必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.163.54.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50660
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.163.54.82.			IN	A

;; AUTHORITY SECTION:
.			296	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:12:05 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
82.54.163.68.in-addr.arpa domain name pointer static-68-163-54-82.phlapa.fios.verizon.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.54.163.68.in-addr.arpa	name = static-68-163-54-82.phlapa.fios.verizon.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.239.114.150 attack
Unauthorized connection attempt from IP address 14.239.114.150 on Port 445(SMB)
2019-08-28 01:28:33
177.184.240.44 attack
failed_logins
2019-08-28 01:15:45
141.237.32.110 attackspam
Automatic report - Port Scan Attack
2019-08-28 01:26:00
14.63.169.33 attackspam
Aug 27 14:09:18 srv-4 sshd\[30951\]: Invalid user tipodirect from 14.63.169.33
Aug 27 14:09:18 srv-4 sshd\[30951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.169.33
Aug 27 14:09:20 srv-4 sshd\[30951\]: Failed password for invalid user tipodirect from 14.63.169.33 port 49455 ssh2
...
2019-08-28 01:05:13
106.12.116.237 attack
Aug 27 14:32:18 vps691689 sshd[2805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.116.237
Aug 27 14:32:19 vps691689 sshd[2805]: Failed password for invalid user ubnt from 106.12.116.237 port 51616 ssh2
...
2019-08-28 01:02:22
80.82.77.33 attackbots
08/27/2019-09:53:31.738002 80.82.77.33 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 84
2019-08-28 01:04:27
118.173.46.208 attack
Unauthorized connection attempt from IP address 118.173.46.208 on Port 445(SMB)
2019-08-28 01:34:07
185.131.60.42 attackbotsspam
Unauthorized connection attempt from IP address 185.131.60.42 on Port 445(SMB)
2019-08-28 01:29:32
181.188.180.194 attackspam
Unauthorized connection attempt from IP address 181.188.180.194 on Port 445(SMB)
2019-08-28 01:00:55
104.248.157.14 attackspam
Aug 27 00:55:55 tdfoods sshd\[18527\]: Invalid user ya from 104.248.157.14
Aug 27 00:55:55 tdfoods sshd\[18527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.157.14
Aug 27 00:55:57 tdfoods sshd\[18527\]: Failed password for invalid user ya from 104.248.157.14 port 58666 ssh2
Aug 27 01:00:37 tdfoods sshd\[18961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.157.14  user=root
Aug 27 01:00:39 tdfoods sshd\[18961\]: Failed password for root from 104.248.157.14 port 46598 ssh2
2019-08-28 01:42:09
167.99.3.40 attack
Aug 27 09:10:31 ny01 sshd[4302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.3.40
Aug 27 09:10:33 ny01 sshd[4302]: Failed password for invalid user web1 from 167.99.3.40 port 10883 ssh2
Aug 27 09:14:37 ny01 sshd[4994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.3.40
2019-08-28 01:20:12
112.170.78.118 attackspambots
Aug 27 01:51:41 web9 sshd\[1439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118  user=root
Aug 27 01:51:43 web9 sshd\[1439\]: Failed password for root from 112.170.78.118 port 42740 ssh2
Aug 27 01:56:41 web9 sshd\[2506\]: Invalid user simon from 112.170.78.118
Aug 27 01:56:41 web9 sshd\[2506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118
Aug 27 01:56:43 web9 sshd\[2506\]: Failed password for invalid user simon from 112.170.78.118 port 33844 ssh2
2019-08-28 01:12:24
104.238.116.94 attackspam
Tried sshing with brute force.
2019-08-28 01:02:55
117.6.204.228 attackbots
Unauthorized connection attempt from IP address 117.6.204.228 on Port 445(SMB)
2019-08-28 01:14:05
79.137.79.167 attackspam
Automated report - ssh fail2ban:
Aug 27 18:44:02 wrong password, user=root, port=57962, ssh2
Aug 27 18:44:06 wrong password, user=root, port=57962, ssh2
Aug 27 18:44:10 wrong password, user=root, port=57962, ssh2
Aug 27 18:44:14 wrong password, user=root, port=57962, ssh2
2019-08-28 01:47:40

最近上报的IP列表

113.120.32.179 39.130.62.73 218.205.235.4 69.172.87.101
143.110.249.65 187.16.33.61 156.204.238.21 112.47.208.66
34.136.6.43 27.147.210.218 193.194.92.184 14.177.248.100
45.114.90.107 177.128.115.229 181.197.200.69 42.232.39.109
24.249.199.4 185.82.98.115 165.22.221.230 197.33.240.187