必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Mountain View

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Google LLC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.58.199.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41763
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.58.199.68.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 04 14:01:16 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
68.199.58.216.in-addr.arpa domain name pointer syd15s01-in-f4.1e100.net.
68.199.58.216.in-addr.arpa domain name pointer syd15s01-in-f68.1e100.net.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
68.199.58.216.in-addr.arpa	name = syd15s01-in-f4.1e100.net.
68.199.58.216.in-addr.arpa	name = syd15s01-in-f68.1e100.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.169.239.161 attackbotsspam
spam
2020-02-16 17:27:24
119.93.51.104 attackbots
1581828976 - 02/16/2020 05:56:16 Host: 119.93.51.104/119.93.51.104 Port: 445 TCP Blocked
2020-02-16 17:31:41
73.205.75.142 attackspam
unauthorized connection attempt
2020-02-16 17:04:18
95.154.185.199 attack
unauthorized connection attempt
2020-02-16 17:21:56
132.145.131.67 attackspam
Feb 12 22:30:29 hgb10301 sshd[10104]: Invalid user jay from 132.145.131.67 port 51912
Feb 12 22:30:31 hgb10301 sshd[10104]: Failed password for invalid user jay from 132.145.131.67 port 51912 ssh2
Feb 12 22:30:32 hgb10301 sshd[10104]: Received disconnect from 132.145.131.67 port 51912:11: Bye Bye [preauth]
Feb 12 22:30:32 hgb10301 sshd[10104]: Disconnected from 132.145.131.67 port 51912 [preauth]
Feb 12 22:35:35 hgb10301 sshd[10323]: Invalid user rozana from 132.145.131.67 port 57126
Feb 12 22:35:37 hgb10301 sshd[10323]: Failed password for invalid user rozana from 132.145.131.67 port 57126 ssh2
Feb 12 22:35:37 hgb10301 sshd[10323]: Received disconnect from 132.145.131.67 port 57126:11: Bye Bye [preauth]
Feb 12 22:35:37 hgb10301 sshd[10323]: Disconnected from 132.145.131.67 port 57126 [preauth]
Feb 12 22:36:42 hgb10301 sshd[10378]: Invalid user django from 132.145.131.67 port 40848
Feb 12 22:36:44 hgb10301 sshd[10378]: Failed password for invalid user django from 132.14........
-------------------------------
2020-02-16 16:45:24
125.46.130.111 attack
unauthorized connection attempt
2020-02-16 17:17:27
200.91.29.150 attack
unauthorized connection attempt
2020-02-16 16:52:02
31.223.16.179 attackbots
Automatic report - Port Scan Attack
2020-02-16 16:46:54
41.33.83.212 attack
Unauthorized connection attempt from IP address 41.33.83.212 on Port 445(SMB)
2020-02-16 17:23:49
177.158.37.82 attackbots
unauthorized connection attempt
2020-02-16 17:09:20
124.156.200.106 attackbotsspam
unauthorized connection attempt
2020-02-16 17:01:45
129.208.10.136 attackspam
unauthorized connection attempt
2020-02-16 17:00:47
82.17.118.142 attack
Port 23 (Telnet) access denied
2020-02-16 17:03:49
174.108.180.250 attack
20/2/16@01:16:16: FAIL: Alarm-Network address from=174.108.180.250
20/2/16@01:16:16: FAIL: Alarm-Network address from=174.108.180.250
...
2020-02-16 17:29:45
142.4.107.72 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-16 17:31:12

最近上报的IP列表

5.152.158.70 207.154.246.140 27.7.243.118 177.7.27.114
213.202.212.191 158.140.177.168 154.0.75.25 61.174.53.3
123.13.215.168 89.144.44.45 77.199.87.64 64.32.25.34
208.68.37.169 206.189.89.125 190.197.80.160 186.77.202.165
14.247.117.200 94.249.25.172 3.86.246.47 87.207.49.195