必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Verizon

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.163.80.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1813
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.163.80.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 12 15:12:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 195.80.163.68.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.80.163.68.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.61.168 attackbotsspam
2019-10-01T10:25:26.9783551495-001 sshd\[19189\]: Invalid user os from 106.12.61.168 port 33812
2019-10-01T10:25:26.9819391495-001 sshd\[19189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.61.168
2019-10-01T10:25:29.0292781495-001 sshd\[19189\]: Failed password for invalid user os from 106.12.61.168 port 33812 ssh2
2019-10-01T10:37:43.7424891495-001 sshd\[20149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.61.168  user=root
2019-10-01T10:37:45.9658301495-001 sshd\[20149\]: Failed password for root from 106.12.61.168 port 43344 ssh2
2019-10-01T10:50:02.6279861495-001 sshd\[21074\]: Invalid user master from 106.12.61.168 port 52914
...
2019-10-01 23:13:00
92.118.160.29 attack
scan r
2019-10-01 23:25:22
185.216.32.170 attack
Oct  1 15:44:37 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct  1 15:44:39 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct  1 15:44:41 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct  1 15:44:44 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct  1 15:44:46 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2Oct  1 15:44:49 rotator sshd\[29865\]: Failed password for root from 185.216.32.170 port 42509 ssh2
...
2019-10-01 23:01:48
49.49.28.203 attackspambots
Chat Spam
2019-10-01 23:19:37
62.210.105.116 attackbotsspam
Oct  1 15:19:34 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct  1 15:19:37 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct  1 15:19:39 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct  1 15:19:41 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct  1 15:19:43 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2Oct  1 15:19:46 rotator sshd\[25438\]: Failed password for root from 62.210.105.116 port 41564 ssh2
...
2019-10-01 22:54:30
106.12.89.171 attack
SSH Bruteforce
2019-10-01 23:20:43
173.255.243.141 attackspam
4040/tcp 5985/tcp 4500/tcp...
[2019-07-31/10-01]105pkt,74pt.(tcp),1pt.(udp)
2019-10-01 23:21:15
203.175.65.17 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 01-10-2019 13:15:23.
2019-10-01 23:31:37
180.94.67.154 attackbotsspam
2019-10-0114:15:441iFH4B-0007tC-RJ\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[41.101.197.12]:55854P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2555id=23044372-F504-4B19-B345-8DEEF5A1862A@imsuisse-sa.chT=""forisurfilove@aim.comjmartinez0522@aol.comjojoobabby57@aim.comkaitlinmariemilligan@yahoo.comkhaotickristen27@aim.comkmillxo@yahoo.comrequesttickets@thedailyshow.comyormarkm@sselive.com2019-10-0114:15:431iFH4B-0007s3-2U\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[180.94.67.154]:4727P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2329id=9829F630-AA1C-4EE4-BD20-3C88903D5C5D@imsuisse-sa.chT=""forjnoye@zachys.comJocelin@Sokolin.comjoestaxidermy@optonline.netjoetaxidermy@optonline.netjofish36@yahoo.com2019-10-0114:15:451iFH4C-0007tE-HR\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[49.207.84.22]:42062P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=1883id=A3E526EB-C9BB-4C9F-B8D1-1A20D1B
2019-10-01 22:59:16
112.85.42.72 attackbotsspam
Oct  1 10:59:56 xentho sshd[25716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
Oct  1 10:59:58 xentho sshd[25716]: Failed password for root from 112.85.42.72 port 42094 ssh2
Oct  1 11:00:00 xentho sshd[25716]: Failed password for root from 112.85.42.72 port 42094 ssh2
Oct  1 10:59:56 xentho sshd[25716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
Oct  1 10:59:58 xentho sshd[25716]: Failed password for root from 112.85.42.72 port 42094 ssh2
Oct  1 11:00:00 xentho sshd[25716]: Failed password for root from 112.85.42.72 port 42094 ssh2
Oct  1 10:59:56 xentho sshd[25716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
Oct  1 10:59:58 xentho sshd[25716]: Failed password for root from 112.85.42.72 port 42094 ssh2
Oct  1 11:00:00 xentho sshd[25716]: Failed password for root from 112.85.42.72 po
...
2019-10-01 23:23:42
202.1.184.151 attackbotsspam
2019-10-0114:15:121iFH3g-0007iT-Iy\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[105.158.175.135]:33001P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2469id=74226D63-1EDA-4997-B8B9-09039140A21A@imsuisse-sa.chT="Dale"forDale.Stewart@td.comdalry.henry@imsbarter.comdfielder@johnmglover.comdan.marques@alphagraphics.comDSmith@stormcopper.comdana@planetfitnessteam.comdanbaldwin@prudentialct.comdwheelock@planetfitness.comDebbieB@swcoffice.comdaniel.korponai@yahoo.com2019-10-0114:15:141iFH3h-0007it-F5\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[105.238.86.172]:43644P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2201id=76E759EB-7015-4565-BBD9-23E8B3F6E76A@imsuisse-sa.chT=""forjkoller@schscougars.orgjlee@schscougars.orgJMassey@ldry.comjmmilton51@cox.netjnamat@anchorgeneral.comjnjwyatt@pobox.comjoe.shapiro@cox.net2019-10-0114:15:151iFH3j-0007le-6M\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[188.253.226.250]:27230P=esmtpsaX=TLSv1.2:ECDH
2019-10-01 23:41:25
41.101.197.12 attackspambots
2019-10-0114:15:441iFH4B-0007tC-RJ\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[41.101.197.12]:55854P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2555id=23044372-F504-4B19-B345-8DEEF5A1862A@imsuisse-sa.chT=""forisurfilove@aim.comjmartinez0522@aol.comjojoobabby57@aim.comkaitlinmariemilligan@yahoo.comkhaotickristen27@aim.comkmillxo@yahoo.comrequesttickets@thedailyshow.comyormarkm@sselive.com2019-10-0114:15:431iFH4B-0007s3-2U\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[180.94.67.154]:4727P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=2329id=9829F630-AA1C-4EE4-BD20-3C88903D5C5D@imsuisse-sa.chT=""forjnoye@zachys.comJocelin@Sokolin.comjoestaxidermy@optonline.netjoetaxidermy@optonline.netjofish36@yahoo.com2019-10-0114:15:451iFH4C-0007tE-HR\<=info@imsuisse-sa.chH=\(imsuisse-sa.ch\)[49.207.84.22]:42062P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_plain:info@imsuisse-sa.chS=1883id=A3E526EB-C9BB-4C9F-B8D1-1A20D1B
2019-10-01 23:00:03
111.231.237.245 attackbots
Oct  1 15:22:05 localhost sshd\[29052\]: Invalid user ux from 111.231.237.245 port 45193
Oct  1 15:22:05 localhost sshd\[29052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.237.245
Oct  1 15:22:07 localhost sshd\[29052\]: Failed password for invalid user ux from 111.231.237.245 port 45193 ssh2
2019-10-01 23:20:13
51.83.33.156 attackspambots
Oct  1 05:23:31 tdfoods sshd\[25778\]: Invalid user ross from 51.83.33.156
Oct  1 05:23:31 tdfoods sshd\[25778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.ip-51-83-33.eu
Oct  1 05:23:33 tdfoods sshd\[25778\]: Failed password for invalid user ross from 51.83.33.156 port 36218 ssh2
Oct  1 05:27:40 tdfoods sshd\[26145\]: Invalid user atomic from 51.83.33.156
Oct  1 05:27:40 tdfoods sshd\[26145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.ip-51-83-33.eu
2019-10-01 23:34:16
123.30.154.184 attackbotsspam
2019-10-01T15:13:49.244728abusebot-7.cloudsearch.cf sshd\[30140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.154.184  user=root
2019-10-01 23:33:41

最近上报的IP列表

78.216.74.252 119.246.108.79 54.57.153.23 163.105.201.121
241.165.17.50 108.109.163.97 229.141.121.149 6.140.91.102
85.141.251.108 88.128.255.236 120.42.99.124 108.40.168.200
198.81.154.43 254.221.134.24 96.161.30.2 62.99.191.169
190.2.230.143 147.73.66.128 242.78.116.189 28.9.161.252