必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.68.51.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.68.51.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:18:02 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
219.51.68.42.in-addr.arpa domain name pointer 42-68-51-219.emome-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.51.68.42.in-addr.arpa	name = 42-68-51-219.emome-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.108.30.156 attackbotsspam
Unauthorised access (Sep  2) SRC=201.108.30.156 LEN=52 TTL=114 ID=3414 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-02 22:06:41
186.122.105.226 attackbotsspam
Sep  2 15:16:08 srv206 sshd[16291]: Invalid user edencraft from 186.122.105.226
...
2019-09-02 22:20:37
45.82.153.37 attackbots
Sep  2 15:54:39 mail postfix/smtpd\[4391\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
Sep  2 15:54:48 mail postfix/smtpd\[15717\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
Sep  2 15:56:27 mail postfix/smtpd\[4401\]: warning: unknown\[45.82.153.37\]: SASL PLAIN authentication failed:
2019-09-02 22:02:04
185.159.158.108 attack
SQL injection:/index.php?menu_selected=53'A=0&language=fr&sub_menu_selected=979
2019-09-02 22:16:09
84.53.211.74 attackbots
445/tcp 445/tcp 445/tcp
[2019-09-02]3pkt
2019-09-02 21:58:48
173.239.37.152 attackbots
Sep  2 15:23:34 debian sshd\[15557\]: Invalid user bot from 173.239.37.152 port 46652
Sep  2 15:23:34 debian sshd\[15557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.239.37.152
...
2019-09-02 22:25:14
113.181.39.214 attackspam
19/9/2@09:16:25: FAIL: Alarm-Intrusion address from=113.181.39.214
...
2019-09-02 22:05:08
117.50.5.83 attack
Sep  2 13:16:14 MK-Soft-VM7 sshd\[25405\]: Invalid user ridley from 117.50.5.83 port 42416
Sep  2 13:16:14 MK-Soft-VM7 sshd\[25405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.5.83
Sep  2 13:16:16 MK-Soft-VM7 sshd\[25405\]: Failed password for invalid user ridley from 117.50.5.83 port 42416 ssh2
...
2019-09-02 22:11:50
167.114.115.22 attackspam
Sep  2 13:58:14 game-panel sshd[29900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.115.22
Sep  2 13:58:16 game-panel sshd[29900]: Failed password for invalid user hassan from 167.114.115.22 port 47208 ssh2
Sep  2 14:02:24 game-panel sshd[30060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.115.22
2019-09-02 22:26:10
112.217.225.61 attackbots
Sep  2 03:49:06 web1 sshd\[24164\]: Invalid user hou from 112.217.225.61
Sep  2 03:49:06 web1 sshd\[24164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.225.61
Sep  2 03:49:08 web1 sshd\[24164\]: Failed password for invalid user hou from 112.217.225.61 port 21532 ssh2
Sep  2 03:53:58 web1 sshd\[24593\]: Invalid user joelma from 112.217.225.61
Sep  2 03:53:58 web1 sshd\[24593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.225.61
2019-09-02 22:10:18
82.211.50.166 attackbotsspam
NAME : DE-ACCELERATED-20031010 + e-mail abuse : abuse@accelerated.de CIDR : 82.211.0.0/18 | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack DE - block certain countries :) IP: 82.211.50.166  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-09-02 22:59:36
34.236.237.253 attackbotsspam
Lines containing failures of 34.236.237.253
Sep  2 15:12:32 hal sshd[7481]: Did not receive identification string from 34.236.237.253 port 52316
Sep  2 15:13:20 hal sshd[7577]: Invalid user 5.95.178.208 from 34.236.237.253 port 52090
Sep  2 15:13:20 hal sshd[7577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.236.237.253 
Sep  2 15:13:22 hal sshd[7577]: Failed password for invalid user 5.95.178.208 from 34.236.237.253 port 52090 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=34.236.237.253
2019-09-02 22:20:07
52.231.31.11 attack
Sep  2 13:15:26 MK-Soft-VM6 sshd\[28108\]: Invalid user 00local22 from 52.231.31.11 port 47930
Sep  2 13:15:26 MK-Soft-VM6 sshd\[28108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.31.11
Sep  2 13:15:29 MK-Soft-VM6 sshd\[28108\]: Failed password for invalid user 00local22 from 52.231.31.11 port 47930 ssh2
...
2019-09-02 23:01:57
114.35.158.166 attack
Port Scan: TCP/34567
2019-09-02 23:23:42
83.43.117.57 attackbots
Sep  2 09:54:17 TORMINT sshd\[16966\]: Invalid user if from 83.43.117.57
Sep  2 09:54:17 TORMINT sshd\[16966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.43.117.57
Sep  2 09:54:18 TORMINT sshd\[16966\]: Failed password for invalid user if from 83.43.117.57 port 59686 ssh2
...
2019-09-02 22:27:16

最近上报的IP列表

132.188.252.243 71.142.201.156 44.156.119.197 36.233.55.237
65.192.63.99 75.46.79.216 124.179.42.59 252.55.245.44
72.114.15.221 187.115.14.166 139.86.225.25 66.42.12.104
225.230.247.207 71.43.16.134 192.198.242.32 18.71.19.227
138.11.143.172 58.118.4.58 4.7.214.34 143.177.162.148