必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 206.213.68.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42585
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;206.213.68.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:56:39 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 39.68.213.206.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.68.213.206.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.222.56.80 attackbotsspam
Dec  5 20:12:45 MK-Soft-Root2 sshd[5848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.222.56.80 
Dec  5 20:12:46 MK-Soft-Root2 sshd[5848]: Failed password for invalid user akiba from 61.222.56.80 port 36992 ssh2
...
2019-12-06 03:23:15
194.67.90.112 attack
194.67.90.112 has been banned for [WebApp Attack]
...
2019-12-06 03:14:56
103.135.105.48 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-06 03:25:06
181.188.158.98 attackspam
Unauthorized connection attempt from IP address 181.188.158.98 on Port 445(SMB)
2019-12-06 02:55:22
123.19.45.146 attack
Unauthorized connection attempt from IP address 123.19.45.146 on Port 445(SMB)
2019-12-06 03:04:45
168.194.232.117 attack
Dec  5 18:29:16 mxgate1 sshd[32479]: Invalid user admin from 168.194.232.117 port 61651
Dec  5 18:29:17 mxgate1 sshd[32479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.232.117
Dec  5 18:29:19 mxgate1 sshd[32479]: Failed password for invalid user admin from 168.194.232.117 port 61651 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=168.194.232.117
2019-12-06 02:43:17
200.219.177.227 attackbotsspam
Unauthorized connection attempt from IP address 200.219.177.227 on Port 445(SMB)
2019-12-06 02:57:16
141.98.11.12 attack
" "
2019-12-06 03:21:17
106.13.145.183 attackspam
fail2ban
2019-12-06 02:45:46
203.110.166.51 attackspambots
Aug 25 12:04:44 vtv3 sshd[18567]: Failed password for invalid user ting from 203.110.166.51 port 47799 ssh2
Aug 25 12:07:29 vtv3 sshd[20167]: Invalid user michi from 203.110.166.51 port 47800
Aug 25 12:07:29 vtv3 sshd[20167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.166.51
Aug 25 12:18:44 vtv3 sshd[25742]: Invalid user rk from 203.110.166.51 port 47804
Aug 25 12:18:44 vtv3 sshd[25742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.166.51
Aug 25 12:18:45 vtv3 sshd[25742]: Failed password for invalid user rk from 203.110.166.51 port 47804 ssh2
Aug 25 12:21:43 vtv3 sshd[27290]: Invalid user anish from 203.110.166.51 port 47805
Aug 25 12:21:43 vtv3 sshd[27290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.166.51
Aug 25 12:33:26 vtv3 sshd[860]: Invalid user test from 203.110.166.51 port 47812
Aug 25 12:33:26 vtv3 sshd[860]: pam_unix(sshd:auth): authentication f
2019-12-06 02:52:27
180.124.236.112 attackbotsspam
Dec  5 16:00:42 grey postfix/smtpd\[5731\]: NOQUEUE: reject: RCPT from unknown\[180.124.236.112\]: 554 5.7.1 Service unavailable\; Client host \[180.124.236.112\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[180.124.236.112\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-06 03:24:24
222.186.175.154 attackspam
2019-12-05T19:13:37.792161abusebot-2.cloudsearch.cf sshd\[29865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
2019-12-06 03:16:15
202.130.122.50 attackspambots
Unauthorized connection attempt from IP address 202.130.122.50 on Port 445(SMB)
2019-12-06 03:00:21
130.61.83.71 attack
invalid user
2019-12-06 03:02:11
106.12.98.7 attackbots
Dec  5 15:52:02 * sshd[8718]: Failed password for mysql from 106.12.98.7 port 38846 ssh2
2019-12-06 03:15:09

最近上报的IP列表

83.143.59.11 20.109.65.25 212.197.13.181 255.39.190.114
198.114.45.158 45.88.13.179 59.83.124.224 91.24.6.191
205.144.201.91 127.174.169.47 79.173.219.251 35.110.219.81
241.124.176.218 196.213.232.103 72.210.162.134 222.174.165.241
139.162.1.194 144.66.234.77 248.38.58.250 234.194.131.75