必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.139.68.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60393
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.139.68.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 11:40:08 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 28.68.139.61.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.68.139.61.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.84.192 attackspam
2020-07-06T04:48:22.171720shield sshd\[25109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.192  user=root
2020-07-06T04:48:24.319859shield sshd\[25109\]: Failed password for root from 106.13.84.192 port 43090 ssh2
2020-07-06T04:52:12.597898shield sshd\[26859\]: Invalid user dpp from 106.13.84.192 port 35410
2020-07-06T04:52:12.601330shield sshd\[26859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.192
2020-07-06T04:52:14.661738shield sshd\[26859\]: Failed password for invalid user dpp from 106.13.84.192 port 35410 ssh2
2020-07-06 16:23:20
213.202.212.45 attackbots
spam
2020-07-06 16:44:43
117.69.191.18 attack
Jul  6 08:56:22 srv01 postfix/smtpd\[9421\]: warning: unknown\[117.69.191.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  6 08:56:39 srv01 postfix/smtpd\[9421\]: warning: unknown\[117.69.191.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  6 08:56:55 srv01 postfix/smtpd\[9421\]: warning: unknown\[117.69.191.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  6 08:57:13 srv01 postfix/smtpd\[9421\]: warning: unknown\[117.69.191.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  6 08:57:25 srv01 postfix/smtpd\[9421\]: warning: unknown\[117.69.191.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-06 16:43:30
80.211.97.251 attackbotsspam
ssh brute force
2020-07-06 16:55:53
117.239.180.188 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-07-06 16:57:05
103.99.251.106 attack
VNC brute force attack detected by fail2ban
2020-07-06 17:01:11
37.193.251.225 attack
Unauthorized login attempt detected
2020-07-06 16:42:40
115.134.128.90 attackspambots
Jul  6 16:11:37 localhost sshd[587529]: Invalid user amol from 115.134.128.90 port 34744
...
2020-07-06 16:57:23
106.12.190.104 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-07-06 16:18:18
103.28.66.221 attack
firewall-block, port(s): 26/tcp
2020-07-06 16:46:05
117.89.135.170 attack
$f2bV_matches
2020-07-06 16:28:28
120.203.5.92 attackspambots
Unauthorized connection attempt detected from IP address 120.203.5.92 to port 23
2020-07-06 16:52:12
175.202.231.248 attackspambots
Jul  6 07:07:49 vserver sshd\[20770\]: Invalid user pi from 175.202.231.248Jul  6 07:07:49 vserver sshd\[20772\]: Invalid user pi from 175.202.231.248Jul  6 07:07:52 vserver sshd\[20772\]: Failed password for invalid user pi from 175.202.231.248 port 37544 ssh2Jul  6 07:07:52 vserver sshd\[20770\]: Failed password for invalid user pi from 175.202.231.248 port 37542 ssh2
...
2020-07-06 16:30:35
61.177.172.168 attackspambots
Jul  6 10:45:22 OPSO sshd\[390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
Jul  6 10:45:24 OPSO sshd\[390\]: Failed password for root from 61.177.172.168 port 3087 ssh2
Jul  6 10:45:27 OPSO sshd\[390\]: Failed password for root from 61.177.172.168 port 3087 ssh2
Jul  6 10:45:31 OPSO sshd\[390\]: Failed password for root from 61.177.172.168 port 3087 ssh2
Jul  6 10:45:34 OPSO sshd\[390\]: Failed password for root from 61.177.172.168 port 3087 ssh2
2020-07-06 16:52:40
13.70.199.80 attack
WordPress wp-login brute force :: 13.70.199.80 0.080 BYPASS [06/Jul/2020:08:20:43  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2003 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-06 16:21:25

最近上报的IP列表

67.122.115.211 22.18.121.39 172.59.126.187 236.89.31.189
2.127.20.43 248.147.11.168 5.232.72.213 47.205.33.32
88.50.138.6 59.236.133.127 203.244.236.161 115.9.200.61
222.158.222.144 180.255.247.124 12.242.43.15 222.168.190.250
108.133.228.163 157.31.192.237 135.218.49.198 152.57.15.170