必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.109.122.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.109.122.89.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 17:35:09 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
89.122.109.68.in-addr.arpa domain name pointer ip68-109-122-89.ri.ri.cox.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.122.109.68.in-addr.arpa	name = ip68-109-122-89.ri.ri.cox.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.73.45.186 attackspam
60001/tcp	anomaly: tcp_port_scan, 1001 > threshold 1000, repeats 5315 times
2019-07-04 18:25:04
159.65.148.49 attackspam
TCP src-port=55626   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (392)
2019-07-04 18:06:49
188.43.18.245 attack
[portscan] Port scan
2019-07-04 18:44:06
68.183.183.18 attackbotsspam
Jul  4 12:08:41 ns37 sshd[22654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.183.18
Jul  4 12:08:43 ns37 sshd[22654]: Failed password for invalid user carmel from 68.183.183.18 port 54338 ssh2
Jul  4 12:12:46 ns37 sshd[23080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.183.18
2019-07-04 18:22:43
201.48.16.97 attackspambots
spamassassin . MISSING_HEADERS[1.2] . SPF_SOFTFAIL[1.0] . HELO_NO_DOMAIN[2.2] . REPLYTO_WITHOUT_TO_CC[1.9] . FREEMAIL_FORGED_REPLYTO[2.5] . FROM_MISSP_REPLYTO[0.3] . TO_NO_BRKTS_FROM_MSSP[1.2] . FROM_MISSP_EH_MATCH[0.3] . TO_NO_BRKTS_MSFT[2.5] . FORGED_MUA_OUTLOOK[2.8] _ _ (386)
2019-07-04 18:22:22
101.51.176.91 attack
445/tcp
[2019-07-04]1pkt
2019-07-04 18:27:37
71.168.105.14 attack
Hacked my eBay account, changed out my email information.
2019-07-04 18:34:15
221.163.119.102 attack
23/tcp
[2019-07-04]1pkt
2019-07-04 18:04:57
145.239.120.171 attackspam
145.239.120.171:44520 - - [04/Jul/2019:08:29:37 +0200] "GET /wp-login.php HTTP/1.1" 404 298
2019-07-04 18:39:39
117.5.208.63 attackspambots
23/tcp
[2019-07-04]1pkt
2019-07-04 18:40:47
104.131.9.115 attack
TCP src-port=47882   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (393)
2019-07-04 18:04:33
107.189.3.58 attackspam
Sniffing for wordpress admin login /wp-login.php
2019-07-04 18:28:14
185.85.207.29 attackbots
Web Probe / Attack
2019-07-04 18:27:12
118.70.12.27 attackspam
445/tcp
[2019-07-04]1pkt
2019-07-04 18:34:39
49.206.214.29 attackspam
445/tcp
[2019-07-04]1pkt
2019-07-04 18:19:19

最近上报的IP列表

48.64.28.136 6.222.133.238 32.160.167.66 168.94.176.198
213.217.74.29 201.30.170.127 166.243.44.148 254.165.249.6
167.34.9.76 112.157.250.25 96.195.89.68 150.168.97.80
67.65.229.159 99.120.86.104 252.63.177.38 87.30.116.161
38.87.191.120 123.30.56.195 119.209.241.172 178.110.115.2