必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Google LLC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.68.244.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38211
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.68.244.207.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 21:19:05 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
207.244.68.34.in-addr.arpa domain name pointer 207.244.68.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
207.244.68.34.in-addr.arpa	name = 207.244.68.34.bc.googleusercontent.com.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.255.168.202 attackspambots
Dec 15 15:44:10 ns3042688 sshd\[10879\]: Invalid user sdjiiptv from 51.255.168.202
Dec 15 15:44:11 ns3042688 sshd\[10879\]: Failed password for invalid user sdjiiptv from 51.255.168.202 port 49064 ssh2
Dec 15 15:49:05 ns3042688 sshd\[12616\]: Failed password for root from 51.255.168.202 port 55264 ssh2
Dec 15 15:54:02 ns3042688 sshd\[14444\]: Invalid user guest from 51.255.168.202
Dec 15 15:54:04 ns3042688 sshd\[14444\]: Failed password for invalid user guest from 51.255.168.202 port 32986 ssh2
...
2019-12-15 23:33:04
165.227.80.114 attackspambots
Dec 15 16:29:25 debian-2gb-nbg1-2 kernel: \[76555.528354\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=165.227.80.114 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=60662 PROTO=TCP SPT=56640 DPT=3625 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-15 23:42:13
209.97.179.209 attackbotsspam
Dec 15 16:30:01 loxhost sshd\[29475\]: Invalid user edith from 209.97.179.209 port 36426
Dec 15 16:30:01 loxhost sshd\[29475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.179.209
Dec 15 16:30:03 loxhost sshd\[29475\]: Failed password for invalid user edith from 209.97.179.209 port 36426 ssh2
Dec 15 16:35:22 loxhost sshd\[29657\]: Invalid user mike from 209.97.179.209 port 45372
Dec 15 16:35:22 loxhost sshd\[29657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.179.209
...
2019-12-15 23:39:26
222.186.175.140 attackspam
Dec 15 15:51:55 thevastnessof sshd[1951]: Failed password for root from 222.186.175.140 port 18742 ssh2
...
2019-12-15 23:52:09
123.31.31.12 attack
Automatic report - Banned IP Access
2019-12-15 23:42:45
157.245.163.88 attackspam
RDP Bruteforce
2019-12-15 23:30:11
80.211.75.33 attackbots
Dec 15 16:37:41 microserver sshd[2904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.75.33  user=root
Dec 15 16:37:43 microserver sshd[2904]: Failed password for root from 80.211.75.33 port 33402 ssh2
Dec 15 16:42:56 microserver sshd[3690]: Invalid user kafka from 80.211.75.33 port 39778
Dec 15 16:42:56 microserver sshd[3690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.75.33
Dec 15 16:42:59 microserver sshd[3690]: Failed password for invalid user kafka from 80.211.75.33 port 39778 ssh2
Dec 15 16:53:18 microserver sshd[5296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.75.33  user=root
Dec 15 16:53:20 microserver sshd[5296]: Failed password for root from 80.211.75.33 port 52974 ssh2
Dec 15 16:58:42 microserver sshd[6045]: Invalid user ghost from 80.211.75.33 port 59612
Dec 15 16:58:42 microserver sshd[6045]: pam_unix(sshd:auth): authentication failure; logname
2019-12-15 23:18:15
49.232.23.127 attackspam
Dec 15 15:48:19 sso sshd[9591]: Failed password for root from 49.232.23.127 port 53534 ssh2
...
2019-12-15 23:35:39
51.158.162.242 attackspambots
SSH Brute Force, server-1 sshd[6012]: Failed password for sshd from 51.158.162.242 port 51750 ssh2
2019-12-15 23:31:09
91.121.103.175 attack
--- report ---
Dec 15 11:55:01 sshd: Connection from 91.121.103.175 port 36482
Dec 15 11:55:02 sshd: Invalid user althoff from 91.121.103.175
Dec 15 11:55:04 sshd: Failed password for invalid user althoff from 91.121.103.175 port 36482 ssh2
Dec 15 11:55:05 sshd: Received disconnect from 91.121.103.175: 11: Bye Bye [preauth]
2019-12-15 23:17:54
80.211.112.81 attack
Dec 15 08:31:28 server sshd\[13847\]: Invalid user admin from 80.211.112.81
Dec 15 08:31:28 server sshd\[13847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.112.81 
Dec 15 08:31:30 server sshd\[13847\]: Failed password for invalid user admin from 80.211.112.81 port 55396 ssh2
Dec 15 17:53:45 server sshd\[25009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.112.81  user=root
Dec 15 17:53:48 server sshd\[25009\]: Failed password for root from 80.211.112.81 port 52402 ssh2
...
2019-12-15 23:47:41
115.88.25.178 attackbots
Dec 15 09:09:46 askasleikir sshd[117870]: Failed password for root from 115.88.25.178 port 59180 ssh2
2019-12-15 23:25:25
138.68.20.158 attackbotsspam
Dec 15 16:26:46 amit sshd\[17206\]: Invalid user ftp_test from 138.68.20.158
Dec 15 16:26:46 amit sshd\[17206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.20.158
Dec 15 16:26:48 amit sshd\[17206\]: Failed password for invalid user ftp_test from 138.68.20.158 port 49830 ssh2
...
2019-12-15 23:31:23
51.38.186.200 attack
Dec 15 15:53:47 MK-Soft-VM7 sshd[15901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.200 
Dec 15 15:53:48 MK-Soft-VM7 sshd[15901]: Failed password for invalid user 1QAZ!QAZ2WSX@WSX from 51.38.186.200 port 50206 ssh2
...
2019-12-15 23:49:10
111.231.75.83 attackbotsspam
Dec 15 15:47:05 MainVPS sshd[1916]: Invalid user admin from 111.231.75.83 port 50896
Dec 15 15:47:05 MainVPS sshd[1916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83
Dec 15 15:47:05 MainVPS sshd[1916]: Invalid user admin from 111.231.75.83 port 50896
Dec 15 15:47:07 MainVPS sshd[1916]: Failed password for invalid user admin from 111.231.75.83 port 50896 ssh2
Dec 15 15:54:23 MainVPS sshd[15725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83  user=root
Dec 15 15:54:25 MainVPS sshd[15725]: Failed password for root from 111.231.75.83 port 52054 ssh2
...
2019-12-15 23:05:37

最近上报的IP列表

160.20.253.37 108.147.159.54 118.201.195.135 111.200.106.232
8.105.222.178 198.20.103.246 202.53.133.192 205.152.106.32
218.64.163.231 140.129.16.145 114.108.137.88 100.85.86.115
195.248.100.239 181.194.187.232 205.137.84.223 198.200.34.193
66.26.58.92 122.175.62.201 166.175.120.247 63.174.246.249