必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.163.14.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37438
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.163.14.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 23:54:09 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
39.14.163.68.in-addr.arpa domain name pointer pool-68-163-14-39.phil.east.verizon.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.14.163.68.in-addr.arpa	name = pool-68-163-14-39.phil.east.verizon.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
147.135.207.246 attackspambots
Scanning and Vuln Attempts
2019-07-08 16:15:29
116.236.180.211 attack
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-08 15:45:46
102.165.52.145 attackspam
\[2019-07-08 04:27:05\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-08T04:27:05.301-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441519470319",SessionID="0x7f02f88cef08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.52.145/52976",ACLName="no_extension_match"
\[2019-07-08 04:27:35\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-08T04:27:35.643-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441157940223",SessionID="0x7f02f85da9d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.52.145/51798",ACLName="no_extension_match"
\[2019-07-08 04:28:37\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-08T04:28:37.946-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442843798520",SessionID="0x7f02f867ac88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/102.165.52.145/55055",ACLName="n
2019-07-08 16:39:38
200.24.84.8 attack
Unauthorized IMAP connection attempt.
2019-07-08 16:03:09
187.87.7.222 attack
Brute force attack stopped by firewall
2019-07-08 16:24:12
91.214.114.7 attack
Jul  8 08:29:19 work-partkepr sshd\[8218\]: Invalid user valda from 91.214.114.7 port 59190
Jul  8 08:29:19 work-partkepr sshd\[8218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7
...
2019-07-08 16:38:45
191.53.198.30 attackspambots
Brute force attack stopped by firewall
2019-07-08 15:44:19
110.80.25.11 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-07-08 16:23:37
168.228.149.105 attackspambots
Brute force attack stopped by firewall
2019-07-08 15:55:39
201.23.235.27 attackbots
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-08 16:08:31
187.120.141.73 attackbots
Brute force attack stopped by firewall
2019-07-08 16:26:44
188.128.101.158 attackspambots
Unauthorised access (Jul  8) SRC=188.128.101.158 LEN=52 TTL=115 ID=1295 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-08 16:37:35
68.16.159.177 attackspam
3389BruteforceFW21
2019-07-08 16:40:00
42.238.232.64 attack
tried it too often
2019-07-08 15:45:13
187.120.129.107 attackbots
Brute force attack stopped by firewall
2019-07-08 16:16:43

最近上报的IP列表

96.192.71.13 129.72.55.170 71.31.208.245 129.177.24.88
255.166.237.188 8.14.14.75 217.75.98.10 100.39.193.170
76.202.8.83 88.88.180.48 202.244.202.158 77.27.218.126
21.40.205.19 130.23.238.189 56.100.146.102 61.145.118.12
142.68.37.157 30.105.127.141 85.3.87.225 195.179.94.86