-07-23 09:19:25
151.80.144.255 attackbots
2019-07-23T03:22:06.139556cavecanem sshd[20075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.255  user=root
2019-07-23T03:22:07.508451cavecanem sshd[20075]: Failed password for root from 151.80.144.255 port 53037 ssh2
2019-07-23T03:26:10.381008cavecanem sshd[25397]: Invalid user kate from 151.80.144.255 port 50387
2019-07-23T03:26:10.383424cavecanem sshd[25397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.255
2019-07-23T03:26:10.381008cavecanem sshd[25397]: Invalid user kate from 151.80.144.255 port 50387
2019-07-23T03:26:12.916270cavecanem sshd[25397]: Failed password for invalid user kate from 151.80.144.255 port 50387 ssh2
2019-07-23T03:30:28.143382cavecanem sshd[30952]: Invalid user jenkins from 151.80.144.255 port 47737
2019-07-23T03:30:28.145875cavecanem sshd[30952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.144.255
201
...
2019-07-23 09:48:38
196.189.255.22 attackspambots
Jul 23 01:19:10 mxgate1 postfix/postscreen[31805]: CONNECT from [196.189.255.22]:31964 to [176.31.12.44]:25
Jul 23 01:19:10 mxgate1 postfix/dnsblog[31810]: addr 196.189.255.22 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 23 01:19:10 mxgate1 postfix/dnsblog[31810]: addr 196.189.255.22 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 23 01:19:10 mxgate1 postfix/dnsblog[31807]: addr 196.189.255.22 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 23 01:19:10 mxgate1 postfix/dnsblog[31809]: addr 196.189.255.22 listed by domain bl.spamcop.net as 127.0.0.2
Jul 23 01:19:10 mxgate1 postfix/dnsblog[31806]: addr 196.189.255.22 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 23 01:19:11 mxgate1 postfix/dnsblog[31808]: addr 196.189.255.22 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 23 01:19:16 mxgate1 postfix/postscreen[31805]: DNSBL rank 6 for [196.189.255.22]:31964
Jul x@x
Jul 23 01:19:16 mxgate1 postfix/postscreen[31805]: HANGUP after 0.55 from [196.18........
-------------------------------
2019-07-23 09:43:02
54.36.148.215 attackspambots
Automatic report - Banned IP Access
2019-07-23 09:08:38
34.94.12.4 attackspambots
23/tcp 23/tcp
[2019-07-23]2pkt
2019-07-23 09:45:47
144.217.4.14 attackspambots
Jul 23 01:54:07 vpn01 sshd\[10357\]: Invalid user user from 144.217.4.14
Jul 23 01:54:07 vpn01 sshd\[10357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.4.14
Jul 23 01:54:09 vpn01 sshd\[10357\]: Failed password for invalid user user from 144.217.4.14 port 56194 ssh2
2019-07-23 09:31:47
122.28.45.51 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-07-23 09:42:17
187.214.193.178 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 19:21:47,718 INFO [shellcode_manager] (187.214.193.178) no match, writing hexdump (7d199301548b087b5d93ff341f23f719 :1987327) - MS17010 (EternalBlue)
2019-07-23 09:37:00
81.215.192.243 attack
Caught in portsentry honeypot
2019-07-23 09:24:29
111.93.200.50 attackbots
Jul 23 03:34:28 eventyay sshd[31770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50
Jul 23 03:34:30 eventyay sshd[31770]: Failed password for invalid user server from 111.93.200.50 port 56064 ssh2
Jul 23 03:40:02 eventyay sshd[573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50
...
2019-07-23 09:46:52
160.153.154.8 attackspambots
Automatic report - Banned IP Access
2019-07-23 09:49:10
107.170.244.110 attack
Jul 22 20:55:23 vps200512 sshd\[9364\]: Invalid user robert from 107.170.244.110
Jul 22 20:55:23 vps200512 sshd\[9364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.244.110
Jul 22 20:55:26 vps200512 sshd\[9364\]: Failed password for invalid user robert from 107.170.244.110 port 56814 ssh2
Jul 22 21:01:43 vps200512 sshd\[9593\]: Invalid user images from 107.170.244.110
Jul 22 21:01:43 vps200512 sshd\[9593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.244.110
2019-07-23 09:16:06

最近上报的IP列表

18.65.61.138 21.50.38.221 121.64.114.1 194.84.206.183
181.248.64.25 216.38.249.14 56.5.218.2 123.172.4.45
59.50.3.239 8.142.138.173 229.64.47.102 218.24.115.57
144.163.35.251 168.163.22.63 13.11.58.81 40.132.23.230
255.89.219.78 150.119.55.125 143.31.151.3 152.50.65.188