必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Poland

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
51.68.142.163 attackspam
May  9 04:02:29 mout sshd[27545]: Invalid user shivanand from 51.68.142.163 port 45582
2020-05-09 19:43:28
51.68.142.163 attackspambots
May  6 06:20:25 web01 sshd[24532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.142.163 
May  6 06:20:27 web01 sshd[24532]: Failed password for invalid user arkserver from 51.68.142.163 port 45608 ssh2
...
2020-05-06 19:03:13
51.68.142.163 attackspam
May  3 20:53:13 sip sshd[97089]: Failed password for invalid user cil from 51.68.142.163 port 57510 ssh2
May  3 20:57:57 sip sshd[97282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.142.163  user=root
May  3 20:57:59 sip sshd[97282]: Failed password for root from 51.68.142.163 port 42388 ssh2
...
2020-05-04 03:31:27
51.68.142.163 attack
May  2 12:30:36 XXX sshd[43461]: Invalid user joe from 51.68.142.163 port 37464
2020-05-03 08:24:54
51.68.142.141 spamattack
Wtf
2020-05-01 23:41:16
51.68.142.141 spamattack
Wtf
2020-05-01 23:41:15
51.68.142.163 attackspam
2020-05-01T07:29:48.651100dmca.cloudsearch.cf sshd[22436]: Invalid user apps from 51.68.142.163 port 39328
2020-05-01T07:29:48.657264dmca.cloudsearch.cf sshd[22436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.ip-51-68-142.eu
2020-05-01T07:29:48.651100dmca.cloudsearch.cf sshd[22436]: Invalid user apps from 51.68.142.163 port 39328
2020-05-01T07:29:50.662645dmca.cloudsearch.cf sshd[22436]: Failed password for invalid user apps from 51.68.142.163 port 39328 ssh2
2020-05-01T07:33:41.774110dmca.cloudsearch.cf sshd[22839]: Invalid user cb from 51.68.142.163 port 51622
2020-05-01T07:33:41.779964dmca.cloudsearch.cf sshd[22839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.ip-51-68-142.eu
2020-05-01T07:33:41.774110dmca.cloudsearch.cf sshd[22839]: Invalid user cb from 51.68.142.163 port 51622
2020-05-01T07:33:43.765697dmca.cloudsearch.cf sshd[22839]: Failed password for invalid user cb from 51.68.142.
...
2020-05-01 16:36:45
51.68.142.10 attackbots
Apr 26 16:51:53 debian-2gb-nbg1-2 kernel: \[10171648.254588\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.68.142.10 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=19308 PROTO=TCP SPT=54099 DPT=16091 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-27 00:46:43
51.68.142.163 attackspam
Wordpress malicious attack:[sshd]
2020-04-22 19:41:00
51.68.142.10 attack
Invalid user admin7 from 51.68.142.10 port 60678
2020-04-21 22:41:34
51.68.142.10 attack
Apr 20 19:51:16 vmd48417 sshd[2477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.142.10
2020-04-21 02:28:26
51.68.142.10 attack
2020-04-13T22:54:27.961065linuxbox-skyline sshd[108676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.142.10  user=root
2020-04-13T22:54:30.358674linuxbox-skyline sshd[108676]: Failed password for root from 51.68.142.10 port 36644 ssh2
...
2020-04-14 14:44:10
51.68.142.10 attackspambots
Invalid user thomas from 51.68.142.10 port 36210
2020-04-12 15:08:55
51.68.142.10 attackspam
Invalid user postgres from 51.68.142.10 port 57692
2020-04-11 13:03:09
51.68.142.10 attackspam
k+ssh-bruteforce
2020-04-08 01:36:31
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.68.142.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;51.68.142.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 04:13:51 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
48.142.68.51.in-addr.arpa domain name pointer vps-00ab306f.vps.ovh.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.142.68.51.in-addr.arpa	name = vps-00ab306f.vps.ovh.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.132.30.27 attackbotsspam
Invalid user ashley from 120.132.30.27 port 43420
2020-03-24 21:35:34
153.36.77.73 attackspambots
Unauthorized connection attempt detected from IP address 153.36.77.73 to port 2323 [T]
2020-03-24 21:28:11
222.186.42.7 attackspambots
Mar 24 14:54:52 vps691689 sshd[3730]: Failed password for root from 222.186.42.7 port 35684 ssh2
Mar 24 15:02:17 vps691689 sshd[4055]: Failed password for root from 222.186.42.7 port 32937 ssh2
...
2020-03-24 22:03:30
222.186.180.142 attack
SSH Brute-Force reported by Fail2Ban
2020-03-24 22:01:28
113.53.110.20 attackbotsspam
Unauthorized connection attempt detected from IP address 113.53.110.20 to port 8000 [T]
2020-03-24 21:43:08
27.2.122.76 attackspambots
Unauthorized connection attempt detected from IP address 27.2.122.76 to port 23 [T]
2020-03-24 21:58:56
183.63.37.70 attackbots
Unauthorized connection attempt detected from IP address 183.63.37.70 to port 1433 [T]
2020-03-24 22:12:38
120.24.215.154 attack
Unauthorized connection attempt detected from IP address 120.24.215.154 to port 6380 [T]
2020-03-24 21:36:10
182.92.151.31 attack
Unauthorized connection attempt detected from IP address 182.92.151.31 to port 80 [T]
2020-03-24 22:13:44
103.10.87.54 attackspam
1433/tcp 1433/tcp 1433/tcp...
[2020-01-25/03-24]62pkt,1pt.(tcp)
2020-03-24 21:49:20
116.114.95.202 attackspam
Unauthorized connection attempt detected from IP address 116.114.95.202 to port 23 [T]
2020-03-24 21:40:08
220.124.97.96 attackbotsspam
Unauthorized connection attempt detected from IP address 220.124.97.96 to port 23 [T]
2020-03-24 22:09:12
86.91.191.103 attack
Exploit Attempt
2020-03-24 21:52:24
180.177.77.98 attackbots
Unauthorized connection attempt detected from IP address 180.177.77.98 to port 9530 [T]
2020-03-24 21:24:25
185.153.199.217 attack
Unauthorized connection attempt detected from IP address 185.153.199.217 to port 9566
2020-03-24 21:22:25

最近上报的IP列表

168.133.114.103 45.141.159.112 48.65.200.207 148.62.234.96
109.236.101.12 76.27.169.101 14.52.166.61 219.72.110.246
246.61.20.24 101.0.147.49 175.139.51.99 167.144.132.80
65.93.111.204 4.238.252.94 58.95.39.191 228.67.140.200
234.57.215.58 151.52.212.249 142.166.197.104 17.22.191.219