必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, Province of China

运营商(isp): Hoshin Multimedia Center Inc

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbotsspam
5555/tcp 34567/tcp...
[2019-09-30/10-25]6pkt,2pt.(tcp)
2019-10-25 14:09:30
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.68.14.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18490
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;219.68.14.239.			IN	A

;; AUTHORITY SECTION:
.			477	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102401 1800 900 604800 86400

;; Query time: 123 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 25 14:09:27 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
239.14.68.219.in-addr.arpa domain name pointer host-219-68-14-239.dynamic.kbtelecom.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.14.68.219.in-addr.arpa	name = host-219-68-14-239.dynamic.kbtelecom.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.184.67.121 attackspambots
Automatic report - Port Scan Attack
2020-04-03 01:46:11
92.222.224.189 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-04-03 01:11:06
121.10.41.92 attackbots
Unauthorized connection attempt from IP address 121.10.41.92 on Port 445(SMB)
2020-04-03 01:01:36
165.227.55.56 attack
SSH Brute-Force attacks
2020-04-03 01:42:50
111.229.115.117 attackbotsspam
4867:Apr  1 18:33:41 fmk sshd[19631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.115.117  user=r.r
4868:Apr  1 18:33:42 fmk sshd[19631]: Failed password for r.r from 111.229.115.117 port 55666 ssh2
4869:Apr  1 18:33:43 fmk sshd[19631]: Received disconnect from 111.229.115.117 port 55666:11: Bye Bye [preauth]
4870:Apr  1 18:33:43 fmk sshd[19631]: Disconnected from authenticating user r.r 111.229.115.117 port 55666 [preauth]
4881:Apr  1 18:46:35 fmk sshd[19767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.115.117  user=r.r
4882:Apr  1 18:46:37 fmk sshd[19767]: Failed password for r.r from 111.229.115.117 port 34902 ssh2
4883:Apr  1 18:46:38 fmk sshd[19767]: Received disconnect from 111.229.115.117 port 34902:11: Bye Bye [preauth]
4884:Apr  1 18:46:38 fmk sshd[19767]: Disconnected from authenticating user r.r 111.229.115.117 port 34902 [preauth]
4894:Apr  1 18:51:40 fmk ........
------------------------------
2020-04-03 01:44:54
31.16.59.18 attack
Automatic report - Port Scan Attack
2020-04-03 00:58:46
45.142.195.2 attack
Apr  2 19:14:14 relay postfix/smtpd\[3090\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 19:14:51 relay postfix/smtpd\[9166\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 19:15:04 relay postfix/smtpd\[11923\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 19:15:39 relay postfix/smtpd\[31692\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  2 19:15:52 relay postfix/smtpd\[16777\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-03 01:21:16
120.237.123.242 attack
Apr  2 17:51:15 jane sshd[21214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.237.123.242 
Apr  2 17:51:17 jane sshd[21214]: Failed password for invalid user 222222 from 120.237.123.242 port 1386 ssh2
...
2020-04-03 01:15:35
114.27.179.93 attackspam
Unauthorized connection attempt from IP address 114.27.179.93 on Port 445(SMB)
2020-04-03 01:05:54
177.75.132.238 attackspambots
1585831502 - 04/02/2020 14:45:02 Host: 177.75.132.238/177.75.132.238 Port: 445 TCP Blocked
2020-04-03 01:10:09
167.114.98.229 attack
2020-04-02T09:39:21.557833linuxbox-skyline sshd[45289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229  user=root
2020-04-02T09:39:23.721470linuxbox-skyline sshd[45289]: Failed password for root from 167.114.98.229 port 36076 ssh2
...
2020-04-03 01:28:15
202.12.103.61 attack
...
2020-04-03 01:37:47
115.112.62.88 attackbotsspam
ssh intrusion attempt
2020-04-03 01:40:37
49.232.131.80 attackbots
Apr  2 18:58:12 vps647732 sshd[6031]: Failed password for root from 49.232.131.80 port 40780 ssh2
...
2020-04-03 01:12:31
104.168.190.136 attackbotsspam
Apr  2 03:57:32 our-server-hostname postfix/smtpd[13963]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 03:57:34 our-server-hostname postfix/smtpd[13963]: disconnect from unknown[104.168.190.136]
Apr  2 03:57:35 our-server-hostname postfix/smtpd[14964]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 03:57:37 our-server-hostname postfix/smtpd[14964]: disconnect from unknown[104.168.190.136]
Apr  2 03:58:36 our-server-hostname postfix/smtpd[13963]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 03:58:38 our-server-hostname postfix/smtpd[13963]: disconnect from unknown[104.168.190.136]
Apr  2 03:58:43 our-server-hostname postfix/smtpd[15456]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 03:58:45 our-server-hostname postfix/smtpd[15456]: disconnect from unknown[104.168.190.136]
Apr  2 04:00:21 our-server-hostname postfix/smtpd[14964]: connect from unknown[104.168.190.136]
Apr x@x
Apr  2 04:00:23 our-server-hostname postfix/smtpd[14964]: disconnect........
-------------------------------
2020-04-03 01:48:39

最近上报的IP列表

42.141.132.45 60.172.5.109 186.53.46.21 171.244.68.9
1.48.249.210 198.108.66.29 181.12.175.212 113.104.192.95
124.156.241.4 36.224.87.165 113.106.12.9 98.235.207.237
58.217.157.90 27.168.75.133 70.23.56.22 58.216.159.178
36.72.216.207 122.10.89.175 139.155.9.108 203.109.126.108