必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.138.85.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.138.85.156.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 07:26:39 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 156.85.138.68.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 68.138.85.156.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
143.0.140.86 attack
Jun 30 18:49:45 web1 postfix/smtpd[32133]: warning: unknown[143.0.140.86]: SASL PLAIN authentication failed: authentication failure
...
2019-07-01 11:02:38
210.211.99.243 attack
Jul  1 04:27:48 nextcloud sshd\[26561\]: Invalid user oracle from 210.211.99.243
Jul  1 04:27:48 nextcloud sshd\[26561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.211.99.243
Jul  1 04:27:50 nextcloud sshd\[26561\]: Failed password for invalid user oracle from 210.211.99.243 port 59320 ssh2
...
2019-07-01 10:48:56
121.228.8.36 attackspambots
Jun 28 21:43:18 xb3 sshd[11006]: reveeclipse mapping checking getaddrinfo for 36.8.228.121.broad.sz.js.dynamic.163data.com.cn [121.228.8.36] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 28 21:43:20 xb3 sshd[11006]: Failed password for invalid user am from 121.228.8.36 port 52628 ssh2
Jun 28 21:43:20 xb3 sshd[11006]: Received disconnect from 121.228.8.36: 11: Bye Bye [preauth]
Jun 28 21:57:19 xb3 sshd[7142]: reveeclipse mapping checking getaddrinfo for 36.8.228.121.broad.sz.js.dynamic.163data.com.cn [121.228.8.36] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 28 21:57:21 xb3 sshd[7142]: Failed password for invalid user nathan from 121.228.8.36 port 43584 ssh2
Jun 28 21:57:21 xb3 sshd[7142]: Received disconnect from 121.228.8.36: 11: Bye Bye [preauth]
Jun 28 21:58:31 xb3 sshd[10688]: reveeclipse mapping checking getaddrinfo for 36.8.228.121.broad.sz.js.dynamic.163data.com.cn [121.228.8.36] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 28 21:58:33 xb3 sshd[10688]: Failed password for inval........
-------------------------------
2019-07-01 11:20:26
170.244.214.171 attackspam
Unauthorized Brute Force Email Login Fail
2019-07-01 10:59:41
34.219.36.191 attack
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-01 10:37:17
171.212.208.149 attack
Jun 28 11:51:53 archiv sshd[591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.212.208.149  user=r.r
Jun 28 11:51:54 archiv sshd[591]: Failed password for r.r from 171.212.208.149 port 35480 ssh2
Jun 28 11:51:57 archiv sshd[591]: Failed password for r.r from 171.212.208.149 port 35480 ssh2
Jun 28 11:52:00 archiv sshd[591]: Failed password for r.r from 171.212.208.149 port 35480 ssh2
Jun 28 11:52:02 archiv sshd[591]: Failed password for r.r from 171.212.208.149 port 35480 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=171.212.208.149
2019-07-01 10:40:58
103.233.0.200 attack
WP_xmlrpc_attack
2019-07-01 11:06:33
138.197.73.65 attackspam
fail2ban honeypot
2019-07-01 10:52:24
51.83.104.120 attackspambots
Jul  1 01:10:02 localhost sshd\[10377\]: Invalid user logger from 51.83.104.120 port 56682
Jul  1 01:10:02 localhost sshd\[10377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.104.120
Jul  1 01:10:04 localhost sshd\[10377\]: Failed password for invalid user logger from 51.83.104.120 port 56682 ssh2
2019-07-01 11:07:51
71.6.146.185 attack
27017/tcp 3784/tcp 2087/tcp...
[2019-04-30/06-30]421pkt,198pt.(tcp),37pt.(udp)
2019-07-01 10:51:10
141.85.216.237 attackbots
proto=tcp  .  spt=38287  .  dpt=25  .     (listed on Blocklist de  Jun 30)     (69)
2019-07-01 10:43:35
68.251.142.25 attackbots
Jun 28 14:36:27 host sshd[18874]: Invalid user jboss from 68.251.142.25 port 3678
Jun 28 14:36:27 host sshd[18874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.251.142.25
Jun 28 14:36:28 host sshd[18874]: Failed password for invalid user jboss from 68.251.142.25 port 3678 ssh2
Jun 28 14:36:28 host sshd[18874]: Received disconnect from 68.251.142.25 port 3678:11: Normal Shutdown, Thank you for playing [preauth]
Jun 28 14:36:28 host sshd[18874]: Disconnected from invalid user jboss 68.251.142.25 port 3678 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=68.251.142.25
2019-07-01 10:53:22
190.199.120.96 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-30 22:04:38,155 INFO [shellcode_manager] (190.199.120.96) no match, writing hexdump (ec3d26cf235148d2ee6fe6820a35711a :326577) - SMB (Unknown)
2019-07-01 11:16:01
201.163.72.150 attackspambots
firewall-block, port(s): 5060/udp
2019-07-01 10:46:19
45.55.151.41 attackbots
Automatic report - Web App Attack
2019-07-01 11:07:28

最近上报的IP列表

253.82.57.202 144.79.199.198 232.229.161.227 106.84.245.213
243.186.10.114 182.223.161.5 62.5.200.170 99.218.9.32
104.118.249.105 164.32.225.102 56.139.53.209 25.30.156.184
35.185.254.137 28.64.108.246 49.126.18.85 68.176.165.233
36.201.129.51 97.160.80.158 248.60.168.239 41.64.108.138