必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.140.221.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.140.221.113.			IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010600 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 19:27:21 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 113.221.140.68.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 68.140.221.113.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.16.210.211 attack
Unauthorised access (Oct 11) SRC=121.16.210.211 LEN=40 TTL=49 ID=38993 TCP DPT=8080 WINDOW=9424 SYN 
Unauthorised access (Oct 10) SRC=121.16.210.211 LEN=40 TTL=49 ID=51866 TCP DPT=8080 WINDOW=5115 SYN 
Unauthorised access (Oct  9) SRC=121.16.210.211 LEN=40 TTL=49 ID=10899 TCP DPT=8080 WINDOW=5115 SYN 
Unauthorised access (Oct  7) SRC=121.16.210.211 LEN=40 TTL=49 ID=35193 TCP DPT=8080 WINDOW=36404 SYN 
Unauthorised access (Oct  6) SRC=121.16.210.211 LEN=40 TTL=49 ID=21551 TCP DPT=8080 WINDOW=8341 SYN
2019-10-11 14:12:59
146.88.240.4 attack
11.10.2019 05:12:26 Connection to port 1900 blocked by firewall
2019-10-11 13:23:37
84.255.152.10 attackspambots
2019-10-11T05:44:21.324764abusebot-5.cloudsearch.cf sshd\[6885\]: Invalid user swsgest from 84.255.152.10 port 49576
2019-10-11 13:52:48
159.65.85.64 attack
Port Scan: TCP/443
2019-10-11 13:46:37
151.80.98.17 attackbots
Oct 11 07:49:29 SilenceServices sshd[10619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.98.17
Oct 11 07:49:31 SilenceServices sshd[10619]: Failed password for invalid user !@#$ABCD from 151.80.98.17 port 50096 ssh2
Oct 11 07:53:34 SilenceServices sshd[11714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.98.17
2019-10-11 14:12:40
140.143.230.161 attack
Oct 11 07:07:52 microserver sshd[19826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.161  user=root
Oct 11 07:07:53 microserver sshd[19826]: Failed password for root from 140.143.230.161 port 14459 ssh2
Oct 11 07:12:11 microserver sshd[20490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.161  user=root
Oct 11 07:12:13 microserver sshd[20490]: Failed password for root from 140.143.230.161 port 48993 ssh2
Oct 11 07:16:30 microserver sshd[21147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.161  user=root
Oct 11 07:29:37 microserver sshd[22724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.230.161  user=root
Oct 11 07:29:39 microserver sshd[22724]: Failed password for root from 140.143.230.161 port 17636 ssh2
Oct 11 07:34:00 microserver sshd[23389]: pam_unix(sshd:auth): authentication failure; logna
2019-10-11 14:14:22
78.140.11.144 attack
2019-10-11T04:55:58.102958beta postfix/smtpd[25934]: NOQUEUE: reject: RCPT from n11-c144.client.tomica.ru[78.140.11.144]: 554 5.7.1 Service unavailable; Client host [78.140.11.144] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/78.140.11.144 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to=<4b6c86cc.6050603@rncbc.org> proto=ESMTP helo=
...
2019-10-11 14:05:11
150.109.113.127 attack
Oct 11 06:51:25 www5 sshd\[3561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.113.127  user=root
Oct 11 06:51:27 www5 sshd\[3561\]: Failed password for root from 150.109.113.127 port 38218 ssh2
Oct 11 06:55:56 www5 sshd\[4414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.113.127  user=root
...
2019-10-11 14:03:34
134.209.64.10 attackbotsspam
'Fail2Ban'
2019-10-11 13:43:02
92.187.228.47 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-10-11 14:10:00
218.4.234.74 attackspambots
Oct 11 06:58:54 MK-Soft-VM7 sshd[26549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.234.74 
Oct 11 06:58:56 MK-Soft-VM7 sshd[26549]: Failed password for invalid user P4ssword@123 from 218.4.234.74 port 2567 ssh2
...
2019-10-11 13:51:48
45.136.109.250 attack
Oct 11 07:36:53 mc1 kernel: \[2058601.968769\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.250 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=53729 PROTO=TCP SPT=44076 DPT=6784 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 11 07:43:48 mc1 kernel: \[2059017.087896\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.250 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=12482 PROTO=TCP SPT=44076 DPT=6556 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 11 07:45:46 mc1 kernel: \[2059135.239152\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.250 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=1987 PROTO=TCP SPT=44076 DPT=6836 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-11 13:50:40
185.153.199.2 attack
10/11/2019-08:03:18.555875 185.153.199.2 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2019-10-11 14:11:26
31.14.135.117 attack
Oct 11 06:47:41 www sshd\[21993\]: Failed password for root from 31.14.135.117 port 51184 ssh2Oct 11 06:51:44 www sshd\[22175\]: Failed password for root from 31.14.135.117 port 34538 ssh2Oct 11 06:56:00 www sshd\[22365\]: Failed password for root from 31.14.135.117 port 46120 ssh2
...
2019-10-11 14:01:54
121.40.206.215 attackspambots
Automatic report - Banned IP Access
2019-10-11 13:25:44

最近上报的IP列表

1.53.219.138 126.208.142.236 95.94.170.196 153.243.129.177
72.171.80.222 126.250.191.183 127.74.116.150 148.187.194.222
50.152.199.124 129.133.115.113 127.125.243.130 130.129.136.152
98.134.146.178 134.119.228.110 194.180.138.65 165.234.137.209
137.155.173.216 169.255.238.185 138.199.154.166 139.148.127.179