必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.68.40.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10353
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.68.40.1.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 150 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 02:01:00 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
1.40.68.217.in-addr.arpa domain name pointer omstudiemedel.se.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.40.68.217.in-addr.arpa	name = omstudiemedel.se.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.42.57 attackspambots
Sep 25 02:58:25 abendstille sshd\[5625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
Sep 25 02:58:27 abendstille sshd\[5625\]: Failed password for root from 222.186.42.57 port 26566 ssh2
Sep 25 02:58:30 abendstille sshd\[5625\]: Failed password for root from 222.186.42.57 port 26566 ssh2
Sep 25 02:58:32 abendstille sshd\[5625\]: Failed password for root from 222.186.42.57 port 26566 ssh2
Sep 25 02:58:34 abendstille sshd\[5718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
...
2020-09-25 09:02:44
115.236.67.42 attack
$f2bV_matches
2020-09-25 09:06:29
159.89.144.102 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: prod-sfo2.qencode-encoder-9137f07cfe8411eaa27feef0a7ddd79b.
2020-09-25 08:52:45
185.39.10.25 attackbots
ET DROP Spamhaus DROP Listed Traffic Inbound group 23 - port: 5901 proto: tcp cat: Misc Attackbytes: 60
2020-09-25 08:35:03
122.51.222.42 attackspam
SSH Invalid Login
2020-09-25 08:39:26
123.14.114.102 attack
Port probing on unauthorized port 5555
2020-09-25 09:01:54
82.62.153.15 attackbotsspam
82.62.153.15 (IT/Italy/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 24 18:31:06 server5 sshd[14305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.14.184.143  user=root
Sep 24 18:27:42 server5 sshd[13029]: Failed password for root from 82.62.153.15 port 53638 ssh2
Sep 24 18:26:23 server5 sshd[12313]: Failed password for root from 91.121.101.27 port 55950 ssh2
Sep 24 18:28:15 server5 sshd[13165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.217.169  user=root
Sep 24 18:28:16 server5 sshd[13165]: Failed password for root from 42.194.217.169 port 38062 ssh2

IP Addresses Blocked:

185.14.184.143 (NL/Netherlands/-)
2020-09-25 09:12:24
104.211.245.131 attack
2020-09-24 19:23:15.607141-0500  localhost sshd[50967]: Failed password for invalid user zaindoo from 104.211.245.131 port 4506 ssh2
2020-09-25 08:47:36
189.209.189.117 attackspam
Automatic report - Port Scan Attack
2020-09-25 08:50:19
122.51.161.231 attack
Sep 25 01:21:44 dhoomketu sshd[3347667]: Failed password for invalid user hxeadm from 122.51.161.231 port 45852 ssh2
Sep 25 01:22:51 dhoomketu sshd[3347698]: Invalid user cloudera from 122.51.161.231 port 53120
Sep 25 01:22:51 dhoomketu sshd[3347698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.161.231 
Sep 25 01:22:51 dhoomketu sshd[3347698]: Invalid user cloudera from 122.51.161.231 port 53120
Sep 25 01:22:54 dhoomketu sshd[3347698]: Failed password for invalid user cloudera from 122.51.161.231 port 53120 ssh2
...
2020-09-25 08:54:19
52.237.113.58 attackbotsspam
Sep 25 02:43:31 ip106 sshd[5357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.237.113.58 
Sep 25 02:43:34 ip106 sshd[5357]: Failed password for invalid user drmpro from 52.237.113.58 port 56852 ssh2
...
2020-09-25 09:11:17
192.241.239.50 attack
Sep 24 15:52:35 Host-KEWR-E postfix/smtps/smtpd[42000]: lost connection after CONNECT from unknown[192.241.239.50]
...
2020-09-25 09:11:43
52.255.161.213 attack
Sep 25 02:53:33 vpn01 sshd[15669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.255.161.213
Sep 25 02:53:35 vpn01 sshd[15669]: Failed password for invalid user dtransform from 52.255.161.213 port 11098 ssh2
...
2020-09-25 09:07:42
111.23.19.149 attackbotsspam
REQUESTED PAGE: /manager/html
2020-09-25 08:31:58
218.92.0.168 attack
$f2bV_matches
2020-09-25 09:05:36

最近上报的IP列表

217.69.13.16 217.69.139.3 217.69.138.41 217.69.139.20
217.69.139.200 217.69.139.51 217.69.139.52 217.69.139.202
217.69.254.102 217.69.38.154 217.69.76.60 217.70.121.138
217.7.141.151 217.69.223.214 217.70.131.214 217.69.47.157
217.69.43.138 217.69.7.36 217.69.89.172 217.70.161.90