必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.102.254.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.102.254.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 08:50:10 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
64.254.102.68.in-addr.arpa domain name pointer ip68-102-254-64.ks.ok.cox.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
64.254.102.68.in-addr.arpa	name = ip68-102-254-64.ks.ok.cox.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.88.235.36 attack
Jul 28 14:07:49 * sshd[8619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.88.235.36
Jul 28 14:07:51 * sshd[8619]: Failed password for invalid user uehara from 218.88.235.36 port 51416 ssh2
2020-07-28 20:38:04
75.109.220.94 attackspambots
Port 22 Scan, PTR: None
2020-07-28 20:40:45
207.244.92.4 attack
Jul 28 14:07:51 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=207.244.92.4 DST=77.73.69.240 LEN=437 TOS=0x00 PREC=0x00 TTL=51 ID=54865 DF PROTO=UDP SPT=5146 DPT=47260 LEN=417 Jul 28 14:07:51 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=207.244.92.4 DST=77.73.69.240 LEN=440 TOS=0x00 PREC=0x00 TTL=50 ID=54863 DF PROTO=UDP SPT=5146 DPT=47060 LEN=420 Jul 28 14:07:51 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=207.244.92.4 DST=77.73.69.240 LEN=438 TOS=0x00 PREC=0x00 TTL=50 ID=54864 DF PROTO=UDP SPT=5146 DPT=47160 LEN=418 Jul 28 14:07:51 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=207.244.92.4 DST=77.73.69.240 LEN=437 TOS=0x00 PREC=0x00 TTL=49 ID=54867 DF PROTO=UDP SPT=5146 DPT=47460 LEN=417 Jul 28 14:07:51 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=207.244.
...
2020-07-28 20:41:39
189.146.143.165 attack
Jul 28 00:01:37 hostnameis sshd[63984]: reveeclipse mapping checking getaddrinfo for dsl-189-146-143-165-dyn.prod-infinhostnameum.com.mx [189.146.143.165] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 28 00:01:37 hostnameis sshd[63984]: Invalid user maohy from 189.146.143.165
Jul 28 00:01:37 hostnameis sshd[63984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.146.143.165 
Jul 28 00:01:39 hostnameis sshd[63984]: Failed password for invalid user maohy from 189.146.143.165 port 29665 ssh2
Jul 28 00:01:39 hostnameis sshd[63984]: Received disconnect from 189.146.143.165: 11: Bye Bye [preauth]
Jul 28 00:04:21 hostnameis sshd[63990]: reveeclipse mapping checking getaddrinfo for dsl-189-146-143-165-dyn.prod-infinhostnameum.com.mx [189.146.143.165] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 28 00:04:21 hostnameis sshd[63990]: Invalid user word from 189.146.143.165
Jul 28 00:04:21 hostnameis sshd[63990]: pam_unix(sshd:auth): authentication fai........
------------------------------
2020-07-28 20:37:00
34.68.157.122 attackspam
xmlrpc attack
2020-07-28 20:21:24
178.33.67.12 attackbots
Jul 28 14:07:46 pve1 sshd[18942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.67.12 
Jul 28 14:07:48 pve1 sshd[18942]: Failed password for invalid user mike from 178.33.67.12 port 51842 ssh2
...
2020-07-28 20:44:43
111.229.78.120 attack
Jul 28 14:07:59 santamaria sshd\[10090\]: Invalid user zhanghongwei from 111.229.78.120
Jul 28 14:07:59 santamaria sshd\[10090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.120
Jul 28 14:08:02 santamaria sshd\[10090\]: Failed password for invalid user zhanghongwei from 111.229.78.120 port 38994 ssh2
...
2020-07-28 20:31:48
54.37.255.153 attack
[2020-07-28 08:07:36] NOTICE[1248] chan_sip.c: Registration from '' failed for '54.37.255.153:62631' - Wrong password
[2020-07-28 08:07:36] SECURITY[1275] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-28T08:07:36.231-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="5062010",SessionID="0x7f2720048e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/54.37.255.153/62631",Challenge="188ae195",ReceivedChallenge="188ae195",ReceivedHash="d9394dd46911051324571bb81c59e5ff"
[2020-07-28 08:08:18] NOTICE[1248] chan_sip.c: Registration from '' failed for '54.37.255.153:59522' - Wrong password
[2020-07-28 08:08:18] SECURITY[1275] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-28T08:08:18.159-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="951810",SessionID="0x7f2720048e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/54.
...
2020-07-28 20:16:21
89.232.192.40 attack
Jul 28 15:02:01 ift sshd\[29023\]: Invalid user caroldyb from 89.232.192.40Jul 28 15:02:03 ift sshd\[29023\]: Failed password for invalid user caroldyb from 89.232.192.40 port 37115 ssh2Jul 28 15:04:56 ift sshd\[29405\]: Invalid user jianhua from 89.232.192.40Jul 28 15:04:58 ift sshd\[29405\]: Failed password for invalid user jianhua from 89.232.192.40 port 59397 ssh2Jul 28 15:07:46 ift sshd\[29985\]: Invalid user longwj from 89.232.192.40
...
2020-07-28 20:47:35
134.209.90.139 attackspambots
Jul 28 14:07:58 vpn01 sshd[31777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.90.139
Jul 28 14:08:00 vpn01 sshd[31777]: Failed password for invalid user es from 134.209.90.139 port 55452 ssh2
...
2020-07-28 20:34:05
183.224.38.56 attack
Jul 28 13:02:41 rocket sshd[5109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.224.38.56
Jul 28 13:02:43 rocket sshd[5109]: Failed password for invalid user zky from 183.224.38.56 port 51422 ssh2
Jul 28 13:08:18 rocket sshd[5906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.224.38.56
...
2020-07-28 20:15:43
196.219.6.252 attack
1595938095 - 07/28/2020 14:08:15 Host: 196.219.6.252/196.219.6.252 Port: 445 TCP Blocked
2020-07-28 20:17:18
51.15.20.14 attackspambots
Multiple SSH authentication failures from 51.15.20.14
2020-07-28 20:39:29
107.170.249.243 attackspambots
Repeated brute force against a port
2020-07-28 20:21:39
46.101.113.206 attack
Jul 28 14:08:45 vm0 sshd[2330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.113.206
Jul 28 14:08:47 vm0 sshd[2330]: Failed password for invalid user hdfs from 46.101.113.206 port 38774 ssh2
...
2020-07-28 20:35:33

最近上报的IP列表

236.35.203.49 42.201.111.41 76.129.241.82 247.38.142.148
126.54.176.18 173.81.58.74 114.3.119.71 217.189.107.242
245.66.124.124 245.104.212.231 223.50.224.55 238.204.49.223
123.132.97.123 57.105.89.218 175.4.74.137 132.233.211.230
77.71.152.49 190.198.47.227 74.190.7.93 113.38.230.187