必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.14.104.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.14.104.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 01:14:27 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
138.104.14.68.in-addr.arpa domain name pointer ip68-14-104-138.ri.ri.cox.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.104.14.68.in-addr.arpa	name = ip68-14-104-138.ri.ri.cox.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.7.235.211 attack
Apr 24 10:34:16 nextcloud sshd\[19361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.235.211  user=root
Apr 24 10:34:18 nextcloud sshd\[19361\]: Failed password for root from 61.7.235.211 port 55230 ssh2
Apr 24 10:41:11 nextcloud sshd\[29069\]: Invalid user rc from 61.7.235.211
2020-04-24 17:12:34
178.137.95.244 attackspambots
Automatic report - XMLRPC Attack
2020-04-24 17:22:09
46.101.2.179 attack
IP blocked
2020-04-24 17:38:01
138.197.25.187 attack
Apr 24 08:44:56 ArkNodeAT sshd\[17530\]: Invalid user admin from 138.197.25.187
Apr 24 08:44:56 ArkNodeAT sshd\[17530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.25.187
Apr 24 08:44:58 ArkNodeAT sshd\[17530\]: Failed password for invalid user admin from 138.197.25.187 port 38670 ssh2
2020-04-24 17:13:44
83.30.98.27 attackbots
Brute force attempt
2020-04-24 17:47:02
191.234.162.169 attack
Apr 24 08:31:51 XXX sshd[59456]: Invalid user test from 191.234.162.169 port 45900
2020-04-24 17:45:00
106.13.186.119 attackspambots
Invalid user postgres from 106.13.186.119 port 36842
2020-04-24 17:28:42
83.97.20.31 attack
Unauthorized connection attempt detected from IP address 83.97.20.31 to port 8081 [T]
2020-04-24 17:23:21
45.40.198.93 attack
Wordpress malicious attack:[sshd]
2020-04-24 17:14:14
45.83.118.106 attackspambots
[2020-04-24 05:08:23] NOTICE[1170][C-00004903] chan_sip.c: Call from '' (45.83.118.106:59352) to extension '46842002315' rejected because extension not found in context 'public'.
[2020-04-24 05:08:23] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-24T05:08:23.526-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46842002315",SessionID="0x7f6c0814e488",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.83.118.106/59352",ACLName="no_extension_match"
[2020-04-24 05:10:30] NOTICE[1170][C-0000490b] chan_sip.c: Call from '' (45.83.118.106:64561) to extension '01146842002315' rejected because extension not found in context 'public'.
[2020-04-24 05:10:30] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-24T05:10:30.222-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146842002315",SessionID="0x7f6c08664b48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.83.118.
...
2020-04-24 17:41:18
123.139.46.180 attackspambots
Apr 24 11:45:31 Enigma sshd[4774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.139.46.180  user=root
Apr 24 11:45:33 Enigma sshd[4774]: Failed password for root from 123.139.46.180 port 38372 ssh2
Apr 24 11:48:23 Enigma sshd[4852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.139.46.180  user=root
Apr 24 11:48:25 Enigma sshd[4852]: Failed password for root from 123.139.46.180 port 58450 ssh2
Apr 24 11:51:22 Enigma sshd[5193]: Invalid user ftpadmin from 123.139.46.180 port 22027
2020-04-24 17:09:13
36.72.213.249 attackspam
firewall-block, port(s): 1433/tcp
2020-04-24 17:33:49
83.202.140.192 attack
Portscan detected
2020-04-24 17:21:18
115.236.35.107 attackspam
Invalid user 22 from 115.236.35.107 port 41498
2020-04-24 17:20:50
114.34.94.6 attackbots
Honeypot attack, port: 4567, PTR: 114-34-94-6.HINET-IP.hinet.net.
2020-04-24 17:25:46

最近上报的IP列表

210.255.231.195 250.50.252.28 250.69.41.170 68.93.250.114
179.79.194.71 53.167.136.143 162.181.82.80 222.99.53.113
187.11.97.195 9.209.61.186 160.238.48.236 19.169.145.26
155.105.120.125 228.15.124.162 22.103.228.241 109.59.44.89
56.231.7.203 62.131.166.136 40.129.226.28 144.60.169.8