必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.140.212.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44452
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.140.212.133.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012001 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 13:29:07 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 133.212.140.68.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 68.140.212.133.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
136.243.254.153 attackspambots
$f2bV_matches
2020-07-10 13:31:41
88.214.26.93 attackbotsspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-10T03:58:01Z and 2020-07-10T05:14:51Z
2020-07-10 13:34:30
200.73.129.102 attackbotsspam
Jul 10 03:56:18 vps1 sshd[23535]: Invalid user ondeleta from 200.73.129.102 port 37994
Jul 10 03:56:20 vps1 sshd[23535]: Failed password for invalid user ondeleta from 200.73.129.102 port 37994 ssh2
...
2020-07-10 13:19:38
189.159.169.204 attackbots
Automatic report - XMLRPC Attack
2020-07-10 13:36:09
118.70.217.142 attack
Jul 10 06:16:41 l02a sshd[12378]: Invalid user system from 118.70.217.142
Jul 10 06:16:41 l02a sshd[12378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.217.142 
Jul 10 06:16:41 l02a sshd[12378]: Invalid user system from 118.70.217.142
Jul 10 06:16:43 l02a sshd[12378]: Failed password for invalid user system from 118.70.217.142 port 53129 ssh2
2020-07-10 13:21:29
62.234.146.45 attackspam
Jul 10 01:06:33 george sshd[4404]: Failed password for invalid user admin from 62.234.146.45 port 34828 ssh2
Jul 10 01:09:45 george sshd[4540]: Invalid user avigdor from 62.234.146.45 port 49622
Jul 10 01:09:45 george sshd[4540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45 
Jul 10 01:09:47 george sshd[4540]: Failed password for invalid user avigdor from 62.234.146.45 port 49622 ssh2
Jul 10 01:12:57 george sshd[4579]: Invalid user rstudio-server from 62.234.146.45 port 36154
...
2020-07-10 13:27:21
129.205.172.212 attackspambots
2020-07-10 13:24:51
166.111.152.230 attackspambots
Failed password for invalid user akkopu from 166.111.152.230 port 45686 ssh2
2020-07-10 13:29:55
183.162.79.39 attackspam
Jul 10 06:54:10 piServer sshd[4677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.162.79.39 
Jul 10 06:54:12 piServer sshd[4677]: Failed password for invalid user fangxs from 183.162.79.39 port 44465 ssh2
Jul 10 06:58:10 piServer sshd[5110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.162.79.39 
...
2020-07-10 13:21:12
46.38.148.22 attackbots
Jul 10 07:25:16 srv01 postfix/smtpd\[20193\]: warning: unknown\[46.38.148.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 10 07:25:35 srv01 postfix/smtpd\[28055\]: warning: unknown\[46.38.148.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 10 07:25:56 srv01 postfix/smtpd\[21476\]: warning: unknown\[46.38.148.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 10 07:26:16 srv01 postfix/smtpd\[20193\]: warning: unknown\[46.38.148.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 10 07:26:36 srv01 postfix/smtpd\[28042\]: warning: unknown\[46.38.148.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-10 13:28:52
3.127.88.26 attackbots
Automatic report - WordPress Brute Force
2020-07-10 13:32:01
111.229.50.25 attackspambots
Jul  9 19:04:09 php1 sshd\[20761\]: Invalid user christmas from 111.229.50.25
Jul  9 19:04:09 php1 sshd\[20761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.50.25
Jul  9 19:04:12 php1 sshd\[20761\]: Failed password for invalid user christmas from 111.229.50.25 port 41742 ssh2
Jul  9 19:08:20 php1 sshd\[21149\]: Invalid user tonia from 111.229.50.25
Jul  9 19:08:20 php1 sshd\[21149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.50.25
2020-07-10 13:16:40
222.186.173.183 attackspam
Jul 10 07:12:35 abendstille sshd\[28380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Jul 10 07:12:37 abendstille sshd\[28380\]: Failed password for root from 222.186.173.183 port 25942 ssh2
Jul 10 07:12:37 abendstille sshd\[28373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Jul 10 07:12:39 abendstille sshd\[28373\]: Failed password for root from 222.186.173.183 port 23470 ssh2
Jul 10 07:12:40 abendstille sshd\[28380\]: Failed password for root from 222.186.173.183 port 25942 ssh2
...
2020-07-10 13:20:25
211.234.119.189 attackbotsspam
2020-07-10T04:34:08.654447shield sshd\[6807\]: Invalid user freeze from 211.234.119.189 port 40398
2020-07-10T04:34:08.665378shield sshd\[6807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.234.119.189
2020-07-10T04:34:10.435566shield sshd\[6807\]: Failed password for invalid user freeze from 211.234.119.189 port 40398 ssh2
2020-07-10T04:37:37.185542shield sshd\[8816\]: Invalid user rjf from 211.234.119.189 port 38434
2020-07-10T04:37:37.197163shield sshd\[8816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.234.119.189
2020-07-10 13:32:48
218.92.0.224 attackspam
Jul 10 02:09:56 vps46666688 sshd[25632]: Failed password for root from 218.92.0.224 port 39376 ssh2
Jul 10 02:09:59 vps46666688 sshd[25632]: Failed password for root from 218.92.0.224 port 39376 ssh2
...
2020-07-10 13:20:41

最近上报的IP列表

101.112.110.29 25.238.187.69 198.130.5.140 174.234.57.218
225.101.196.52 19.111.76.183 207.204.40.211 49.104.122.52
81.134.199.139 52.140.207.110 8.56.134.22 5.233.37.199
7.137.155.19 240.127.108.1 192.127.228.53 50.23.67.42
184.204.128.115 124.74.224.86 92.61.57.158 154.223.67.240