必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Malaysia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.68.16.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50987
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.68.16.211.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:10:48 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
211.16.68.56.in-addr.arpa domain name pointer ec2-56-68-16-211.ap-southeast-5.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
211.16.68.56.in-addr.arpa	name = ec2-56-68-16-211.ap-southeast-5.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.156.168.229 attackspam
Nov 29 15:28:41 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:220.156.168.229\]
...
2019-11-29 23:08:34
206.189.72.217 attackbotsspam
Nov 29 16:05:32 ns382633 sshd\[8536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.72.217  user=root
Nov 29 16:05:34 ns382633 sshd\[8536\]: Failed password for root from 206.189.72.217 port 59128 ssh2
Nov 29 16:14:45 ns382633 sshd\[9885\]: Invalid user operator from 206.189.72.217 port 47298
Nov 29 16:14:45 ns382633 sshd\[9885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.72.217
Nov 29 16:14:47 ns382633 sshd\[9885\]: Failed password for invalid user operator from 206.189.72.217 port 47298 ssh2
2019-11-29 23:22:35
185.175.93.19 attackbotsspam
Nov 29 16:10:07 h2177944 kernel: \[7915482.682660\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=39469 PROTO=TCP SPT=51897 DPT=3842 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 16:11:12 h2177944 kernel: \[7915546.948808\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=56060 PROTO=TCP SPT=51897 DPT=3940 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 16:11:17 h2177944 kernel: \[7915552.224744\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=20194 PROTO=TCP SPT=51897 DPT=3760 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 16:11:40 h2177944 kernel: \[7915575.047094\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=35982 PROTO=TCP SPT=51897 DPT=4001 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 29 16:14:14 h2177944 kernel: \[7915729.216835\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.19 DST=85.214.117.9
2019-11-29 23:24:40
45.141.86.128 attackbots
2019-11-29T16:12:37.459087struts4.enskede.local sshd\[2777\]: Invalid user admin from 45.141.86.128 port 1460
2019-11-29T16:12:37.537201struts4.enskede.local sshd\[2777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.86.128
2019-11-29T16:12:40.619835struts4.enskede.local sshd\[2777\]: Failed password for invalid user admin from 45.141.86.128 port 1460 ssh2
2019-11-29T16:12:41.583857struts4.enskede.local sshd\[2779\]: Invalid user support from 45.141.86.128 port 35847
2019-11-29T16:12:41.627547struts4.enskede.local sshd\[2779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.86.128
...
2019-11-29 23:39:46
107.180.68.145 attack
$f2bV_matches
2019-11-29 23:17:43
1.23.185.98 attackspam
Nov 29 17:07:41 microserver sshd[50409]: Invalid user luo from 1.23.185.98 port 47090
Nov 29 17:07:41 microserver sshd[50409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.23.185.98
Nov 29 17:07:44 microserver sshd[50409]: Failed password for invalid user luo from 1.23.185.98 port 47090 ssh2
Nov 29 17:07:51 microserver sshd[50417]: Invalid user shao from 1.23.185.98 port 47584
Nov 29 17:07:51 microserver sshd[50417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.23.185.98
Nov 29 17:24:57 microserver sshd[52994]: Invalid user jacob from 1.23.185.98 port 60566
Nov 29 17:24:57 microserver sshd[52994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.23.185.98
Nov 29 17:24:59 microserver sshd[52994]: Failed password for invalid user jacob from 1.23.185.98 port 60566 ssh2
Nov 29 17:25:13 microserver sshd[53370]: Invalid user user from 1.23.185.98 port 60924
Nov 29 17:25:13 microserver s
2019-11-29 23:05:59
116.239.253.145 attack
Nov 29 10:05:29 eola postfix/smtpd[18002]: connect from unknown[116.239.253.145]
Nov 29 10:05:29 eola postfix/smtpd[18002]: lost connection after AUTH from unknown[116.239.253.145]
Nov 29 10:05:29 eola postfix/smtpd[18002]: disconnect from unknown[116.239.253.145] ehlo=1 auth=0/1 commands=1/2
Nov 29 10:05:30 eola postfix/smtpd[18002]: connect from unknown[116.239.253.145]
Nov 29 10:05:33 eola postfix/smtpd[18002]: lost connection after AUTH from unknown[116.239.253.145]
Nov 29 10:05:33 eola postfix/smtpd[18002]: disconnect from unknown[116.239.253.145] ehlo=1 auth=0/1 commands=1/2
Nov 29 10:05:34 eola postfix/smtpd[18002]: connect from unknown[116.239.253.145]
Nov 29 10:05:37 eola postfix/smtpd[18002]: lost connection after AUTH from unknown[116.239.253.145]
Nov 29 10:05:37 eola postfix/smtpd[18002]: disconnect from unknown[116.239.253.145] ehlo=1 auth=0/1 commands=1/2
Nov 29 10:05:38 eola postfix/smtpd[18002]: connect from unknown[116.239.253.145]
Nov 29 10:05:39 eola ........
-------------------------------
2019-11-29 23:46:34
200.117.185.230 attackspam
Nov 29 16:00:59 ns381471 sshd[9923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.117.185.230
Nov 29 16:01:01 ns381471 sshd[9923]: Failed password for invalid user minchew from 200.117.185.230 port 47361 ssh2
2019-11-29 23:04:27
51.140.60.221 attackspam
\[2019-11-29 10:12:21\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-29T10:12:21.464-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441603976936",SessionID="0x7f26c48e9848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.140.60.221/57260",ACLName="no_extension_match"
\[2019-11-29 10:13:54\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-29T10:13:54.215-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442038075093",SessionID="0x7f26c4b0adc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.140.60.221/53547",ACLName="no_extension_match"
\[2019-11-29 10:14:28\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-29T10:14:28.640-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442922550332",SessionID="0x7f26c4a9e0e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.140.60.221/60735",ACLName="no_ex
2019-11-29 23:17:30
106.53.75.212 attackbots
Nov 29 16:26:12 legacy sshd[11545]: Failed password for root from 106.53.75.212 port 42034 ssh2
Nov 29 16:32:28 legacy sshd[11671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.75.212
Nov 29 16:32:30 legacy sshd[11671]: Failed password for invalid user goutte from 106.53.75.212 port 45558 ssh2
...
2019-11-29 23:44:03
207.154.247.249 attackspam
[munged]::443 207.154.247.249 - - [29/Nov/2019:16:13:51 +0100] "POST /[munged]: HTTP/1.1" 200 8950 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 207.154.247.249 - - [29/Nov/2019:16:14:02 +0100] "POST /[munged]: HTTP/1.1" 200 8950 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 207.154.247.249 - - [29/Nov/2019:16:14:02 +0100] "POST /[munged]: HTTP/1.1" 200 8950 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 207.154.247.249 - - [29/Nov/2019:16:14:04 +0100] "POST /[munged]: HTTP/1.1" 200 8950 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 207.154.247.249 - - [29/Nov/2019:16:14:04 +0100] "POST /[munged]: HTTP/1.1" 200 8950 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 207.154.247.249 - - [29/Nov/2019:16:14:05 +0100] "POST /[munged]: HTTP/1.1" 200 8950 "-" "Mozilla/5.
2019-11-29 23:29:53
220.225.118.170 attackbotsspam
Nov 29 16:05:10 vps sshd[26130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.118.170 
Nov 29 16:05:12 vps sshd[26130]: Failed password for invalid user ohkitani from 220.225.118.170 port 55750 ssh2
Nov 29 16:14:17 vps sshd[26549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.225.118.170 
...
2019-11-29 23:21:48
45.115.99.38 attackbotsspam
Nov 29 15:32:20 localhost sshd\[63136\]: Invalid user sexmachine from 45.115.99.38 port 34444
Nov 29 15:32:20 localhost sshd\[63136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.115.99.38
Nov 29 15:32:22 localhost sshd\[63136\]: Failed password for invalid user sexmachine from 45.115.99.38 port 34444 ssh2
Nov 29 15:36:02 localhost sshd\[63262\]: Invalid user siemensmeyer from 45.115.99.38 port 52231
Nov 29 15:36:02 localhost sshd\[63262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.115.99.38
...
2019-11-29 23:39:00
5.172.19.21 attackspambots
Nov 25 16:47:57 Aberdeen-m4-Access auth.info sshd[24833]: Invalid user hobby from 5.172.19.21 port 51038
Nov 25 16:47:57 Aberdeen-m4-Access auth.info sshd[24833]: Failed password for invalid user hobby from 5.172.19.21 port 51038 ssh2
Nov 25 16:47:58 Aberdeen-m4-Access auth.info sshd[24833]: Received disconnect from 5.172.19.21 port 51038:11: Bye Bye [preauth]
Nov 25 16:47:58 Aberdeen-m4-Access auth.info sshd[24833]: Disconnected from 5.172.19.21 port 51038 [preauth]
Nov 25 16:47:58 Aberdeen-m4-Access auth.notice sshguard[12566]: Attack from "5.172.19.21" on service 100 whostnameh danger 10.
Nov 25 16:47:58 Aberdeen-m4-Access auth.notice sshguard[12566]: Attack from "5.172.19.21" on service 100 whostnameh danger 10.
Nov 25 16:47:58 Aberdeen-m4-Access auth.notice sshguard[12566]: Attack from "5.172.19.21" on service 100 whostnameh danger 10.
Nov 25 16:47:58 Aberdeen-m4-Access auth.warn sshguard[12566]: Blocking "5.172.19.21/32" for 240 secs (3 attacks in 0 secs, after 2 a........
------------------------------
2019-11-29 23:40:17
51.77.148.248 attackspambots
Automatic report - Banned IP Access
2019-11-29 23:23:25

最近上报的IP列表

212.91.14.142 254.191.27.139 38.139.148.38 89.101.183.27
22.184.9.175 168.79.30.214 158.127.227.22 181.204.248.253
94.22.27.56 19.97.39.118 138.211.21.31 160.17.189.234
69.208.90.1 52.84.24.114 207.140.234.212 179.92.230.98
65.149.49.54 202.151.205.18 43.137.63.50 22.55.190.68