必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
68.14.211.165 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/68.14.211.165/ 
 
 US - 1H : (865)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN22773 
 
 IP : 68.14.211.165 
 
 CIDR : 68.14.208.0/20 
 
 PREFIX COUNT : 4916 
 
 UNIQUE IP COUNT : 11971840 
 
 
 ATTACKS DETECTED ASN22773 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2020-03-13 22:15:25 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-14 07:02:04
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.14.211.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.14.211.66.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:59:42 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
66.211.14.68.in-addr.arpa domain name pointer mail.guthriegeneral.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.211.14.68.in-addr.arpa	name = mail.guthriegeneral.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.106.70.30 attackspam
SMB Server BruteForce Attack
2019-12-25 01:31:24
112.209.191.213 attackspambots
1433/tcp
[2019-12-24]1pkt
2019-12-25 01:31:02
176.63.29.24 attackbots
Dec 24 16:34:22 server postfix/smtpd[5942]: NOQUEUE: reject: RCPT from catv-176-63-29-24.catv.broadband.hu[176.63.29.24]: 554 5.7.1 Service unavailable; Client host [176.63.29.24] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/176.63.29.24; from= to= proto=ESMTP helo=
2019-12-25 01:37:16
68.183.81.150 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-25 01:31:37
77.42.82.65 attack
37215/tcp
[2019-12-24]1pkt
2019-12-25 01:35:41
49.143.172.157 attackbotsspam
81/tcp
[2019-12-24]1pkt
2019-12-25 01:25:13
78.134.208.126 attackbots
1577201665 - 12/24/2019 16:34:25 Host: 78.134.208.126/78.134.208.126 Port: 445 TCP Blocked
2019-12-25 01:35:20
157.230.141.185 attackbots
Dec2416:33:47server2pure-ftpd:\(\?@157.230.141.185\)[WARNING]Authenticationfailedforuser[ftp]Dec2416:33:51server2pure-ftpd:\(\?@137.74.117.110\)[WARNING]Authenticationfailedforuser[ftp]Dec2416:33:53server2pure-ftpd:\(\?@157.230.141.185\)[WARNING]Authenticationfailedforuser[ftp]Dec2416:33:55server2pure-ftpd:\(\?@137.74.117.110\)[WARNING]Authenticationfailedforuser[ftp]Dec2416:33:56server2pure-ftpd:\(\?@50.62.176.220\)[WARNING]Authenticationfailedforuser[ftp]IPAddressesBlocked:
2019-12-25 01:54:10
213.141.141.150 attack
firewall-block, port(s): 1433/tcp
2019-12-25 01:48:54
219.107.20.213 attackbotsspam
445/tcp
[2019-12-24]1pkt
2019-12-25 01:48:02
185.176.27.178 attack
12/24/2019-18:50:48.148517 185.176.27.178 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-25 01:56:42
222.186.173.154 attackbots
2019-12-24T18:59:43.020705centos sshd\[4386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
2019-12-24T18:59:44.714962centos sshd\[4386\]: Failed password for root from 222.186.173.154 port 58002 ssh2
2019-12-24T18:59:48.119691centos sshd\[4386\]: Failed password for root from 222.186.173.154 port 58002 ssh2
2019-12-25 02:01:19
50.60.175.99 attackspambots
445/tcp
[2019-12-24]1pkt
2019-12-25 01:21:20
2.59.83.71 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-25 01:44:04
113.165.94.98 attackbotsspam
Unauthorized connection attempt detected from IP address 113.165.94.98 to port 445
2019-12-25 01:50:36

最近上报的IP列表

134.209.247.158 144.168.253.150 188.235.136.9 193.151.117.166
213.47.24.152 29.90.240.10 77.116.146.219 136.232.206.78
106.110.198.222 204.152.210.132 94.41.226.71 45.235.158.85
187.162.45.208 113.125.82.236 89.43.103.168 183.200.172.113
82.157.66.115 104.248.144.242 86.167.68.230 177.249.171.176