必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.12.198.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.12.198.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 06:17:52 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
b'Host 68.198.12.56.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 56.12.198.68.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
68.183.184.7 attack
schuetzenmusikanten.de 68.183.184.7 [26/Jul/2020:23:54:05 +0200] "POST /wp-login.php HTTP/1.1" 200 20140 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
schuetzenmusikanten.de 68.183.184.7 [26/Jul/2020:23:54:08 +0200] "POST /wp-login.php HTTP/1.1" 200 20145 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-27 06:32:12
77.120.163.103 attack
Dovecot Invalid User Login Attempt.
2020-07-27 06:48:53
122.70.133.26 attackbots
Jul 26 23:49:06 lukav-desktop sshd\[23644\]: Invalid user nginx from 122.70.133.26
Jul 26 23:49:06 lukav-desktop sshd\[23644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.70.133.26
Jul 26 23:49:08 lukav-desktop sshd\[23644\]: Failed password for invalid user nginx from 122.70.133.26 port 40832 ssh2
Jul 26 23:54:07 lukav-desktop sshd\[23694\]: Invalid user opc from 122.70.133.26
Jul 26 23:54:07 lukav-desktop sshd\[23694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.70.133.26
2020-07-27 06:37:10
51.83.40.227 attackbots
Invalid user victor from 51.83.40.227 port 40936
2020-07-27 06:42:17
142.93.200.252 attack
Jul 27 00:15:58 jane sshd[2950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.200.252 
Jul 27 00:16:00 jane sshd[2950]: Failed password for invalid user nisha from 142.93.200.252 port 47436 ssh2
...
2020-07-27 06:45:49
51.83.133.24 attackbotsspam
Jul 26 22:48:04 haigwepa sshd[19971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.133.24 
Jul 26 22:48:07 haigwepa sshd[19971]: Failed password for invalid user sas from 51.83.133.24 port 51834 ssh2
...
2020-07-27 06:30:06
58.57.15.29 attackbots
2020-07-27T00:21:35.548895vps751288.ovh.net sshd\[28681\]: Invalid user ramesh from 58.57.15.29 port 27458
2020-07-27T00:21:35.556931vps751288.ovh.net sshd\[28681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.15.29
2020-07-27T00:21:37.641512vps751288.ovh.net sshd\[28681\]: Failed password for invalid user ramesh from 58.57.15.29 port 27458 ssh2
2020-07-27T00:25:26.771923vps751288.ovh.net sshd\[28717\]: Invalid user blynk from 58.57.15.29 port 43280
2020-07-27T00:25:26.779042vps751288.ovh.net sshd\[28717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.15.29
2020-07-27 06:43:49
180.69.27.26 attackspam
Jul 26 18:12:29 george sshd[26893]: Failed password for invalid user zabbix from 180.69.27.26 port 57430 ssh2
Jul 26 18:16:53 george sshd[26930]: Invalid user xtra from 180.69.27.26 port 43208
Jul 26 18:16:53 george sshd[26930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.69.27.26 
Jul 26 18:16:56 george sshd[26930]: Failed password for invalid user xtra from 180.69.27.26 port 43208 ssh2
Jul 26 18:21:17 george sshd[26976]: Invalid user paulj from 180.69.27.26 port 57220
...
2020-07-27 06:32:49
62.234.146.45 attackspam
Invalid user ect from 62.234.146.45 port 60184
2020-07-27 06:36:08
91.121.65.15 attack
Invalid user vnc from 91.121.65.15 port 34438
2020-07-27 06:21:35
222.186.175.151 attack
Jul 26 23:18:18 rocket sshd[20011]: Failed password for root from 222.186.175.151 port 33602 ssh2
Jul 26 23:18:21 rocket sshd[20011]: Failed password for root from 222.186.175.151 port 33602 ssh2
Jul 26 23:18:24 rocket sshd[20011]: Failed password for root from 222.186.175.151 port 33602 ssh2
...
2020-07-27 06:20:37
117.33.137.19 attack
Jul 26 23:15:44 h1745522 sshd[26407]: Invalid user google from 117.33.137.19 port 35781
Jul 26 23:15:44 h1745522 sshd[26407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.137.19
Jul 26 23:15:44 h1745522 sshd[26407]: Invalid user google from 117.33.137.19 port 35781
Jul 26 23:15:46 h1745522 sshd[26407]: Failed password for invalid user google from 117.33.137.19 port 35781 ssh2
Jul 26 23:19:14 h1745522 sshd[26494]: Invalid user cx from 117.33.137.19 port 60157
Jul 26 23:19:14 h1745522 sshd[26494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.33.137.19
Jul 26 23:19:14 h1745522 sshd[26494]: Invalid user cx from 117.33.137.19 port 60157
Jul 26 23:19:16 h1745522 sshd[26494]: Failed password for invalid user cx from 117.33.137.19 port 60157 ssh2
Jul 26 23:22:47 h1745522 sshd[26604]: Invalid user belem from 117.33.137.19 port 56300
...
2020-07-27 06:39:32
213.32.23.58 attackbots
Jul 26 23:00:30 Ubuntu-1404-trusty-64-minimal sshd\[9954\]: Invalid user shimada from 213.32.23.58
Jul 26 23:00:30 Ubuntu-1404-trusty-64-minimal sshd\[9954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.23.58
Jul 26 23:00:33 Ubuntu-1404-trusty-64-minimal sshd\[9954\]: Failed password for invalid user shimada from 213.32.23.58 port 39972 ssh2
Jul 26 23:07:44 Ubuntu-1404-trusty-64-minimal sshd\[13531\]: Invalid user oms from 213.32.23.58
Jul 26 23:07:44 Ubuntu-1404-trusty-64-minimal sshd\[13531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.23.58
2020-07-27 06:44:51
91.121.91.82 attack
$f2bV_matches
2020-07-27 06:53:58
101.91.200.186 attackbots
Jul 26 21:36:23 vps-51d81928 sshd[185012]: Invalid user coin from 101.91.200.186 port 47190
Jul 26 21:36:23 vps-51d81928 sshd[185012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.200.186 
Jul 26 21:36:23 vps-51d81928 sshd[185012]: Invalid user coin from 101.91.200.186 port 47190
Jul 26 21:36:24 vps-51d81928 sshd[185012]: Failed password for invalid user coin from 101.91.200.186 port 47190 ssh2
Jul 26 21:38:46 vps-51d81928 sshd[185031]: Invalid user deploy from 101.91.200.186 port 39948
...
2020-07-27 06:27:34

最近上报的IP列表

136.96.35.221 45.198.231.169 146.124.230.158 236.83.105.110
221.31.227.30 122.182.210.235 75.152.143.29 164.127.151.118
86.129.110.123 74.188.97.154 64.207.25.86 77.221.156.240
100.244.157.15 166.179.194.91 195.163.71.13 134.127.147.239
36.61.182.43 85.207.169.128 191.49.221.227 244.26.85.57