必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.137.85.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.137.85.250.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:18:24 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 250.85.137.68.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 68.137.85.250.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
175.23.74.147 attackbotsspam
Unauthorised access (Oct 11) SRC=175.23.74.147 LEN=40 TTL=49 ID=26884 TCP DPT=8080 WINDOW=53657 SYN 
Unauthorised access (Oct 11) SRC=175.23.74.147 LEN=40 TTL=49 ID=17601 TCP DPT=8080 WINDOW=53192 SYN 
Unauthorised access (Oct 10) SRC=175.23.74.147 LEN=40 TTL=49 ID=55895 TCP DPT=8080 WINDOW=53192 SYN 
Unauthorised access (Oct  9) SRC=175.23.74.147 LEN=40 TTL=49 ID=3809 TCP DPT=8080 WINDOW=53192 SYN 
Unauthorised access (Oct  8) SRC=175.23.74.147 LEN=40 TTL=49 ID=64117 TCP DPT=8080 WINDOW=40145 SYN
2019-10-11 23:08:27
218.92.0.141 attackspam
Oct 11 21:54:43 lcl-usvr-02 sshd[17678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.141  user=root
Oct 11 21:54:45 lcl-usvr-02 sshd[17678]: Failed password for root from 218.92.0.141 port 49004 ssh2
Oct 11 21:54:47 lcl-usvr-02 sshd[17678]: Failed password for root from 218.92.0.141 port 49004 ssh2
Oct 11 21:54:43 lcl-usvr-02 sshd[17678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.141  user=root
Oct 11 21:54:45 lcl-usvr-02 sshd[17678]: Failed password for root from 218.92.0.141 port 49004 ssh2
Oct 11 21:54:47 lcl-usvr-02 sshd[17678]: Failed password for root from 218.92.0.141 port 49004 ssh2
Oct 11 21:54:43 lcl-usvr-02 sshd[17678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.141  user=root
Oct 11 21:54:45 lcl-usvr-02 sshd[17678]: Failed password for root from 218.92.0.141 port 49004 ssh2
Oct 11 21:54:47 lcl-usvr-02 sshd[17678]: Failed password for root
2019-10-11 23:04:42
163.172.26.73 attackspam
2019-10-11T14:34:16.348311shield sshd\[388\]: Invalid user Windows@100 from 163.172.26.73 port 22888
2019-10-11T14:34:16.353485shield sshd\[388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163-172-26-73.rev.poneytelecom.eu
2019-10-11T14:34:18.653944shield sshd\[388\]: Failed password for invalid user Windows@100 from 163.172.26.73 port 22888 ssh2
2019-10-11T14:37:53.552134shield sshd\[655\]: Invalid user Bear@2017 from 163.172.26.73 port 64296
2019-10-11T14:37:53.556841shield sshd\[655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163-172-26-73.rev.poneytelecom.eu
2019-10-11 22:44:49
37.139.21.75 attack
Invalid user applmgr from 37.139.21.75 port 39326
2019-10-11 22:38:47
85.204.246.240 attackbots
WordPress wp-login brute force :: 85.204.246.240 0.044 BYPASS [12/Oct/2019:01:18:36  1100] www.[censored_2] "POST //wp-login.php HTTP/1.1" 200 4584 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.90 Safari/537.36 2345Explorer/9.3.2.17331"
2019-10-11 23:31:59
37.45.136.219 attack
Invalid user admin from 37.45.136.219 port 52551
2019-10-11 22:39:44
139.215.217.181 attackbotsspam
Oct 11 01:48:45 hpm sshd\[23632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181  user=root
Oct 11 01:48:47 hpm sshd\[23632\]: Failed password for root from 139.215.217.181 port 45085 ssh2
Oct 11 01:53:46 hpm sshd\[24028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181  user=root
Oct 11 01:53:48 hpm sshd\[24028\]: Failed password for root from 139.215.217.181 port 34777 ssh2
Oct 11 01:58:40 hpm sshd\[24412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181  user=root
2019-10-11 23:15:34
114.108.175.184 attackbots
Oct 11 05:07:47 hpm sshd\[8248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.175.184  user=root
Oct 11 05:07:49 hpm sshd\[8248\]: Failed password for root from 114.108.175.184 port 40510 ssh2
Oct 11 05:12:13 hpm sshd\[8735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.175.184  user=root
Oct 11 05:12:14 hpm sshd\[8735\]: Failed password for root from 114.108.175.184 port 35748 ssh2
Oct 11 05:16:42 hpm sshd\[9109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.175.184  user=root
2019-10-11 23:17:23
109.202.117.4 attack
Oct 11 16:20:30 h2177944 kernel: \[3679670.548621\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.202.117.4 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=67 ID=58537 DF PROTO=TCP SPT=53296 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct 11 16:20:30 h2177944 kernel: \[3679670.597465\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.202.117.4 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=67 ID=60282 DF PROTO=TCP SPT=64144 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct 11 16:27:50 h2177944 kernel: \[3680110.187766\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.202.117.4 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=78 ID=33718 DF PROTO=TCP SPT=50285 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct 11 16:35:58 h2177944 kernel: \[3680598.384436\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.202.117.4 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=60 ID=22124 DF PROTO=TCP SPT=59694 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct 11 16:36:38 h2177944 kernel: \[3680638.776022\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.202.117.4 DST=85.214.
2019-10-11 22:51:14
202.45.147.125 attackspambots
Oct 11 04:44:05 wbs sshd\[19067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.45.147.125  user=root
Oct 11 04:44:07 wbs sshd\[19067\]: Failed password for root from 202.45.147.125 port 45838 ssh2
Oct 11 04:48:16 wbs sshd\[19412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.45.147.125  user=root
Oct 11 04:48:17 wbs sshd\[19412\]: Failed password for root from 202.45.147.125 port 36290 ssh2
Oct 11 04:52:32 wbs sshd\[19797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.45.147.125  user=root
2019-10-11 23:12:14
202.169.62.187 attackspambots
Oct 11 16:40:00 meumeu sshd[27188]: Failed password for root from 202.169.62.187 port 48911 ssh2
Oct 11 16:44:51 meumeu sshd[27945]: Failed password for root from 202.169.62.187 port 40349 ssh2
...
2019-10-11 22:59:12
218.69.91.84 attackbots
Oct 11 11:58:18 *** sshd[23291]: User root from 218.69.91.84 not allowed because not listed in AllowUsers
2019-10-11 23:12:02
117.173.67.147 attackspambots
Oct 11 17:09:46 server sshd\[29383\]: User root from 117.173.67.147 not allowed because listed in DenyUsers
Oct 11 17:09:46 server sshd\[29383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.147  user=root
Oct 11 17:09:47 server sshd\[29383\]: Failed password for invalid user root from 117.173.67.147 port 33048 ssh2
Oct 11 17:13:05 server sshd\[9365\]: User root from 117.173.67.147 not allowed because listed in DenyUsers
Oct 11 17:13:05 server sshd\[9365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.147  user=root
2019-10-11 23:16:25
178.62.37.168 attack
Oct 11 10:54:13 TORMINT sshd\[16932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.37.168  user=root
Oct 11 10:54:15 TORMINT sshd\[16932\]: Failed password for root from 178.62.37.168 port 50904 ssh2
Oct 11 10:58:18 TORMINT sshd\[17427\]: Invalid user 123 from 178.62.37.168
Oct 11 10:58:18 TORMINT sshd\[17427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.37.168
...
2019-10-11 23:00:09
188.29.86.170 attack
Automatic report - Port Scan Attack
2019-10-11 23:12:48

最近上报的IP列表

41.20.149.94 119.209.2.60 184.241.124.181 124.4.85.158
198.70.50.171 155.142.148.73 38.32.78.161 82.233.214.23
118.222.170.43 231.136.101.151 39.23.243.75 188.167.192.24
101.48.3.89 8.226.63.248 130.65.230.188 98.16.226.54
123.202.117.206 248.210.41.7 12.69.22.221 118.85.75.28