必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.104.94.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59413
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.104.94.252.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 06:56:45 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
252.94.104.68.in-addr.arpa domain name pointer ip68-104-94-252.lv.lv.cox.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
252.94.104.68.in-addr.arpa	name = ip68-104-94-252.lv.lv.cox.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.65.16.102 attackspam
firewall-block, port(s): 26/tcp
2020-06-09 17:59:28
129.204.42.59 attackbotsspam
Jun  9 05:56:53 DAAP sshd[6259]: Invalid user sim from 129.204.42.59 port 54292
Jun  9 05:56:53 DAAP sshd[6259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.42.59
Jun  9 05:56:53 DAAP sshd[6259]: Invalid user sim from 129.204.42.59 port 54292
Jun  9 05:56:55 DAAP sshd[6259]: Failed password for invalid user sim from 129.204.42.59 port 54292 ssh2
Jun  9 06:01:56 DAAP sshd[6341]: Invalid user qm from 129.204.42.59 port 56560
...
2020-06-09 17:44:00
220.132.165.87 attackbotsspam
firewall-block, port(s): 23/tcp
2020-06-09 17:37:54
178.17.170.91 attackbots
xmlrpc attack
2020-06-09 17:31:36
188.186.108.110 attackbotsspam
PowerShell/Ploprolo.A
2020-06-09 17:45:32
102.128.169.9 attackbotsspam
DATE:2020-06-09 05:50:25, IP:102.128.169.9, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-06-09 17:38:56
137.74.41.119 attackbots
Jun  9 08:34:11 ns382633 sshd\[15636\]: Invalid user vpopmail from 137.74.41.119 port 44638
Jun  9 08:34:11 ns382633 sshd\[15636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.41.119
Jun  9 08:34:12 ns382633 sshd\[15636\]: Failed password for invalid user vpopmail from 137.74.41.119 port 44638 ssh2
Jun  9 08:42:18 ns382633 sshd\[17313\]: Invalid user admin from 137.74.41.119 port 36520
Jun  9 08:42:18 ns382633 sshd\[17313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.41.119
2020-06-09 17:46:27
112.196.149.7 attack
Jun  8 23:29:48 r.ca sshd[22384]: Failed password for invalid user asraf12 from 112.196.149.7 port 35842 ssh2
2020-06-09 17:55:34
185.175.93.37 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-06-09 17:27:39
212.83.183.57 attack
"fail2ban match"
2020-06-09 17:50:51
89.248.169.143 attackspam
Jun  9 10:34:35 ns382633 sshd\[5133\]: Invalid user lhf from 89.248.169.143 port 38488
Jun  9 10:34:35 ns382633 sshd\[5133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.248.169.143
Jun  9 10:34:37 ns382633 sshd\[5133\]: Failed password for invalid user lhf from 89.248.169.143 port 38488 ssh2
Jun  9 10:41:55 ns382633 sshd\[6781\]: Invalid user tipodirect from 89.248.169.143 port 54840
Jun  9 10:41:55 ns382633 sshd\[6781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.248.169.143
2020-06-09 17:39:12
1.138.83.211 attack
PowerShell/Ploprolo.A
2020-06-09 17:23:24
159.65.206.10 attack
TCP port 8080: Scan and connection
2020-06-09 17:30:32
116.73.83.123 attack
Automatic report - Port Scan Attack
2020-06-09 17:59:51
212.96.81.252 attack
firewall-block, port(s): 445/tcp
2020-06-09 17:41:49

最近上报的IP列表

35.156.144.4 89.232.247.8 147.249.208.69 175.104.78.65
85.98.179.84 21.202.244.61 57.56.243.65 45.214.72.84
114.6.117.22 240.162.92.175 205.188.108.43 217.252.243.173
142.156.37.220 250.13.218.146 7.90.39.121 204.176.126.99
210.116.228.134 26.192.71.72 234.148.90.72 207.75.178.98