必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Multicast Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 228.111.126.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;228.111.126.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 13:35:30 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 68.126.111.228.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.126.111.228.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.144.131.93 attack
2019-10-13T09:20:22.862198  sshd[9689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.131.93  user=root
2019-10-13T09:20:25.237618  sshd[9689]: Failed password for root from 122.144.131.93 port 3850 ssh2
2019-10-13T09:25:41.042374  sshd[9756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.131.93  user=root
2019-10-13T09:25:42.876000  sshd[9756]: Failed password for root from 122.144.131.93 port 36868 ssh2
2019-10-13T09:31:22.421024  sshd[9855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.131.93  user=root
2019-10-13T09:31:24.400277  sshd[9855]: Failed password for root from 122.144.131.93 port 41602 ssh2
...
2019-10-13 15:52:30
79.137.34.248 attackspam
Oct 13 06:53:36 lnxmysql61 sshd[32289]: Failed password for root from 79.137.34.248 port 44500 ssh2
Oct 13 06:57:16 lnxmysql61 sshd[300]: Failed password for root from 79.137.34.248 port 35779 ssh2
2019-10-13 15:46:54
92.50.40.201 attackspam
Oct  8 02:41:20 reporting7 sshd[29641]: User r.r from 92.50.40.201 not allowed because not listed in AllowUsers
Oct  8 02:41:20 reporting7 sshd[29641]: Failed password for invalid user r.r from 92.50.40.201 port 38794 ssh2
Oct  8 02:48:13 reporting7 sshd[1658]: User r.r from 92.50.40.201 not allowed because not listed in AllowUsers
Oct  8 02:48:13 reporting7 sshd[1658]: Failed password for invalid user r.r from 92.50.40.201 port 49400 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=92.50.40.201
2019-10-13 16:14:33
194.9.27.162 attackbots
[portscan] Port scan
2019-10-13 15:51:23
180.179.120.70 attackbotsspam
Oct 13 07:02:43 www5 sshd\[11005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.120.70  user=root
Oct 13 07:02:45 www5 sshd\[11005\]: Failed password for root from 180.179.120.70 port 39675 ssh2
Oct 13 07:08:47 www5 sshd\[11967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.120.70  user=root
...
2019-10-13 15:56:31
81.22.45.190 attack
10/13/2019-09:37:42.845083 81.22.45.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-13 15:40:34
129.226.56.22 attackbotsspam
Oct 13 08:55:05 jane sshd[24179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.56.22 
Oct 13 08:55:08 jane sshd[24179]: Failed password for invalid user 1q2w3e from 129.226.56.22 port 54892 ssh2
...
2019-10-13 15:40:13
51.77.137.211 attackspambots
Oct 13 09:57:31 jane sshd[13537]: Failed password for root from 51.77.137.211 port 40966 ssh2
...
2019-10-13 16:12:40
123.185.67.1 attackspam
" "
2019-10-13 15:32:59
69.3.118.101 attackbots
Oct 13 09:11:57 vps sshd[27357]: Failed password for root from 69.3.118.101 port 61489 ssh2
Oct 13 09:33:53 vps sshd[28245]: Failed password for root from 69.3.118.101 port 58221 ssh2
...
2019-10-13 16:00:38
178.128.156.159 attackspam
Oct 13 06:12:31 localhost sshd\[15719\]: Invalid user R00T@1234 from 178.128.156.159 port 58934
Oct 13 06:12:31 localhost sshd\[15719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.156.159
Oct 13 06:12:33 localhost sshd\[15719\]: Failed password for invalid user R00T@1234 from 178.128.156.159 port 58934 ssh2
2019-10-13 15:42:01
194.182.86.133 attack
2019-10-13T07:39:54.292672abusebot-2.cloudsearch.cf sshd\[25567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.86.133  user=root
2019-10-13 15:51:06
218.60.41.227 attackbotsspam
Oct 12 21:06:40 sachi sshd\[1712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.41.227  user=root
Oct 12 21:06:42 sachi sshd\[1712\]: Failed password for root from 218.60.41.227 port 50506 ssh2
Oct 12 21:11:08 sachi sshd\[2174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.41.227  user=root
Oct 12 21:11:10 sachi sshd\[2174\]: Failed password for root from 218.60.41.227 port 40843 ssh2
Oct 12 21:15:37 sachi sshd\[2587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.41.227  user=root
2019-10-13 15:44:29
51.38.57.78 attack
Triggered by Fail2Ban at Vostok web server
2019-10-13 16:01:47
186.5.109.211 attackbotsspam
Oct 13 07:07:19 www sshd\[122862\]: Invalid user Q2w3e4r5t6 from 186.5.109.211
Oct 13 07:07:19 www sshd\[122862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.5.109.211
Oct 13 07:07:21 www sshd\[122862\]: Failed password for invalid user Q2w3e4r5t6 from 186.5.109.211 port 29543 ssh2
...
2019-10-13 16:05:09

最近上报的IP列表

166.32.104.104 91.214.117.151 206.12.172.130 150.110.160.248
90.39.212.85 145.10.106.21 114.238.167.82 175.107.132.38
131.106.58.86 196.211.204.49 30.117.6.26 60.185.17.188
181.234.176.111 116.253.211.102 219.88.144.18 162.39.225.209
109.198.138.152 186.205.145.39 135.2.244.195 155.148.238.131