必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.41.169.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.41.169.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:26:37 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 68.169.41.53.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.169.41.53.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.142.120.166 attack
2020-09-07 22:31:08 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data
2020-09-07 22:39:03 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=recherche@no-server.de\)
2020-09-07 22:39:32 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=recherche@no-server.de\)
2020-09-07 22:39:49 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=brandon@no-server.de\)
2020-09-07 22:40:19 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=brandon@no-server.de\)
2020-09-07 22:40:19 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=brandon@no-server.de\)
2020-09-07 22:40:19 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect au
...
2020-09-08 04:43:47
5.22.64.179 attack
(pop3d) Failed POP3 login from 5.22.64.179 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep  6 21:15:26 ir1 dovecot[3110802]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=5.22.64.179, lip=5.63.12.44, session=
2020-09-08 04:25:47
156.195.7.207 attackbotsspam
Attempted connection to port 23.
2020-09-08 04:15:35
94.245.134.94 attackspam
 TCP (SYN) 94.245.134.94:7027 -> port 445, len 52
2020-09-08 04:25:01
160.16.101.57 attack
160.16.101.57 (JP/Japan/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  7 12:35:43 cvps sshd[14616]: Failed password for root from 160.16.101.57 port 35866 ssh2
Sep  7 12:34:22 cvps sshd[14243]: Failed password for root from 176.31.163.192 port 47762 ssh2
Sep  7 12:44:45 cvps sshd[17810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.40.83  user=root
Sep  7 12:28:51 cvps sshd[12201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.225.205  user=root
Sep  7 12:28:53 cvps sshd[12201]: Failed password for root from 189.240.225.205 port 55814 ssh2

IP Addresses Blocked:
2020-09-08 04:32:31
45.143.223.106 attackbotsspam
[2020-09-06 16:00:05] NOTICE[1194][C-000015a7] chan_sip.c: Call from '' (45.143.223.106:51116) to extension '00441904911024' rejected because extension not found in context 'public'.
[2020-09-06 16:00:05] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-06T16:00:05.852-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441904911024",SessionID="0x7f2ddc04e988",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.223.106/51116",ACLName="no_extension_match"
[2020-09-06 16:00:42] NOTICE[1194][C-000015a8] chan_sip.c: Call from '' (45.143.223.106:53143) to extension '011441904911024' rejected because extension not found in context 'public'.
[2020-09-06 16:00:42] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-06T16:00:42.278-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441904911024",SessionID="0x7f2ddc04e988",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
...
2020-09-08 04:21:34
213.6.65.130 attackspam
Attempted connection to port 445.
2020-09-08 04:08:27
103.78.122.171 attackspam
Attempted connection to port 56422.
2020-09-08 04:20:04
41.42.6.89 attack
Attempted connection to port 23.
2020-09-08 04:06:54
201.17.28.14 attackspambots
Unauthorized connection attempt from IP address 201.17.28.14 on Port 445(SMB)
2020-09-08 04:14:01
191.252.116.200 attackbotsspam
Automatic report - XMLRPC Attack
2020-09-08 04:36:58
197.248.52.46 attack
Attempted connection to port 23.
2020-09-08 04:10:12
103.242.224.100 attackbots
 TCP (SYN) 103.242.224.100:63769 -> port 445, len 52
2020-09-08 04:28:35
124.113.193.108 attack
Sep  7 13:06:18 v26 sshd[29549]: Invalid user sanjavier from 124.113.193.108 port 59878
Sep  7 13:06:18 v26 sshd[29549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.113.193.108
Sep  7 13:06:20 v26 sshd[29549]: Failed password for invalid user sanjavier from 124.113.193.108 port 59878 ssh2
Sep  7 13:06:20 v26 sshd[29549]: Received disconnect from 124.113.193.108 port 59878:11: Bye Bye [preauth]
Sep  7 13:06:20 v26 sshd[29549]: Disconnected from 124.113.193.108 port 59878 [preauth]
Sep  7 13:15:53 v26 sshd[30768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.113.193.108  user=r.r
Sep  7 13:15:55 v26 sshd[30768]: Failed password for r.r from 124.113.193.108 port 55824 ssh2
Sep  7 13:15:56 v26 sshd[30768]: Received disconnect from 124.113.193.108 port 55824:11: Bye Bye [preauth]
Sep  7 13:15:56 v26 sshd[30768]: Disconnected from 124.113.193.108 port 55824 [preauth]


........
--------------------------------------------
2020-09-08 04:35:18
187.233.216.104 attackbotsspam
1599414065 - 09/06/2020 19:41:05 Host: 187.233.216.104/187.233.216.104 Port: 445 TCP Blocked
2020-09-08 04:18:59

最近上报的IP列表

227.17.250.178 30.243.38.36 136.194.121.79 126.186.83.108
243.217.88.142 231.193.137.109 197.239.138.177 92.90.107.58
255.16.135.2 24.220.134.92 185.224.214.237 224.158.153.2
107.21.226.93 61.156.32.36 85.88.6.15 101.148.167.47
219.207.234.80 152.37.176.178 147.105.36.145 177.16.173.62